Skip to main content

Periscope: Unifying Looking Glass Querying

  • Conference paper
  • First Online:
Passive and Active Measurement (PAM 2016)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 9631))

Included in the following conference series:

Abstract

Looking glasses (LG) servers enhance our visibility into Internet connectivity and performance by offering a set of distributed vantage points that allow both data plane and control plane measurements. However, the lack of input and output standardization and limitations in querying frequency have hindered the development of automated measurement tools that would allow systematic use of LGs. In this paper we introduce Periscope, a publicly-accessible overlay that unifies LGs into a single platform and automates the discovery and use of LG capabilities. The system architecture combines crowd-sourced and cloud-hosted querying mechanisms to automate and scale the available querying resources. Periscope can handle large bursts of requests, with an intelligent controller coordinating multiple concurrent user queries without violating the various LG querying rate limitations. As of December 2015 Periscope has automatically extracted 1,691 LG nodes in 297 Autonomous Systems. We show that Periscope significantly extends our view of Internet topology obtained through RIPE Atlas and CAIDA’s Ark, while the combination of traceroute and BGP measurements allows more sophisticated measurement studies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    A user requests access through email describing the intended use and we issue a unique security token which he/she uses to sign measurement requests.

  2. 2.

    Although most requests can be satisfied with simple HTTP requests, Selenium allows easier handling of HTTP sessions and cookies.

  3. 3.

    We derived empirically conservative values for the timeout and number of slots for each LG.

References

  1. CAIDA Archipelago (Ark). http://www.caida.org/projects/ark/

  2. Kewlio Looking Glass. http://sourceforge.net/projects/klg/

  3. Multi-Router Looking Glass. http://mrlg.op-sec.us/

  4. Netacuity. http://www.digitalelement.com/solutions/

  5. PeeringDB. http://www.peeringdb.com

  6. RANCID Loooking Glass. http://www.shrubbery.net/rancid/

  7. RIPE Atlas. https://atlas.ripe.net/

  8. RIPE Atlas rate limits. https://atlas.ripe.net/docs/udm/#rate-limits

  9. Selenium browser automation suite. http://www.seleniumhq.org/

  10. Stripes Looking Glass. https://www.gw.com/sw/stripes/

  11. Telephone Looking Glass. https://github.com/telephone/LookingGlass

  12. Version6 Loooking Glass. https://github.com/Cougar/lg

  13. Vyatta. https://github.com/MerijntjeTak/vyattaLookingGlass

  14. Achlioptas, D., Clauset, A., Kempe, D., Moore, C.: On the bias of traceroute sampling: or, power-law degree distributions in regular graphs. In: STOC (2005)

    Google Scholar 

  15. Augustin, B., Krishnamurthy, B., Willinger, W.: IXPs: mapped?. In: IMC 2009 (2009)

    Google Scholar 

  16. Bruno, L., Graziano, M., Balzarotti, D., Francillon, A.: Through the looking-glass, and what eve found there. In: WOOT (2014)

    Google Scholar 

  17. Cohen, R., Raz, D.: The internet dark matter - on the missing links in the AS connectivity map. In: IEEE INFOCOM 2006, April 2006

    Google Scholar 

  18. Donnet, B., Bonaventure, O.: On BGP communities. SIGCOMM Comput. Commun. Rev. 38(2), 55–59 (2008)

    Article  Google Scholar 

  19. Giotsas, V., Zhou, S., Luckie, M., Claffy, K.: Inferring multilateral peering. In: CoNEXT 2013 (2013)

    Google Scholar 

  20. He, Y., Siganos, G., Faloutsos, M., Krishnamurthy, S.: Lord of the links: a framework for discovering missing links in the internet topology. IEEE/ACM Trans. Network. 17(2), 391–404 (2009)

    Article  Google Scholar 

  21. Huffaker, B., Fomenkov, M., Claffy, K.: DRoP: DNS-based router positioning. SIGCOMM Comput. Commun. Rev. 44(3), 5–13 (2014)

    Article  Google Scholar 

  22. Huffaker, B., Dhamdhere, A., Fomenkov, M., Claffy, K.: Toward topology dualism: improving the accuracy of AS annotations for routers. In: Krishnamurthy, A., Plattner, B. (eds.) PAM 2010. LNCS, vol. 6032, pp. 101–110. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  23. Khan, A., Kwon, T., Kim, H.c., Choi, Y.: AS-level topology collection through looking glass servers. In: IMC 2013 (2013)

    Google Scholar 

  24. Luckie, M., Huffaker, B., Claffy, K., Dhamdhere, A., Giotsas, V.: AS relationships, customer cones, and validation. In: ACM IMC 2013 (2013)

    Google Scholar 

  25. Madhyastha, H.V., Isdal, T., Piatek, M., Dixon, C., Anderson, T., Krishnamurthy, A., Venkataramani, A.: iPlane: an information plane for distributed services. In: USENIX NSDI 2006 (2016)

    Google Scholar 

  26. Mao, Z.M., Rexford, J., Wang, J., Katz, R.H.: Towards an accurate AS-level traceroute tool. In: ACM SIGCOMM 2003 (2003)

    Google Scholar 

  27. Sánchez, M.A., Otto, J.S., Bischof, Z.S., Choffnes, D.R., Bustamante, F.E., Krishnamurthy, B., Willinger, W.: Dasu: pushing experiments to the internet’s edge. In: USENIX NSDI 2013, April 2013

    Google Scholar 

  28. Shavitt, Y., Shir, E.: DIMES: let the internet measure itself. SIGCOMM Comput. Commun. Rev. 35(5), 71–74 (2005)

    Article  Google Scholar 

  29. Shi, X., Xiang, Y., Wang, Z., Yin, X., Wu, J.: Detecting prefix hijackings in the internet with argus. In: IMC 2012 (2012)

    Google Scholar 

  30. Zhang, B., Liu, R., Massey, D., Zhang, L.: Collecting the internet AS-level topology. ACM SIGCOMM CCR 35(1), 53–61 (2005)

    Article  Google Scholar 

Download references

Acknowledgements

The work was funded by the DHS Science and Technology Directorate, Cyber Security Division (DHS S&T/CSD) BAA 11-02 and SPAWAR Systems Center Pacific via contract N66001-12-C-0130, and by Defence R&D Canada (DRDC) pursuant to an Agreement between the U.S. and Canadian governments for Cooperation in Science and Technology for Critical Infrastructure Protection and Border Security. The work represents the position of the authors and not necessarily that of DHS or DRDC.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vasileios Giotsas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Giotsas, V., Dhamdhere, A., Claffy, K.C. (2016). Periscope: Unifying Looking Glass Querying. In: Karagiannis, T., Dimitropoulos, X. (eds) Passive and Active Measurement. PAM 2016. Lecture Notes in Computer Science(), vol 9631. Springer, Cham. https://doi.org/10.1007/978-3-319-30505-9_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-30505-9_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-30504-2

  • Online ISBN: 978-3-319-30505-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics