{"id":179,"date":"2011-06-14T15:23:57","date_gmt":"2011-06-14T22:23:57","guid":{"rendered":"http:\/\/ant.isi.edu\/blog\/?p=179"},"modified":"2020-10-19T10:29:37","modified_gmt":"2020-10-19T17:29:37","slug":"new-tech-report-identifying-and-characterizing-anycast-in-the-domain-name-system","status":"publish","type":"post","link":"https:\/\/ant.isi.edu\/blog\/?p=179","title":{"rendered":"New tech report \u201cIdentifying and Characterizing Anycast in the Domain Name System\u201d"},"content":{"rendered":"<div>\n<p>We just published a new technical report &#8220;Identifying and Characterizing Anycast in the Domain Name System&#8221; (available at <a href=\"ftp:\/\/ftp.isi.edu\/isi-pubs\/tr-671.pdf\"> ftp:\/\/ftp.isi.edu\/isi-pubs\/tr-671.pdf<\/a>) .<\/p>\n<\/div>\n<div>\n<div>\n<p>From the abstract:<\/p>\n<blockquote><p>Since its first appearance, IP anycast has become essential<br \/>\nfor critical network services such as the Domain Name Sys-<br \/>\ntem (DNS). Despite this, there has been little attention to<br \/>\nindependently identifying and characterizing anycast nodes.<br \/>\nExternal evaluation of anycast allows both third-party audit-<br \/>\ning of its benefits, and is essential to discovering benign mas-<br \/>\nquerading or hostile hijacking of anycast services. In this<br \/>\npaper, we develop ACE, an approach to identify and charac-<br \/>\nterize anycast nodes. ACE first method is DNS queries for<br \/>\nCHAOS records, the recommended debugging service for<br \/>\nanycast, suitable for cooperative anycast services. Its second<br \/>\nmethod uses traceroute to identify all anycast services by<br \/>\ntheir connectivity to the Internet. Each individual method<br \/>\nhas ambiguities in some circumstances; we show a com-<br \/>\nbined method improves on both. We validate ACE against<br \/>\ntwo widely used anycast DNS services that provide ground<br \/>\ntruth. ACE has good precision, with 88% of its results corre-<br \/>\nsponding to unique anycast nodes of the F-root DNS service.<br \/>\nIts recall is affected by the number and diversity of vantage<br \/>\npoints. We use ACE for an initial study of how anycast is<br \/>\nused for top-level domain servers. We find one case where<br \/>\na third-party server operates on root-DNS IP address, mas-<br \/>\nquerades to capture traffic for its organization. We also study<br \/>\nthe 1164 nameserver IP addresses used by all generic and<br \/>\ncountry-code top-level domains in April 2011. This study<br \/>\nshows evidence that at least 14% and perhaps 32% use any-<br \/>\ncast.<\/p><\/blockquote>\n<p>Citation: Xun Fan, John Heidemann and Ramesh Govindan. Identifying and Characterizing Anycast in the Domain Name System. Technical Report N. ISI-TR-671, USC\/Information Sciences Institute, June, 2011. ftp:\/\/ftp.isi.edu\/isi-pubs\/tr-671.pdf<\/p>\n<p>Data from this paper will be available from PREDICT through the LANDER project; contact the authors for details.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>We just published a new technical report &#8220;Identifying and Characterizing Anycast in the Domain Name System&#8221; (available at ftp:\/\/ftp.isi.edu\/isi-pubs\/tr-671.pdf) . From the abstract: Since its first appearance, IP anycast has become essential for critical network services such as the Domain Name Sys- tem (DNS). Despite this, there has been little attention to independently identifying and [&hellip;]<\/p>\n","protected":false},"author":34,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[282,283],"tags":[27,43,8,22,5,41,18,26],"class_list":["post-179","post","type-post","status-publish","format-standard","hentry","category-publications","category-technical-report","tag-amite","tag-anycast","tag-lander","tag-measurement-systems","tag-papers","tag-predict","tag-security","tag-tech-report"],"_links":{"self":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=179"}],"version-history":[{"count":10,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/179\/revisions"}],"predecessor-version":[{"id":1656,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/179\/revisions\/1656"}],"wp:attachment":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}