Saturday, October 20, 2001
Topic/Presenter
Full Abstract

The Internet is a battleground, with ISP's and their customers right in the middle of the line of fire. What ISPs need to protect themselves are tools and techniques that work in the line of fire, i.e., tools that fight DoS attacks and provide something other than a busy signal on the customer service line.

This tutorial will walk ISPs through the five stages of working an attack: preparation, identification, classification, traceback, and reaction. Focus will be placed on techniques that work - with specific vendor features left for other sessions. All the techniques have been validated and proven to be operationally deployable and workable under conditions of network stress. The key objective is to empower other ISPs to deploy these vendor-independent techniques, which will provide a foundation for inter-NOC cooperation to trace back the attacks to their source.

Speakers
Brian W. Gemberling, UUNET
Barry Raveendran Greene, Cisco Systems
Chris Morrow, UUNET/Verizon

Full Abstract

This tutorial addresses the building blocks of IP routing protocol scalability (hierarchy, redundancy, and addressing and summarization) along with protocol-specific issues. BGP, ISIS and OSPF configurations and parameters are explored. The examples presented include a set of protocol-specific "best practices."

Intended Audience: Network operators and engineers with IP routing experience. Knowledge of the protocols covered is expected.

Tutorial Outline

Introduction
- Scope of the Presentation
- Agenda

Scalability Building Blocks
Relationship to Convergence and Stability
Impact/Use of Hierarchy/Redundancy/Addressing and Summarization
Hierarchy
- Why is hierarchy important?
- Brief overview of service placement (per layer.

Redundancy - When is redundancy too much?
- IGP Flooding

Addressing and Summarization
-Aggregation Methods per protocol

ISIS Scalability

Hierarchy in ISIS
- L or L-only networks
- Use and limitations of Hierarchical Networks
- Route Leaking

Detection and Propagation of Changes - Fast Hellos
- LSP Generation
- SPF Runs
- Exponential Backoff


Other tips...
- Overload bit

OSPF Scalability

Hierarchy - Area types and flow of routing information
- LSA Filtering

Detection and Propagation of Changes
- Fast Hellos
- LSP Generation
- SPF Runs
- Exponential Backoff

Other tips...
- Overload bit

OSPF Scalability

Hierarchy - Area types and flow of routing information
- LSA Filtering

Detection and propagation of changes
- Fast Hellos
- LSA Generation
- SPF Runs
- Exponential Backoff

Other tips...
- Stub router advertisement

BGP Scalability

iBGP Full Mesh
- Route Propagation Requirements

Peer-Groups
- Configuration Grouping and UPDATE Generation

Route Reflectors
- Deployment (Hierarchy)

Confederations
- Deployment
- Interaction with IGPs

Detection and Propagation of Changes - minAdvertisementTimer
- NEXT_HOP Reachability
- 4.5.3 Route Dampening

Summary and Conclusions

Speakers
Alvaro Retana, Cisco Systems
Alvaro Retana is a Technical Leader in Cisco's IP Routing Deployment and Scalability Team, where he works first-hand on advanced features in routing protocols. Alvaro was formerly a technical lead for both the Internet Service Provider Support Team and the Routing Protocols Team at the Cisco Technical Assistance Center in Research Triangle Park, NC.

Sunday, October 21, 2001
Topic/Presenter
Full Abstract

Speakers
Brian W. Gemberling, UUNET
Barry Raveendran Greene, Cisco Systems
Chris Morrow, UUNET

Full Abstract

Speakers
Alvaro Retana, Cisco Systems

Full Abstract

This tutorial introduces service providers to some of the features available in BGP to aid multihoming to the Internet. After an explanation of multihoming and the principles being followed in this tutorial, several examples involving different scenarios will be given. This includes the options available when multihoming to the same ISP (including RFC2270) and to different upstreams. Configurations for modifying inbound and outbound traffic flows are covered. The tutorial concludes with a case study, and an examination of the use of BGP communities by several ISPs.

Speakers
Philip Smith, Cisco Systems

Full Abstract

This session highlights new techologies for optical-based networks. The tutorial begins by examining how service providers have constructed their networks in the past in order to cope with the need for IP bandwidth. System equipment layers are discussed, and how they are now being collapsed into an emerging two-layer network. Future technology directions are then explored, including pure photonic routers. We then discuss how network architectures will look, along with their benefits. An in-depth look is taken at generalized MPLS (GMPLS), which allows the IP routing layer to share a common control plane with the optical transmission layer. The importance of this is explained and why it could be the basis for building IP service infrastructures of the future.

Speakers
Dan Lockwood, Juniper
Dan Lockwood joined Juniper Networks in September 1998 to build the company's Professional Services and Education division. He currently manages a group of consultants focused on helping customers plan, architect, and deploy next-generation IP and MPLS networks. Prior to coming to Juniper Networks, Lockwood was a principal consultant at Cascade Communications. Here, he was responsible for designing and deploying multi-service networks using MPLS-based IP Navigator, ATM, and Frame Relay. Lockwood holds a B.S. in Computer Science from Princeton University.

Full Abstract

The goal of this presentation will be to introduce NOBAD, the Network Oriented Basic Anomaly Detection Infrastructure. NOBAD, a volunteer effort, aims to provide a means of distributed network performance and anomaly measurements to quickly detect network problems. These could include line saturation or CPU spikes, which might be signs of denial of service attacks or technical problems. NOBAD consists of a number of sensors deployed throughout the network and a smaller number (where 'number' is an arbitrary amount from one to n) of so-called aggregators to collect data and react accordingly.

NOBAD is currently in use at a large network infrastructure provider and has been tested in governmental environments as well. Its distributed nature and the openness of its code and underlying mechanisms and protocols provide the needed vendor independence for homogenous networks. This presentation will focus on both technical background and possible use cases.

NOBAD, as a volunteer effort, is available as Open Source and can be used under the terms of the 'BSD Public License,' which permits inclusion in commercial products. A stable release is planned for the weekend prior to NANOG 23.

The technical background section of the talk will include details of sensor and aggregator implementation, and will address current problems with homogenous networks.

The use case presentation will cover current implementations, advantages of NOBAD compared to static log file analyzers such as swatch, and a view into the future of distributed anomaly detection.

Speakers
Jonas M. Luster, d-fensive.com
Dr. Jonas Luster is co-founder and CIO of d-fensive networks, Inc. a security consulting company foscusing on risk analysis and mitigation in large scale networks. He claims not to be a technical person, having graduated as a Criminologist and not in CS, but contributes to a few OpenSource projects as programmer and designer.

Full Abstract

This presentation describes a network service model for high-speed Metropolitan Area Network (MAN) service providers to deliver economical services between cities. It utilizes a distance-insensitive IP NSP as a WAN partner for inter-city services, simplifies MAN operation, and improves the scalability of a traditional standard overlay model by allowing the MAN provider to peer with the NSP for both Internet transit and inter-city MAN services (e.g., transparent LAN services.)

This network service model allows an NSP to offer hierarchical MPLS services to downstream providers, while providing scalability and automation for both the NSP and MAN provider. While this presentation refers to a solution for MAN providers, any downstream provider that needs hierarchical MPLS services from an NSP can use this service.

Speakers
Pascal Menezes, Terabeam
A seasoned IP veteran and network architect, Menezes has more than 16 years experience in next-generation information systems and communications architecture. As Terabeam's CTO of IP internetworking, Menezes designed and implemented one of the first production grade Gigabit Ethernet MANs in 1998 offering VoIP services. He is an early pioneer in packet-based QoS framework, layer 2 VPN MPLS services for MANs, and inter-city MPLS hierarchical services. He has designed and implemented many global, national, regional and metro IP networks.

Prior to his work at Terabeam, Menezes was Senior Internetworking Technologist at Packet Engines. Previous to Packet Engines, he worked as a consultant to Fortune 50 companies specializing in network and system integration. Menezes currently is the Vice President of the Metro Ethernet Forum (MEF), Co-Chair of the Protocol and Transport group at the MEF, and has authored and co-authored many IETF drafts on Ethernet MAN technologies, including Layer 2 MPLS services and Inter-MAN MPLS LSP services. He actively participates in IETF working groups, design teams, and MPLS Forum technical meetings.

Recordings
Full Abstract

This presentation considers whether service providers should roll out MPLS in their networks, and what questions they should ask in arriving at the answer. Kompella addresses commonly asked questions, such as "What's the benefit of using MPLS vs. ATM?", "MPLS vs. IP?" and "Are the benefits of MPLS worth rolling out new protocols?" He also suggests more fundamental questions that should be asked.

Speakers
Kireeti Kompella, Juniper
Kireeti Kompella is a Distinguished Engineer at Juniper Networks. His current interests are all aspects of Multi-Protocol Label Switching, including traffic engineering, generalized MPLS, and MPLS applications such as VPNs. Kompella is active at the IETF, where he is a co-chair of the CCAMP Working Group and the author of several Internet-Drafts in the areas of IS-IS, MPLS, OSPF, PPVPN and TE. Previously, he worked in the area of file systems at Network Appliance and SGI.

Kompella received his B.S. in EE and M.S. in C.S. at the Indian Institute of Technology, Kanpur; and his Ph.D. in C.S. at the University of Southern California.

Monday, October 22, 2001
Topic/Presenter
Full Abstract

Speakers
Moderator - Dave Ward, Cisco
Panelist - Ron da Silva, AOL Time-Warner
Panelist - Sean Doran, Ebone
Panelist - Ted Seely, Sprint

Full Abstract

Cisco Systems

Full Abstract

Now more than ever, Internet Service Providers are focusing on ways to increase the resiliency of their networks and, if at all possible, reduce their operating costs at the same time. Past research (Peering Decision Tree, presented at NANOG 19, and A Business Case for Peering) demonstrates the economic tradeoffs of peering and highlight the simple but challenging first step: How to know who to talk with at an ISP to get peering set up?

This Peering BOF focuses on this first step using "Peering Personals." We solicit Peering Coordinators (before the meeting), asking them to characterize their networks and peering policies in general ways ("content heavy" or "access (eyeball) -heavy," "Multiple Points Required" or "Will Peer anywhere," "Peering with Content OK," etc.). From the answers we will select a set of ISP Peering Coordinators to present a 2-3 minute description their network, what they look for in a peer, etc., allowing the audience to put a face with the name of the ISP. At the end of the Peering BOF, Peering Coordinators will have time to speak with Peering Coordinators of ISPs they seek to interconnect with. The expectation is that these interactions will lead to the Peering Negotiations stage, the first step towards a more fully meshed and therefore resilient Internet.

At the first NANOG Peering BOF I volunteered to maintain a Peering Contact Database (as an Excel Spreadsheet) that I e-mail out about every six weeks to participating Peering Coordinators. If you are a Peering Coordinator and would like to be listed in the PCD and get a copy of the PCD, send a note to [email protected] with Subject: PCD. I maintain this as a community service and is completely separate from my role at Equinix.

------

NOTES:

Date: Mon, 29 Oct 2001 10:03:33 -0800
From: William B. Norton
Subject: Peering BOF IV Meeting Notes

Hi all -

Here are my notes from the Peering BOF IV - NANOG 23.

We started at 7:30 PM Monday evening with the intention of pulling the
peering community together through introductions. We had about 20 Peering
Coordinators step up to the mike, introduce themselves, say a word or two
about their network, peering policy and what they are looking for in a peer
network. This allowed the audience to put a face to a name for
conversations afterwards. Another 10 that didn't pre-register for this
stepped up and chimed in as well. From about 8:30 til almost 10PM the
community stuck around to talk and I'm told that *dozens* of peering
sessions (Yahoo!, Akamai, Carrier1, SBC, etc.) will be set up as a result.
Highly successful NANOG for this segment of the population.

Several folks asked for a list of those who stood up to talk about their
peering policy, and here is what I have:

BBC Internet
Simon Lockhart
[email protected]

Digital Island
Mitchell Rose
[email protected]

DoubleClick
Alex Ng
[email protected]

TELUS
Clinton Work
[email protected]

France Telecom/Open Transit
Vincent Gillet
[email protected]

Globix
Steven J. Schecter
[email protected]

WINFirst
Hansel Lee
[email protected]

4CNet
Brian Court
[email protected]

Akamai
Rachel Warren
[email protected]

Patrick Gilmore
[email protected]

Hostcentric
Charlene Wang
[email protected]

Japan Telecom
Seiji Kuroda
[email protected]

Adelphia
Joe Klein
[email protected]

Earthlink
Jeb Linton/Josh Fleishman

Yahoo!
Jeffrey Papen
[email protected]

SBC
Ren Nowlin
[email protected]

Carrier1
Eric Troyer
[email protected]

ESNet
Joe Metzger
[email protected]

Velocita
Brian Dickson
[email protected]

I want to thank these folks for volunteering to share their info and hopefully this led to some sessions coming up.

Speaking of which, if Peering Coordinators would like to participate in the Peering Contact Database and receive a copy once a month or so of the Peering Contact Database, send e-mail to [email protected] and I'll return the template to fill out. So far we have about 150 Peering Coordinators listed.

Several suggestions were made for the next time:

- Include a "Peering Contracts Required" icon and

- "Make it easy for folks to step up later along with Icons" and

- "Include e-mail addresses"

We're going to try and factor in these suggestions for the Peering Personals at the next Gigabit Peering Forum which is held Dec 3rd in San Jose. If you are a Peering Coordinator and would like an invite to this let
me know.

For those who could not attend due to travel restrictions or whatever I'd be happy to e-mail the slides with the peering icons and ISP names etc.

Hope this helped -

Bill

Speakers
Bill Norton, Equinix

Full Abstract

Speakers
Wes Hardaker, NAI Labs

Full Abstract

Speakers
Susan Harris, Merit Network
Tom Herbst, Cisco Systems

Full Abstract

After the horrific attacks of September 11, Matrix.Net was asked by the Office of the President to track the effects on the Internet and to examine past records for any unusual incidents. Salus presents data, maps, and graphs for Internet performance on September 11 and during earlier disruptive events.

Speakers
Peter H. Salus, Matrix
Peter H. Salus is Chief Knowledge Officer of Matrix.Net in Austin, TX. He is the author of A Quarter Century of UNIX (1994), Casting the Net (1995), and several other books, and has conducted The Bookworm in ;login: for over a decade. Peter has written for and edited Matrix News since 1994.

Full Abstract

Using details gathered from both small and larage providers in New York, the rest of the USA, and overseas, Donelan discusses the events and aftermath of September 11 from an operators' point of view.

Speakers
Sean Donelan, Donelan.com

Full Abstract

On the morning of September 11, 2001, after the terrorist attacks in New York and Washington, many Internet users tried to get news and information over the Internet, only to be met with sluggish performance or unavailable websites. These problems were compounded for users in New York because of the general unavailability of terrestrial broadcasts after the structural failure of the World Trade Center. By contrast, multicasting, which was designed to deal with sudden audience spikes, did not suffer any known outages, and multicast video audiences increased to unprecedented levels. At Networld+Interop in Atlanta, which was ongoing at the time of the attacks, "the crowds around the one [multicast] display had grown so large as to constitute a fire hazard, [while] all the major news web sites had completely melted down."

The events of 9/11 show that multicasting is a robust, real-world product capable of performing well under difficult conditions. Multicasting is robust to increased traffic loads, both because it limits the bandwidth being consumed, and because the control traffic is robust under packet loss. This robustness will considerably increase with the adoption of Single Source Multicast (SSM), which significantly reduces the amount of required control traffic.

Multicasting is sensitive, of course, to degradation in the underlying Internet infrastructure. While this was not a problem on 9/11, it was a problem in the days afterwards, as data exchange facilities near the World Trade Center found it hard to stay in service. For the most part, any outages were sporadic and quickly routed around.

Multicast video was a major source of news on 9/11, with a video audience of 2000+ receivers, and undoubtedly a considerably larger number of viewers. The increased traffic lasted for much of the rest of the week. This shows that multicasting can be used to disseminate information under trying conditions, and that a critical mass of people is able to receive this information. Multicasting would thus seem to be an obvious adjunct to the existing Emergency Alert System (EAS).

This presentation will focus on the observed multicast traffic on and after the attacks on 9/11, how the multicast Internet behaved under stress, and what these observations imply about multicast security and robustness.

Speakers
Marshall Eubanks, Multicast Technologies
Marshall Eubanks, CTO at Multicast Technologies Inc., since its founding in 1999, develops multicast applications for broadcasting, content delivery, and one-to-many file transfer. He is also responsible for multicast monitoring at Multicast Technologies and in the effort to protect multicast against denial of service attacks.

Rich Mavrogeanes, Vbrick
Prashant Rajvaidya, UC Santa Barbara

Full Abstract

This talk highlights recent trends in denial of service attack technology from the perspective of CERT's analysis of the continued development, deployment, and use of denial of service attack tools by intruder communities.

The speaker has co-authored this paper on DOS attack trends.

Speakers
Kevin Houle, CERT

Full Abstract

Speakers
Barry Raveendran Greene, Cisco Systems

Full Abstract

This talk provides an overview of CAIDA's analyses of http://www.caida.org/research/security/code-red/" TARGET="_BLANK">Code Red and other recent worms

Speakers
David Moore, CAIDA.

Full Abstract

This presentation takes a real-world look at DoS attacks, concentrating on those launched in relation to Internet Relay Chat (IRC). We will cover the psychology of those who launch DoS attacks, the tools and methods they use, and our successes with tracking and prosecution of these individuals. Additionally, we will cover our tried-and-tested methods of observing, tracking, and defending against these attacks. Finally, we will focus on the effects of these attacks on nearby machines and network infrastructure.

Speakers
Karthik Arumugham, Global NAPs
Karthik Arumugham has been a Network Engineer at Global NAPs in Quincy, MA for one year, and has been with the company as a Systems Engineer and Software Developer for two years. He has several years of experience in Unix administration, system and network security, and software development.

Steven Schechter, Globix
Steven Schecter has been a Backbone Engineer at companies such as AboveNet Communications (MFNX), and now presently Globix Corporation in New York City. Previous to that he spent two years working as a Network Engineer and Systems Administrator for Net Access Corporation.

Jason Slagle, Toledo Internet Access
Jason Slagle has four years experience as Network Administrator at Toledo Internet Access in Toledo, OH. Currently holding his CCNP/CCDP certifications, he is seeking his CCIE and Cisco specialization in security.

Full Abstract

Network engineers have been known to use diversion to blackhole DDoS attacks. This technique may divert and blackhole legitimate traffic. We present a method that provides availability under DDoS attacks by combining different diversion methods with a mechanism that sieves the "bad" packets and forwards the "good" packets to the intended victim. The method minimizes demand on router resources and does not introduce additional elements on the normal data path.

The diversion method allows a sieving mechanism to process only the victims' traffic. The system is employable on a provider's backbone, preferably at the peering points. Furthermore, since diversion is done on demand for different targets at different periods of time, the solution can be shared by a large number of potential victims and can protect any element in the provider's backbone. This method can also be applied on egress traffic, thus enabling a service provider to clean attack traffic generated within its own network. Various alternative methods of transparently diverting a victim's traffic and returning its legitimate traffic will be presented.

Speakers
Yehuda Afek, Tel-Aviv Univ. & WANWall
Yehuda Afek is a Professor in the School of Computer Science at Tel-Aviv University, and the CTO of WANWall Inc. Currently his research focuses on efficient forwarding and routing algorithms for IP networks, and methods for traffic engineering to stop DDoS attacks. Prior to joining Tel-Aviv University in 1989 he spent four years in AT&T Bell Laboratories. He received his M.Sc. and Ph.D. in Computer Science from UCLA in 1985 and 1983, respectively.

Anat Bremler-Barr, Tel-Aviv Univ. & WANWall
Hank Nussbacher, WANWall
Danny Touitou, WANWall

Full Abstract

In this talk, we explore the degree to which commercial strategies, peering disputes, network failures, misconfiguration, and occasionally, malicious intent, lead to a partitioning of Internet topology. Specifically, we present a three-year study of the differences in Internet provider reachability. We focus on "dark address space," or the range of topology accessible from one provider, but unreachable via one or more competitor networks. We present active and passive measurements of these differences on time scales ranging from several seconds to multiple months.

Speakers
Abha Ahuja, Merit Network/Arbor Networks
Craig Labovitz, Merit Network/Arbor Networks
Presented by Rob Malan, Arbor Networks

Full Abstract

This talk will present our measurement and analysis of multiple origin AS (MOAS) conflicts in observed BGP updates, as well as a proposal for use of a community attribute and DNS to decrease risk in cases where MOAS conflicts may cause significant Internet routing disruption. Examples of such disruption include the AS8584 case in April 1998, and the instabilities generated by C&W peering changes in June of this year.

Seen in BGP routing table views, MOAS conflict is the case where a particular prefix originates from more than one AS. Using BGP routing tables from multiple views over 1279 continuous days, we analyzed total numbers of MOAS conflicts, duration of the conflicts, and relation to prefix length. We also classified the conflicts by the congruence of the multiple AS paths and analyzed the potential causes for the conflicts. These include intended uses to meet legitimate operational needs (multi-homing without BGP, private AS number substitution at egress, exchange points, anycast practices) and faults.

Both the total numbers of MOAS conflicts and the distribution of conflict duration suggest that MOAS due to faults represents a significant operational concern, even with the filtering lessons learned from AS8454 and similar events before and after. When a MOAS conflict occurs, we would like to enable routers to distinguish intended MOAS cases from route flapping or blackholing. Proposed solutions so far include the use of DNS (Bates/Bush1998) and uses of routing registries, including full-blown certifications (SBGP). In this talk we propose a much simpler and incrementally deployable approach using a new community attribute and DNS, which can provide adequate protection against faults from MOAS conflicts.

Speakers
Allison Mankin, USC/ISI
Dan Massey, USC/ISI
Dan Pei, UCLA
Lan Wang, UCLA
S. Felix Wu, UC Davis
Lixia Zhang, UCLA
Xiaoliang Zhao, NCSU

Full Abstract

While it is well-known that BGP is vulnerable to simple, accidental misconfigurations that can cause widespread loss of connectivity, most of the evidence is anecdotal. Routing configuration errors have received less attention than more popular threats to connectivity, such as denial-of-service, and CAIDA's BGP analyses and Merit's IPMA project provide some of the only data available.

We present initial results of a new study of BGP configuration errors based on publicly available routing table snapshots and looking glasses. We quantify the kind and extent of configuration errors, as well as their impact on backbone connectivity. In this talk, we focus on announcements with incorrect origin AS and partial connectivity.

We find that there are a significant number of questionable routing announcements, but the majority of these have only a slight impact on connectivity. Of the roughly 2% of the prefixes per day that are not announced with consistent origins, O(100) prefixes are subject to AS-path stripping and potential address space hijacks, while the other fluctuations are more benign. We also analyze partially connected address space (that is reachable only from some parts of the Internet) to expose route filtering and damping practices that are limiting connectivity. We find that 1-2% of the address space exists in a persistently partially reachable state at any given time.

Speakers
Tom Anderson, University of Washington
Ratul Mahajan, University of Washington
David Wetherall, University of Washington

Full Abstract

We analyze the BGP messages collected by the RIPE-NCC Routing Information Service. The data has been collected for about two years. It is much richer than the daily snapshots often used in analysis and helps us address more detailed questions than simply table size growth. For example, we can show the effectiveness of CIDR aggregation, or account for multi-homing and inter-domain traffic engineering more accurately.

In short, we find that the routing table size growth is not exponential, CIDR is doing very well, and churn is decreasing. Most of the churn is due to the loss and re-establishment of BGP peerings, as well as policy misconfigurations (leaking routes, etc).

Speakers
Cengiz Alaettinoglu, Packet Design
Cengiz Alaettinoglu is a member of the Technical Staff at Packet Design. His current work includes analysis of and enhancements to BGP and IGP scaling and convergence properties. He was previously at the USC Information Sciences Institute, where he worked on the Routing Arbiter project. Cengiz co-defined the Routing Policy Specification Language along with the protocols to enable a distributed, secure routing policy system.

Full Abstract

Service providers have expressed a need for a simple, standard method of building tools for network management and provisioning. The Extensible Markup Language (XML) provides a straighforward means by which these needs can be met. Using standard tools, XML can be easily parsed, stored, retrieved, debugged, and documented. XML's ASCII encoding lends itself well to scripting and provisioning (it's easy to write, and easy to debug), and its ability to provide forward and backward compatibility makes it a robust choice for building network management tools.

This talk will include a very brief introduction to XML, a description of areas of network management to which XML is applicable, and examples of using XML and XML-based tools to wrangle operational and configuration data from a network.

Speakers
Rob Enns, Juniper
Rob Enns works on user interface and network management software at Juniper Networks. Prior to Juniper Rob worked at Berkeley Networks and FORE Systems.

Tuesday, October 23, 2001
Topic/Presenter
Full Abstract

The security of a network infrastructure, particularly an extensive one, relies on the proper management of the network address space, routes, and external connections. If network managers don't know what they have, how it's connected, and what else it's connected to, they can't know if it is secure. The Internet Mapping Project, started by Bill Cheswick at Bell Labs, has been collecting intriguing topological information about the Internet since August of 1998. In the last year, this technology has been applied to large corporate intranets and ISPs with equally illuminating results.

The presentation introduces the analysis and interpretation of such maps and what can be determined from such analysis. The larger the network, the more useful we find this analysis to be for identifying single points of failure, address squatting (the use of another organization's address space within one's own network), legacy connections to divested networks or former business partners, and outright security violations. Real-world anonymized examples will be part of the presentation.

Speakers
Karl Siil, Lumeta
Karl Siil, Director of Professional Services at Lumeta Corporation, has been working in network and system security for the past 20 years. Prior to Lumeta, Mr. Siil spent over 10 years at AT&T Bell Labs developing secure operating systems and networks for commercial and government clients, and three more years running the security practices of various global consulting companies.

Recordings
Full Abstract

Speakers
Jeffrey Papen, Yahoo

Recordings
Full Abstract

Speakers
Susan Harris, Merit Network

Full Abstract

The use of the whois protocol to provide a look-up service for Internet infrastructure information is showing its age. Operators are experiencing increased demands for information through the whois service. From the needs of privacy, law enforcement, intellectual property rights, and referrals, new demands are being asked of this service. VeriSign is in the process of gathering requirements from the various whois user communities. Mark will present the process through which VeriSign is gathering these requirements, and the generalities of what is currently known about them.

In addition, VeriSign has been working on efforts to shift this look-up service away from whois to other, more capable protocols. Andrew will present VeriSign's two projects looking at replacing this service with a protocol other than whois: 1) VeriSign is piloting a project to replace whois with LDAP, and 2) a proposed XML-based directory protocol that mirrors much of the effort going into EPP (Extensible Provisioning Protocol).

Speakers
Mark Kosters, VeriSign Applied Research
Andrew Newton, VeriSign Applied Research

Full Abstract

Speakers
Bill Woodcock, Packet Clearing House

Full Abstract

Speakers
Bill Woodcock, Packet Clearing House

Full Abstract

Speakers
Moderator - Dave Meyer, Sprint
Panelist - Randy Bush
Panelist - Bill Woodcock, Packet Clearing House

Full Abstract

This discussion will include a ten-minute overview of the ARIN policy evaluation process that identifies the current issues being evaluated. The remaining time will be left open for meeting attendees to ask questions and provide feedback on any issue related to ARIN procedures or policies.

Speakers
Richard Jimmerson, ARIN

Full Abstract

We will present our analysis of the surprisingly strong impact of recent Microsoft worms (such as Code Red II and Nimda) on the stability of the global routing system. Analysis of the on-line BGP message archives from the RIPE-NCC Routing Information Service, and of the worm scanning and infection spread datasets shows strong correlations between worm propagation periods and very long-lasting BGP "update storms."

We will also discuss preliminary results concerning the populations of unstable routes, unreachable networks, and the mechanisms by which the worm traffic may be destabilizing the BGP routing system.

See:

http://www.renesys.com/tech/presentations/">http://www.renesys.com/tech/presentations/

Speakers
Jim Cowie, Renesys Corporation
Andy Ogielski, Renesys Corporation