The BGP injector (based on Net::BGP) allows to setup BGP sessions and to inject and withdraw BGP routes. At this time, however, such porting would be by specific customer request and agreement. Principally BENTO requires little else than a POSIX compatible system, and should port easily to other systems. Operating System: Currently BENTO is available for Linux/Intel architectures, and a BSD port is planned. BENTO enables you to see how much traffic you could exchange with the networks present at that exchange.
A typical situation would be that you're wondering if it might be worthwhile connecting directly to another exchange. For network planning, BENTO allows you to explore the entire AS spectrum beyond peers and transit providers, and identify interesting hot spots and networks elsewhere. In a real time operational situation, it is easy to configure the BENTO interface to eg pick up and highlight large amounts of ICMP traffic, which would indicate a malfunction or DoS attack. BENTO lends itself equally well to both real time monitoring of active traffic and to longer term planning for network optimisation. In effect, you can see beyond the border routers of your network, and identify how much traffic you exchange with other networks both near and far away. Rather than producing graphs of traffic based on router interfaces in your network, BENTO produces graphs of traffic based on AS information. Operating System: Unix/Linux/POSIX.īENTO: BGP-Enabled Network Traffic Organizer by Network SignatureīENTO allows you to explore your traffic based on Autonomous System and BGP path information. It removes any supplied prefixes which are supurfluous because they are already included in another supplied prefix (e.g., 203.97.2.0/24 would be removed if 203.97.0.0/17 was also supplied), and identifies adjacent prefixes that can be combined under a single, shorter-length prefix (e.g., 203.97.2.0/24 and 203.97.3.0/24 can be combined into the single prefix 203.97.2.0/23). Online, web-based tool.Īggregate takes a list of prefixes in conventional format on stdin, and performs two optimisations to reduce the length of the prefix list. This algorithm is rooted in economic AS relationships, ranking each AS as a function of the number of IP prefixes advertised by this AS, its customer ASes, their customers ASs, and so on. Ranking relies upon AS relationship information that is discovered using a new inference algorithms. This CGI script presents CAIDA's ranking of Autonomous Systems (AS) based on the size of their customer cone as observed from the largest publicly available interdomain routing data set. Please send additions and updates to thanks!ĪS Ranking by Cooperative Association for Internet Data Analysis (CAIDA) Wireless LAN (802.11) Security and WardrivingĬomputer Forensics and Cybercrime Resources
Intrusion Detection, Honeypots & Incident Response Securing the Domain Name System with DNSSECīorder Gateway Protocol and Advanced Routing BGP Tools, BGP Software, BGP Utilities (BGP, Border Gateway Protocol / Advanced Internet Routing)