|
|
Classifying multiclass relationships between ASes using graph convolutional network |
Songtao PENG1, Xincheng SHU2, Zhongyuan RUAN1( ), Zegang HUANG1, Qi XUAN1 |
1. Institute of Cyberspace Security, College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China 2. Institute of Cyberspace Security, College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China; Department of Electrical Engineering, City University of Hong Kong, Hong Kong, China |
|
|
Abstract Precisely understanding the business relationships between autonomous systems (ASes) is essential for studying the Internet structure. To date, many inference algorithms, which mainly focus on peer-to-peer (P2P) and provider-to-customer (P2C) binary classification, have been proposed to classify the AS relationships and have achieved excellent results. However, business-based sibling relationships and structure-based exchange relationships have become an increasingly nonnegligible part of the Internet market in recent years. Existing algorithms are often difficult to infer due to the high similarity of these relationships to P2P or P2C relationships. In this study, we focus on multiclassification of AS relationship for the first time. We first summarize the differences between AS relationships under the structural and attribute features, and the reasons why multiclass relationships are difficult to be inferred. We then introduce new features and propose a graph convolutional network (GCN) framework, AS-GCN, to solve this multiclassification problem under complex scenes. The proposed framework considers the global network structure and local link features concurrently. Experiments on real Internet topological data validate the effectiveness of our method, that is, AS-GCN. The proposed method achieves comparable results on the binary classification task and outperforms a series of baselines on the more difficult multiclassification task, with an overall metrics above 95%.
|
Keywords
autonomous system
multiclass relationship
graph convolutional network
classification algorithm
Internet topology
|
Corresponding Author(s):
Zhongyuan RUAN
|
Just Accepted Date: 20 September 2022
Online First Date: 02 November 2022
Issue Date: 08 December 2022
|
|
1 |
M ApostolakiG MartiJ MüllerL Vanbever (2018). SABRE: Protecting Bitcoin against routing attacks. arXiv preprint. arXiv:1808.06254
|
2 |
S Arber, J J Hunter, J Ross Jr, M Hongo, G Sansig, J Borg, J C Perriard, K R Chien, P Caroni, (1997). MLP-deficient mice exhibit a disruption of cardiac cytoarchitectural organization, dilated cardiomyopathy, and heart failure. Cell, 88( 3): 393–403
https://doi.org/10.1016/S0092-8674(00)81878-4
pmid: 9039266
|
3 |
T BöttgerG AntichiE L FernandesLallo R diM BruyereS UhligI Castro (2018). The elusive Internet flattening: 10 years of IXP growth. arXiv preprint. arXiv:1810.10963
|
4 |
L Breiman, (2001). Random forests. Machine Learning, 45( 1): 5–32
https://doi.org/10.1023/A:1010933404324
|
5 |
S H B Brito, M A S Santos, R dos Reis Fontes, D A L Perez, H D L da Silva, C R E Rothenberg, (2016). An analysis of the largest national ecosystem of public Internet exchange points: The case of Brazil. Journal of Communication and Information Systems, 31( 1): 256–271
https://doi.org/10.14209/jcis.2016.23
|
6 |
S Carmi, S Havlin, S Kirkpatrick, Y Shavitt, E Shir, (2007). A model of Internet topology using k-shell decomposition. Proceedings of the National Academy of Sciences of the United States of America, 104( 27): 11150–11154
https://doi.org/10.1073/pnas.0701175104
pmid: 17586683
|
7 |
I Castro, J C Cardona, S Gorinsky, P Francois, (2014). Remote peering: More peering without Internet flattening. In: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies. Sydney: Association for Computing Machinery, 185–198
|
8 |
T ChenC (2016) Guestrin. XGBoost: A scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. San Francisco, CA: Association for Computing Machinery, 785–794
|
9 |
S Cho, R Fontugne, K Cho, A Dainotti, P Gill, (2019). BGP hijacking classification. In: Network Traffic Measurement and Analysis Conference (TMA). Paris: IEEE, 25–32
|
10 |
A Cohen, Y Gilad, A Herzberg, M Schapira, (2016). Jumpstarting BGP security with path-end validation. In: Proceedings of the ACM SIGCOMM Conference. Florianopolis: Association for Computing Machinery, 342–355
|
11 |
C Cortes, V Vapnik, (1995). Support-vector networks. Machine Learning, 20( 3): 273–297
https://doi.org/10.1007/BF00994018
|
12 |
A Dhamdhere, D D Clark, A Gamero-Garrido, M Luckie, R K P Mok, G Akiwate, K Gogia, V Bajpai, A C Snoeren, K Claffy, (2018). Inferring persistent interdomain congestion. In: Proceedings of the Conference of the ACM Special Interest Group on Data Communication. Budapest: Association for Computing Machinery, 1–15
|
13 |
Battista G DiM PatrignaniM (2003) Pizzonia. Computing the types of the relationships between autonomous systems. In: IEEE INFOCOM. 22nd Annual Joint Conference of the IEEE Computer and Communications Societies. San Francisco, CA: IEEE, 156–165
|
14 |
X Dimitropoulos, D Krioukov, M Fomenkov, B Huffaker, Y Hyun, K C Claffy, G Riley, (2007). AS relationships: Inference and validation. Computer Communication Review, 37( 1): 29–40
https://doi.org/10.1145/1198255.1198259
|
15 |
J Friedman, T Hastie, R Tibshirani, (2000). Additive logistic regression: A statistical view of boosting (with discussion and a rejoinder by the authors). Annals of Statistics, 28( 2): 337–407
https://doi.org/10.1214/aos/1016218223
|
16 |
L Gao, (2001). On inferring autonomous system relationships in the Internet. IEEE/ACM Transactions on Networking, 9( 6): 733–745
https://doi.org/10.1109/90.974527
|
17 |
P GillM ArlittZ LiA (2008) Mahanti. The flattening Internet topology: Natural evolution, unsightly barnacles or contrived collapse? In: International Conference on Passive and Active Network Measurement. Cleveland, OH: Springer, 1–10
|
18 |
P Gill, M Schapira, S Goldberg, (2011). Let the market drive deployment: A strategy for transitioning to BGP security. Computer Communication Review, 41( 4): 14–25
https://doi.org/10.1145/2043164.2018439
|
19 |
V GiotsasM LuckieB HuffakerK (2014) Claffy. Inferring complex AS relationships. In: Proceedings of the Conference on Internet Measurement Conference. Vancouver, BC: Association for Computing Machinery, 23–30
|
20 |
V GiotsasS (2012) Zhou. Valley-free violation in Internet routing: Analysis based on BGP community data. In: IEEE International Conference on Communications (ICC). Ottawa, ON: IEEE, 1193–1197
|
21 |
E Gregori, A Improta, L Lenzini, L Rossi, L Sani, (2011). BGP and inter-AS economic relationships. In: International Conference on Research in Networking. Valencia: Springer, 54–67
|
22 |
Y JinC ScottA DhamdhereV GiotsasA KrishnamurthyS (2019) Shenker. Stable and practical AS relationship inference with ProbLink. In: Proceedings of the 16th USENIX Conference on Networked Systems Design and Implementation. Boston, MA: USENIX Association, 581–597
|
23 |
Z JinX ShiY YangX YinZ WangJ (2020) Wu. TopoScope: Recover AS relationships from fragmentary observations. In: Proceedings of the ACM Internet Measurement Conference. New York, NY: Association for Computing Machinery, 266–280
|
24 |
J Karlin, S Forrest, J Rexford, (2008). Autonomous security for autonomous systems. Computer Networks, 52( 15): 2908–2923
https://doi.org/10.1016/j.comnet.2008.06.012
|
25 |
E Katz-BassettD R ChoffnesÍ CunhaC ScottT AndersonA (2011) Krishnamurthy. Machiavellian routing: Improving Internet availability with BGP poisoning. In: Proceedings of the 10th ACM Workshop on Hot Topics in Networks. Cambridge, MA: Association for Computing Machinery, 1–6
|
26 |
G KeQ MengT FinleyT WangW ChenW MaQ YeT Y (2017) Liu. LightGBM: A highly efficient gradient boosting decision tree. In: Proceedings of the 31st International Conference on Neural Information Processing Systems. Long Beach, CA: Curran Associates Inc., 3149–3157
|
27 |
D P KingmaJ Ba (2014). Adam: A method for stochastic optimization. arXiv preprint. arXiv:1412.6980
|
28 |
T N KipfM Welling (2016). Semi-supervised classification with graph convolutional networks. arXiv preprint. arXiv:1609.02907
|
29 |
C Labovitz, S Iekel-Johnson, D McPherson, J Oberheide, F Jahanian, (2010). Internet inter-domain traffic. Computer Communication Review, 40( 4): 75–86
https://doi.org/10.1145/1851275.1851194
|
30 |
M Luckie, B Huffaker, A Dhamdhere, V Giotsas, K Claffy, (2013). AS relationships, customer cones, and validation. In: Proceedings of the Conference on Internet Measurement Conference. Barcelona: Association for Computing Machinery, 243–256
|
31 |
R Motamedi, R Rejaie, W Willinger, (2015). A survey of techniques for Internet topology discovery. IEEE Communications Surveys and Tutorials, 17( 2): 1044–1065
https://doi.org/10.1109/COMST.2014.2376520
|
32 |
C OrsiniA KingD GiordanoV GiotsasA (2016) Dainotti. BGPStream: A software framework for live and historical BGP data analysis. In: Proceedings of the Internet Measurement Conference. Santa Monica, CA: Association for Computing Machinery, 429–444
|
33 |
A PaszkeS GrossS ChintalaG ChananE YangZ DeVitoZ LinA DesmaisonL AntigaA (2017) Lerer. Automatic differentiation in PyTorch. In: Proceedings of the 31st International Conference on Neural Information Processing Systems. Long Beach, CA: Curran Associates Inc., 1–4
|
34 |
L E Peterson, (2009). K-nearest neighbor. Scholarpedia, 4( 2): 1883
https://doi.org/10.4249/scholarpedia.1883
|
35 |
S Y Qiu, P D McDaniel, F Monrose, (2007). Toward valley-free inter-domain routing. In: IEEE International Conference on Communications. Glasgow: IEEE, 2009–2016
|
36 |
T Shapira, Y Shavitt, (2020). Unveiling the type of relationship between autonomous systems using deep learning. In: IEEE/IFIP Network Operations and Management Symposium. Budapest: IEEE, 1–6
|
37 |
J M SmithM (2018) Schuchard. Routing around congestion: Defeating DDoS attacks and adverse network conditions via reactive BGP routing. In: IEEE Symposium on Security and Privacy (SP). San Francisco, CA: IEEE, 599–617
|
38 |
J Susan VargheseL Ruan (2015). A machine learning approach to edge type prediction in Internet AS graphs. Online Paper
|
39 |
S Sundaresan, X Deng, Y Feng, D Lee, A Dhamdhere, (2017). Challenges in inferring Internet congestion using throughput measurements. In: Proceedings of the Internet Measurement Conference. London: Association for Computing Machinery, 43–56
|
40 |
M E Tozal, (2018). Policy-preferred paths in AS-level Internet topology graphs. Theory and Applications of Graphs, 5( 1): 3
https://doi.org/10.20429/tag.2018.050103
|
41 |
L van der Maaten, G Hinton, (2008). Visualizing data using t-SNE. Journal of Machine Learning Research, 9( 86): 2579–2605
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|