Longitudinal study of large-scale traceroute results

Download
Author
Glasser, Dillon
Date
2018-03Advisor
Beverly, Robert
Second Reader
Rohrer, Justin P.
Metadata
Show full item recordAbstract
Traceroute is a popular active probing technique used by researchers, operators, and adversaries to map the structure and connectivity of IP networks. However, traceroute is susceptible to making inaccurate inferences. We perform a large-scale longitudinal investigation of traceroute artifacts to find anomalies that may be indicative of network errors, misconfiguration, or active deception efforts. Using the IPv4 Routed /24 Topology Dataset from the Center for Applied Internet Data Analysis (CAIDA), we provide a taxonomy of traceroute results, including anomalous and unexpected artifacts. We analyze the distribution of the observed artifacts and attempt to find attribution to the cause of each. Finally, we provide a longitudinal analysis of multi-protocol label switching in order to explore possible explanations for unexplained artifacts.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Detection of Oceanic Quasi-Zonal Jets from Altimetry Observations
Ivanov, L.M.; Collins, C.A.; Margolina, T.M. (2012-08);Recent analyses of observations and ocean model outputs have revealed coherent low-frequency quasizonal jets in observed sea surface height (SSH) anomaly and model velocity fields. The jets were latent, that is, they ... -
Dependable Software through a Holistic Framework of Tool Interoperability and Artifact Dependency
Luqi; Puett, J. (Monterey, California. Naval Postgraduate School, 2002-07); NPS-SW-02-006Objectives. The goal of this research is to develop a holistic framework for engineering dependable computing and communications software. The framework establishes collaborative mechanisms by which existing software ... -
A Technique for Presenting a Deceptive Dynamic Network Topology
Trassare, Samuel T. (Monterey, California: Naval Postgraduate School, 2013-03);Adversaries scan Department of Defense networks looking for vulnerabilities that allow surveillance or the embedding of destructive malware weapons. In cyberspace, adversaries either actively probe or passively observe ...