Internet DRAFT - draft-rly-savnet-inter-domain-as-relationships

draft-rly-savnet-inter-domain-as-relationships







Internet Engineering Task Force                                   G. Ren
Internet-Draft                                                    S. Liu
Intended status: Standards Track                                  X. Yin
Expires: 25 April 2024                               Tsinghua University
                                                         23 October 2023


    Inter-domain Source Address Validation based on AS relationships
           draft-rly-savnet-inter-domain-as-relationships-01

Abstract

   This draft introduces an inter-domain source address validation
   scheme based on relationships between interconnected ASes.  This
   scheme is mainly described from four aspects, namely the research
   background in fields of source address validation and AS
   relationships, introduction to the classification and acquisition
   methods of AS relationships, the specific architecture of our inter-
   domain source address validation system based on AS relationships,
   and the considerations on deployability.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 25 April 2024.

Copyright Notice

   Copyright (c) 2023 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components



Ren, et al.               Expires 25 April 2024                 [Page 1]

Internet-Draft              Inter-domain SAV                October 2023


   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Background  . . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Introduction to AS Relationships  . . . . . . . . . . . . . .   5
     2.1.  Major AS relationships  . . . . . . . . . . . . . . . . .   5
     2.2.  Incidental AS Relationships . . . . . . . . . . . . . . .   6
     2.3.  AS relationship acquisition methods . . . . . . . . . . .   7
       2.3.1.  Inference Algorithms  . . . . . . . . . . . . . . . .   8
       2.3.2.  Querying approach . . . . . . . . . . . . . . . . . .   9
   3.  Architecture of Source Address Validation System  . . . . . .   9
     3.1.  Static Architecture . . . . . . . . . . . . . . . . . . .   9
       3.1.1.  Validation Rules Generation Server (VRGS) . . . . . .   9
       3.1.2.  Validation Router (VRR) . . . . . . . . . . . . . . .  11
       3.1.3.  Resource Public Key Infrastructure (RPKI) . . . . . .  12
     3.2.  Update Circumstance . . . . . . . . . . . . . . . . . . .  12
       3.2.1.  Change of the AS relationship . . . . . . . . . . . .  12
       3.2.2.  Change of the topology of the network . . . . . . . .  15
       3.2.3.  Change of the routing information . . . . . . . . . .  17
       3.2.4.  Change of the prefixes of AS  . . . . . . . . . . . .  19
   4.  Considerations on Deployability . . . . . . . . . . . . . . .  20
     4.1.  Utilize existing information as much as possible  . . . .  20
     4.2.  Prefer to use and exchange more abstract information  . .  20
     4.3.  Balance accuracy, time and cost . . . . . . . . . . . . .  21
   5.  Next Step . . . . . . . . . . . . . . . . . . . . . . . . . .  21
   6.  Security Considerations . . . . . . . . . . . . . . . . . . .  22
   7.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  22
   8.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  22
     8.1.  Normative References  . . . . . . . . . . . . . . . . . .  22
     8.2.  Informative References  . . . . . . . . . . . . . . . . .  22
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  25

1.  Background

   Inter-domain Source Address Validation plays a significant role in
   relieving the source IP address spoofing.  Several algorithms with
   different ideas have been proposed previously, some of which are
   being applied nowadays.  The major idea of the series of uRPF
   algorithms [RFC2827] [RFC3704] [RFC8704], which have been written in
   RFCs and become standard methods, is to reverse the existing
   forwarding tables for source address validation, and then complement
   and specify this scheme gradually based on different scenarios.  The
   SAVNET working group, which is devoted to improving the inter-domain
   address validation mechanism now
   [I-D.wu-savnet-inter-domain-problem-statement], mainly designs a



Ren, et al.               Expires 25 April 2024                 [Page 2]

Internet-Draft              Inter-domain SAV                October 2023


   source address validation scheme based on detailed inter-domain
   forwarding information [I-D.wu-savnet-inter-domain-architecture].
   The BAR-SAV algorithm proposed by the SIDROPS working group generates
   the permissible prefix list for SAV with BGP UPDATE messages, ASPA
   and ROA objects in RPKI [I-D.sriram-sidrops-bar-sav].  Different from
   all schemes above, this draft primarily introduces an inter-domain
   source address validation solution based on AS relationships, with
   the initial idea mentioned in [RFC5210].

   [RFC5210] proposes Source Address Validation Architecture (short for
   SAVA) which divides validation architecture into three different
   levels, namely subnetwork access, intra-domain and inter-domain.  Up
   to now, progress have been made in validation mechanisms of all three
   levels.  Meanwhile, the original idea of our proposed inter-domain
   source address validation scheme based on AS relationships has also
   been proposed in [RFC5210].  With the development and progress of
   technology, RPKI can serve as the server which provides the mapping
   from AS numbers to IP prefixes in the design of [RFC5210].  There is
   also more research support for AS relationship acquisition methods
   and incidental AS relationship analysis.  On the basis of these
   technologies, we complete the refined scheme which covers some
   typical incidental AS relationships, and analyze its handling method
   in dynamic situations from some major network changes.

   In absence of an effective RFC standard for inter-domain source
   address validation which is easy to deploy, we hope to propose a
   solution that meets requirements, has strong practicality and high
   deployability.  We hope the scheme can prevent most spoofing attacks
   in a relatively concise way, and meet the requirements for effective
   validation in most scenarios.  The forwarding and backward tracing of
   data packets are similar, so we propose a validation mechanism for
   "best effort validation" referring to "best effort forwarding"
   scheme, and an evaluation metric "validation cost-effectiveness".
   Our scheme is expected to overcome the dilemma that some existing
   schemes are too complex to deploy while some existing methods are
   simple with high error rates, and achieve a compromise between
   accuracy and simplicity.  To this end, we propose an inter-domain
   source address validation scheme based on AS relationships, which
   extends single-point validation to multi-point collaboration to
   obtain more abundant information so as to improve accuracy, and
   selects AS level as the main analysis level to greatly reduce amount
   of data processing so as to simplify the solution and improve
   efficiency.  We will explain the detailed evaluation metrics and
   validation methods in the following sections.

   The relationship between two ASes determines the export rules between
   them.  The export rules between two ASes , combined with the address
   prefixes owned by each AS, nearly determine the routing information



Ren, et al.               Expires 25 April 2024                 [Page 3]

Internet-Draft              Inter-domain SAV                October 2023


   exchanged between them.  (Some BGP attributes affect whether to
   export some information).  This means the relationship between two
   ASes nearly determines the routing information.  Therefore, with the
   AS relationships, we can design a framework for inter-domain address
   validation at a more abstract level, to improve the simplicity of the
   implementation of SAV mechanism.  With the continuous advancement of
   the Internet, many existing research provides feasibility support for
   the study on inter-domain source address validation based on AS
   relationships.  With the current development of studies on AS
   relationship, there are many methods to obtain the relationship
   between two ASes.  One is to derive AS relationships from existing
   data with various algorithms.  The other is to query ASPA objects in
   RPKI directly for obtaining the P2C/C2P relationships.  In this
   draft, as several ASes volunteer to participate in inter-domain
   source address validation, we assume that the relationships between
   every two ASes are known to each other.  And the existence of RPKI
   provides a mapping from AS numbers to IP prefixes owned by the AS.
   The studies mentioned above make it possible to infer routing
   information between ASes directly.

   Analyze the existing source address validation algorithms from four
   aspects: accuracy, convergence speed, cost and whether to realize the
   validation at a single point. uRPF algorithm has high convergence
   speed and low cost, and is mainly performed at a single point, while
   a multi-point collaborative expansion scheme is proposed.  The scheme
   of SAVNET using multiple information shows high accuracy, while it is
   fulfilled with multi-point collaboration.  BAR-SAV proposed by
   SIDROPS is an algorithm with medium accuracy with multi-point
   collaboration.  On this basis, this draft hopes to propose a multi-
   point validation scheme with moderate accuracy, speed of convergence
   and cost , so we propose the source address validation scheme based
   on AS relationships.

   When performing inter-domain source address validation, we have a
   higher tolerance for false filtering, because several illegal packets
   with forged source address which are forwarded mistakenly won't cause
   large-scale attacks.  However, we have lower acceptance for false
   blocking in order to prevent legitimate packets from being discarded,
   which may cause communication interrupt.  The inter-domain source
   address validation scheme based on AS relationships proposed in this
   draft, compared with algorithms with high accuracy, aims not to
   increase false blocking rate, not to increase false filtering rate
   greatly, but to save the deployment cost and validation cost
   effectively and improve the convergence speed under dynamic
   circumstances.






Ren, et al.               Expires 25 April 2024                 [Page 4]

Internet-Draft              Inter-domain SAV                October 2023


2.  Introduction to AS Relationships

   AS relationships are typically congruent with the business
   relationships between the autonomous systems, so the definitions of
   AS relationships are basically based on the business relationships.
   Nowadays, some major relationships occupy the largest proportion of
   all the AS relationships, while other incidental relationships exist
   in special situations.  In order to describe AS relationships
   formally, some symbols are defined as follows.

   As AS represents one autonomous system, Ori(AS), Cus(AS), Pro(AS),
   Peer(AS), Sib(AS) represents itself, its customer AS, its provider
   AS, its peer AS, its sibling AS respectively.  PartCus(AS) and
   PartPro(AS) represents the customer AS and the provider AS of AS in
   partial transit relationship respectively.  What's more, RI(AS)
   represents the routing information of the autonomous system AS while
   EXRI(AS1, AS2) represents the routing information exported to AS2
   from AS1.  The symbol U represents union operation.

2.1.  Major AS relationships

   Major AS relationships include three types of relationships, namely
   P2C relationship, P2P relationship and S2S relationship.  The
   specific definitions and descriptions of them are as follows.

   I    Provider to customer relationship (Transit Relationship, P2C
        Relationship)

        A customer pays its provider for connectivity to the rest of the
        Internet.  Therefore, a provider does transit traffic for its
        customers.[inferring-relationships] The provider and the
        customer usually do not belong to the same organization.  The
        provider AS exports its all routing information to its customer
        because its customer will pay for all the traffic, while the
        customer AS only exports the routing information of its
        customers, its siblings and itself to its provider.  The formal
        description of provider to customer relationship is as follows.

        EXRI(AS,Pro(AS))=RI(Ori(AS)) U RI(Cus(AS)) U RI(Sib(AS))

        EXRI(AS,Cus(AS))=RI(Ori(AS)) U RI(Cus(AS)) U RI(Pro(AS)) U
        RI(Peer(AS)) U RI(Sib(AS))

   II   Peer to peer relationship (P2P Relationship)

        A pair of peers agree to exchange traffic between their
        respective customers free of charge.[inferring-relationships]
        Two peers usually do not belong to the same organization.  Each



Ren, et al.               Expires 25 April 2024                 [Page 5]

Internet-Draft              Inter-domain SAV                October 2023


        peer AS exports only the routing information of its customers,
        its siblings and itself to the other AS.  The formal description
        of peer to peer relationship is as follows.

        EXRI(AS,Peer(AS))=RI(Ori(AS)) U RI(Cus(AS)) U RI(Sib(AS))

   III  Sibling to Sibling relationship (S2S Relationship)

        Two siblings are operated by the same institution.  The most
        common anomalies seem to stem from recent acquisitions and
        mergers, suggesting that some AS pairs may have a sibling
        relationship.  Each AS exports all of its routes to the other
        AS. [characterizing-internet] The formal description of sibling
        to sibling relationship is as follows.

        EXRI(AS,Sib(AS))=RI(Ori(AS)) U RI(Cus(AS)) U RI(Pro(AS)) U
        RI(Peer(AS)) U RI(Sib(AS))

   Based on the description of the three relationships above, we can
   summarize the export rule table for major AS relationships (shown in
   Table 1).

   +====================+======+==========+==========+=========+======+
   |                    | Peer | Provider | Customer | Sibling | Self |
   +====================+======+==========+==========+=========+======+
   |   Export to Peer   |      |          |    +     |    +    |  +   |
   +--------------------+------+----------+----------+---------+------+
   | Export to Provider |      |          |    +     |    +    |  +   |
   +--------------------+------+----------+----------+---------+------+
   | Export to Customer |  +   |    +     |    +     |    +    |  +   |
   +--------------------+------+----------+----------+---------+------+
   | Export to Sibling  |  +   |    +     |    +     |    +    |  +   |
   +--------------------+------+----------+----------+---------+------+

                   Table 1: Major Exporting Rule Table

2.2.  Incidental AS Relationships

   The diverse interconnection scenarios in practice cannot be covered
   completely by the major AS relationships introduced in Section 2.1,
   and other incidental relationships also exist in the AS
   interconnection network.  Currently, we only illustrate hybrid
   relationship and partial transit relationship which are relatively
   common in this draft.  But in fact, as Internet applications develop
   further, and the specific applications become more complex, there may
   be more types of incidental AS relationships.

   I   Hybrid relationship



Ren, et al.               Expires 25 April 2024                 [Page 6]

Internet-Draft              Inter-domain SAV                October 2023


       Two ASes have different relationships at different
       interconnection points (e.g. p2c in one location and p2p
       elsewhere). [inferring-complex] So from the AS level, the routing
       information exported from each other between ASes with hybrid
       relationships, is the union of the routing information which
       would be exported within each single relationship in the
       relationship set which hybrid relationships contain.

   II  Partial transit relationship

       This relationship restricts the scope of a p2c relationship to
       the provider's peers and customers (but not providers).
       [inferring-complex] The formal description with export rule table
       of partial transit relationship is as follows.

       EXRI(AS,PartCus(AS))=RI(Ori(AS)) U RI(Cus(AS)) U RI(Peer(AS)) U
       RI(Sib(AS))

       +==================+====+==========+==========+=========+======+
       |                  |Peer| Provider | Customer | Sibling | Self |
       +==================+====+==========+==========+=========+======+
       |    Export to     | +  |          |    +     |    +    |  +   |
       | Partial-Customer |    |          |          |         |      |
       +------------------+----+----------+----------+---------+------+

                 Table 2: Exporting Rule of Partial-Customer

       EXRI(AS,PartPro(AS))=EXRI(AS,Peer(AS))=RI(Ori(AS)) U RI(Cus(AS))
       U RI(Sib(AS))

       +==================+====+==========+==========+=========+======+
       |                  |Peer| Provider | Customer | Sibling | Self |
       +==================+====+==========+==========+=========+======+
       |    Export to     |    |          |    +     |    +    |  +   |
       | Partial-Provider |    |          |          |         |      |
       +------------------+----+----------+----------+---------+------+

                 Table 3: Exporting Rule of Partial-Provider

2.3.  AS relationship acquisition methods

   There are several methods to obtain AS relationships with different
   existed data, such as BGP route information, IXP information, IRR
   database, ASPA information of RPKI and so on.  These methods can be
   divided into two categories.  One is to infer relationships between
   ASes using specific data in the network, and the other is to query
   data directly to obtain AS relationships.




Ren, et al.               Expires 25 April 2024                 [Page 7]

Internet-Draft              Inter-domain SAV                October 2023


2.3.1.  Inference Algorithms

   Currently, according to the different strategies used by algorithms,
   AS relationship inferring algorithms can be mainly divided into three
   types, namely Network feature ranking Algorithms, Combinatorial
   optimization Algorithms and Local determination
   algorithms.[inference-classification]

   The Network feature ranking Algorithms mainly use some
   characteristics of the Internet to infer the relationships between
   ASes.  These methods first extract features of all the autonomous
   domains, and ranks them according to the features from the largest to
   the smallest.  Then the methods determine all AS relationships using
   the rule that high-ranking ASes are the providers of low-ranking
   ASes, while ASes with similar rank are peers.  Among all these
   methods, the representative ones are Gao algorithm
   [inferring-relationships], which utilizes the degree of AS in the
   network topology as the feature, and Subramanian algorithm
   [characterizing-internet].  This kind of algorithms are simple to
   implement with low time complexity and low accuracy.  What's more,
   the extracting of representative features and the setting of
   empirical parameters are key difficulties.

   The Combinatorial optimization Algorithms are principally based on
   the undirected graph abstracted from the Internet topology whose
   nodes are abstracted from ASes and edges are from connections between
   ASes.  These algorithms usually solve combinatorial optimization
   problems using mathematical approaches to assign values of
   relationships between interconnected ASes.  However, owing to the
   high theoretical complexity of the accurate solutions, approximate
   algorithms or random methods are commonly utilized to obtain the
   approximate solutions.  Erlebach algorithm [classifying-c2p] and
   Battista algorithm [computing-relationships] are two examples of The
   Combinatorial optimization Algorithms.  This type of algorithms
   basically have high theoretical complexity, and are complex to
   implement with high time complexity and low accuracy.

   The Local determination Algorithms mainly utilize a portion of the
   determined AS relationships which already exist in the public
   database or can be monitored by the monitor, combined with the
   features of AS relationships and AS paths to deduce the rest AS
   relationships of the Internet.  This strategy is adopted by Xia
   Algorithm [evaluation-inferences], which first filters out invalid
   paths using Valley-Free principle and then speculates relationships
   on the AS paths, and Shavitt algorithm [near-deterministic].  This
   kind of methods are relatively simple to implement with relatively
   low time complexity and high accuracy, with one premise that accurate
   and available priori information has been extracted.



Ren, et al.               Expires 25 April 2024                 [Page 8]

Internet-Draft              Inter-domain SAV                October 2023


2.3.2.  Querying approach

   Apart from above inference algorithms, AS relationships can also be
   obtained directly by querying the ASPA objects in RPKI.  The ASPA
   object is a cryptographically signed attestation by a Customer AS
   (CAS) that another AS listed in the ASPA is a Provider.  The content
   of an ASPA identifies the Customer AS (CAS) as well as the Set of
   Provider ASes (SPAS) that are authorized by the CAS to be its
   Providers.  [I-D.ietf-sidrops-aspa-profile] Therefore, we can get the
   set of ASes which are in P2C/C2P relationship with one AS straightly
   from ASPA objects in RPKI.  On the basis of ASPA, some researchers
   proposed [ASRA] (Autonomous System Relationship Authorization)
   object, which can record more complex information of various AS
   relationships.  ASRA objects may provide support for us to obtain
   accurate AS relationships directly in the future.

   In this draft, as several ASes try to implement SAV together, we
   suppose that the relationship between every two ASes can be known.
   But it is apparent that even if the AS relationships are unknown,
   they can be obtained using algorithms mentioned above.

3.  Architecture of Source Address Validation System

3.1.  Static Architecture

   In this section, we will propose the architecture design of the
   inter-domain source address validation system based on AS
   relationships.  The main validation idea of this system is to deploy
   the prefix validation rule table on the boundary router of one AS and
   use the rules to verify the source address of the forwarding packets.
   And the prefix validation rule table is generated by the server
   within the AS and then deployed on the boundary router.  The
   validation system designed by this draft mainly consists of three
   parts with diverse functions, which are Validation Rules Generation
   Server, Validation Router and Resource Public Key
   Infrastructure(RPKI).  Every AS has its own Validation Rules
   Generation Server and Validation Router, while the Resource Public
   Key Infrastructure is a global security infrastructure.

3.1.1.  Validation Rules Generation Server (VRGS)

   The Validation Rules Generation Server (VRGS for short) is
   responsible for communicating with the VRGS of its connected ASes to
   exchange their validation rules.  VRGS also communicates with the
   RPKI to obtain the IPv6 address prefix corresponding to the AS
   number, and then generates the prefix validation rule table based on
   the AS number validation rule table.  What's more, VRGS communicates
   with the Validation Router and sends the prefix validation rule table



Ren, et al.               Expires 25 April 2024                 [Page 9]

Internet-Draft              Inter-domain SAV                October 2023


   to it for deployment.  The VRGS stores the following data structure
   so as to generate and record rules.

3.1.1.1.  Neighbor AS Table

   This table stores all the relevant information of the AS connected to
   this AS.  Each record in the table includes the AS number of the
   neighbor AS, the relationship between it and this AS, and the AS
   number validation rule set exported to this AS from it.  The AS
   number validation rule set actually records the valid source AS
   number, that is, the source AS number of the packets which are
   permitted to be delivered.  This storage method of AS number
   validation rules may cause the data redundance, but is more
   convenient for VRGS to manage and update the validation rules.  This
   data structure is only stored in VRGS, and will change dynamically.
   When any change occurs to the complete AS number validation rules of
   this AS, which are actually the union of all the AS number validation
   rule sets in this table, it is necessary to update the prefix
   validation rule table stored in VRGS.  The detailed information of a
   specific example of one neighbor AS table is as follows.

          +===========+=================+=======================+
          | AS Number | AS Relationship | Permissible AS Number |
          +===========+=================+=======================+
          |    ASN1   |       P2P       |          ASN4         |
          +-----------+-----------------+-----------------------+
          |    ASN2   |       P2C       |          ASN5         |
          +-----------+-----------------+-----------------------+

                  Table 4: An example of Neighbor AS Table

3.1.1.2.  Static Exporting Rule Table

   This table stores the export rules of major relationships between
   different ASes.  For this table, VRGS can first select the row based
   on the relationship between this AS and the interconnected AS, and
   then select the column based on the source of currently discussed
   rules, so as to read out the value of the target cell quickly and
   determine whether to export the discussed rules to the interconnected
   AS.  This data structure is only stored in VRGS, and is static data
   which will not change with time.  The detailed table content is as
   follows.









Ren, et al.               Expires 25 April 2024                [Page 10]

Internet-Draft              Inter-domain SAV                October 2023


          +=============+======+==========+==========+=========+
          |             | Peer | Provider | Customer | Sibling |
          +=============+======+==========+==========+=========+
          |   to Peer   |      |          |    +     |    +    |
          +-------------+------+----------+----------+---------+
          | to Provider |      |          |    +     |    +    |
          +-------------+------+----------+----------+---------+
          | to Customer |  +   |    +     |    +     |    +    |
          +-------------+------+----------+----------+---------+
          |  to Sibling |  +   |    +     |    +     |    +    |
          +-------------+------+----------+----------+---------+

                   Table 5: Static Exporting Rule Table

3.1.1.3.  Prefix Validation Rule Table

   This table stores the set of valid source address prefixes, that is,
   the set of the source address prefixes of packets which are allowed
   to be delivered.  The VRGS applies to the RPKI for the set of
   prefixes corresponding to some AS numbers, and obtains the prefix
   validation rule table with the AS number validation rule table.  This
   data structure is stored in both VRGS and VRR, and will change with
   time dynamically.  When the prefix validation rule table stored in
   VRGS changes, VRGS should communicate with VRR and notify it to
   update its prefix validation rule table accordingly.  The detailed
   information of a specific example of one neighbor AS table is as
   follows.

                 +----------------------+---------------+
                 | Permissible Prefixes | Prefixes Set1 |
                 +----------------------+---------------+

                      Table 6: An example of Prefix
                          Validation Rule Table

3.1.2.  Validation Router (VRR)

   Validation Router (VRR for short) is a boundary router between two
   interconnected ASes, with prefix validation rule table deployed on it
   so as to verify the source address of the forwarding packets.  VRR
   needs to communicate with VRGS and update its validation rule table
   to maintain the accuracy of validation.  Prefix rule table is stored
   in the VRR for validation, and the detailed description of it is made
   above.







Ren, et al.               Expires 25 April 2024                [Page 11]

Internet-Draft              Inter-domain SAV                October 2023


3.1.3.  Resource Public Key Infrastructure (RPKI)

   Resource Public Key Infrastructure (RPKI for short) records the
   current mapping from AS numbers to IP address prefixes owned by the
   AS.  VRGS will communicate with RPKI and obtain the address prefixes
   corresponding to some AS numbers, so as to generate the prefix
   validation rule table in VRGS.

3.2.  Update Circumstance

   In this section, we will discuss the corresponding response and
   possible problems of the architecture we design when some changes
   occur to the inter-domain network.  Four different change scenarios
   will be discussed, namely the scenarios when AS relationships change,
   the scenarios when the network topology changes, the scenarios when
   the routing information of AS changes and the scenarios when the
   prefixes one AS owns change.  To facilitate a clear explanation on
   the detailed situation, we will elaborate on it using representative
   examples.  The legends which will be used in the discussion are as
   follows.

   +--+ represents the border of one autonomous system, while ++++
   represents the border of RPKI.  The +||+ at the edge of one AS
   represents a boundary router, that is, a validation router (VRR).
   The |VRGS| written inside one AS represents a validation rules
   generate server (VRGS).  The line with an arrow which points from AS1
   to AS2 means the connection from AS1 to AS2, while the text beside
   the line shows the relationship from AS1 to AS2.

3.2.1.  Change of the AS relationship

   With occurrence of some business events between ASes, the
   interconnected relationship between ASes may also change
   correspondingly, though AS relationships do not change frequently.
   When changes occur to the relationships between two ASes, VRGSs of
   the two ASes both need to update the AS number validation rule set
   recorded in Neighbor AS Table gradually.  After updating the AS
   number rule set, the VRGS regenerates the prefix rule table
   accordingly.  So when we discuss this scenario when AS relationships
   change, we only focus on the analysis of changes in the AS number
   validation rule set.  In addition to the narrow sense of AS
   relationship changes, the addition and reduction of connections
   between ASes can both be considered as the board sense of AS
   relationship changes and analyzed similarly.







Ren, et al.               Expires 25 April 2024                [Page 12]

Internet-Draft              Inter-domain SAV                October 2023


                                   +------------------+
                                   |   AS1  |VRGS1|   |
                                   +-+| |+------+| |+-+
                                      /\          /\
                                      /   ++++++   \
                               (C2P) /    |RPKI|    \ (C2P)
                                    /     ++++++     \
                            +----+| |+----+    +----+| |+----+
                            | AS2 |VRGS2| |    | AS3 |VRGS3| |
                            +-------------+    +-------------+

                     Figure 1: A specific AS network 1

          +===========+=================+=======================+
          | AS Number | AS Relationship | Permissible AS Number |
          +===========+=================+=======================+
          |    ASN1   |       self      |          ASN1         |
          +-----------+-----------------+-----------------------+
          |    ASN2   |       P2C       |          ASN2         |
          +-----------+-----------------+-----------------------+
          |    ASN3   |       P2C       |          ASN3         |
          +-----------+-----------------+-----------------------+

                     Table 7: Neighbor AS Table of AS1

          +===========+=================+=======================+
          | AS Number | AS Relationship | Permissible AS Number |
          +===========+=================+=======================+
          |    ASN2   |       self      |          ASN2         |
          +-----------+-----------------+-----------------------+
          |    ASN1   |       C2P       |       ASN1,ASN3       |
          +-----------+-----------------+-----------------------+

                     Table 8: Neighbor AS Table of AS2

          +===========+=================+=======================+
          | AS Number | AS Relationship | Permissible AS Number |
          +===========+=================+=======================+
          |    ASN3   |       self      |          ASN3         |
          +-----------+-----------------+-----------------------+
          |    ASN1   |       C2P       |       ASN1,ASN2       |
          +-----------+-----------------+-----------------------+

                     Table 9: Neighbor AS Table of AS3







Ren, et al.               Expires 25 April 2024                [Page 13]

Internet-Draft              Inter-domain SAV                October 2023


                                   +------------------+
                                   |   AS1  |VRGS1|   |
                                   +-+| |+------+| |+-+
                                      /\          /\
                                      /   ++++++   \
                               (P2P) /    |RPKI|    \ (C2P)
                                    /     ++++++     \
                            +----+| |+----+    +----+| |+----+
                            | AS2 |VRGS2| |    | AS3 |VRGS3| |
                            +-------------+    +-------------+

           Figure 2: AS network 1 after changes of relationships

          +===========+=================+=======================+
          | AS Number | AS Relationship | Permissible AS Number |
          +===========+=================+=======================+
          |    ASN2   |       self      |          ASN2         |
          +-----------+-----------------+-----------------------+
          |    ASN1   |       P2P       |          ASN1         |
          +-----------+-----------------+-----------------------+

             Table 10: Neighbor AS Table of AS2 after Updating

   Then let's assume a scenario, and the detailed connections of all
   ASes are displayed as Figure 1.  Initially, the interconnection
   relationship between AS1 and AS2 is P2C relationship, while the
   interconnection relationship between AS1 and AS3 is P2C relationship.
   After the convergence of validation rules, the Neighbor AS
   Table stored in the VRGS of AS1, AS2 and AS3 are respectively shown
   in Table 7, Table 8 and Table 9.  After the change of relationship,
   the interconnection relationship between AS1 and AS2 is transformed
   to P2P relationship, and the interconnection relationship between AS1
   and AS3 remains unchanged.  According to the exporting rule table,
   one AS won't export the validation rules of its customer AS to its
   provider AS, so the exporting relationship between AS1 and AS2 has
   changed, and relative validation rule tables need to be updated
   gradually.  After the update and convergence of validation rules, the
   Neighbor AS Table in VRGS of AS2 is shown in Table 10, while the
   Neighbor AS Table in VRGS of AS1 and AS3 remains the same in Table 7
   and Table 9.











Ren, et al.               Expires 25 April 2024                [Page 14]

Internet-Draft              Inter-domain SAV                October 2023


3.2.2.  Change of the topology of the network

   If the change of the topology of the network leads to a change of AS
   relationships, then this scenario needs to be analyzed like the first
   case.  Therefore, we mainly discuss the scenario when the topology
   changes but the AS relationships don't change in this section.  Under
   this circumstance, validation rules recorded in relative ASes won't
   change, which means that the validation architecture ignores the
   changes caused by changes in network topology granularity.


                                   +------------------+
                                   |   AS1  |VRGS1|   |
                                   +-+|1|+------+|2|+-+
                                      /\          /\
                                      /   ++++++   \
                               (C2P) /    |RPKI|    \ (C2P)
                                    /     ++++++     \
                            +----+| |+----+    +----+| |+----+
                            | AS2 |VRGS2| |    | AS3 |VRGS3| |
                            +-------------+    +-------------+

                     Figure 3: A specific AS network 2


                                   +------------------+
                                   |   AS1  |VRGS1|   |
                                   +-+|1|+------+|2|+-+
                                      /\          /\
                                      /   ++++++   \
                               (C2P) /    |RPKI|    \ (C2P)
                                    /     ++++++     \
                            +----+| |+----+    +----+| |+----+
                            | AS3 |VRGS3| |    | AS2 |VRGS2| |
                            +-------------+    +-------------+

          Figure 4: AS network 2 after changes of network topology














Ren, et al.               Expires 25 April 2024                [Page 15]

Internet-Draft              Inter-domain SAV                October 2023


          +===========+=================+=======================+
          | AS Number | AS Relationship | Permissible AS Number |
          +===========+=================+=======================+
          |    ASN1   |       self      |          ASN1         |
          +-----------+-----------------+-----------------------+
          |    ASN2   |       P2C       |          ASN2         |
          +-----------+-----------------+-----------------------+
          |    ASN3   |       P2C       |          ASN3         |
          +-----------+-----------------+-----------------------+

                     Table 11: Neighbor AS Table of AS1

   Now we assume such a specific scenario for analysis, whose detailed
   connections of all ASes are shown in Figure 3.  Initially, AS1 is
   interconnected with AS2 through boundary router VRR1, while AS1 is
   interconnected with AS3 through boundary router VRR2.  At this point,
   VRR1 should allow the address prefixes owned by AS2 to pass
   theoretically, and VRR2 should allow the address prefixes of AS3 to
   pass theoretically.  But according to our design, the validation
   rules deployed on VRR1and VRR2 permit address prefixes of AS2 and AS3
   to be delivered.  After the change of topology, AS2 is connected to
   VRR2 and AS3 is connected to VRR1.  And after this change, VRR1
   should allow the address prefixes of AS3 to pass theoretically, and
   VRR2 should allow the address prefixes of AS2 to pass theoretically.
   But because the VRR corresponding to different connections are not
   recorded, the Neighbor AS Table in VRGS of AS1 remains unchanged
   (shown in Table 11) and the validation rules deployed on VRR1 and
   VRR2 do not change.























Ren, et al.               Expires 25 April 2024                [Page 16]

Internet-Draft              Inter-domain SAV                October 2023


   In this scenario when the topology changes but the AS relationships
   don't change, the AS number validation rules won't change in the
   architecture designed in this draft.  Based on the analysis of this
   scenario, we find the reason which causes this result is that, one AS
   may be connected to multiple ASes through multiple different boundary
   routers, and as the AS topology connected to each VRR is different,
   validation rules deployed on these VRRs are not the same
   theoretically.  However, in our validation scheme, VRGS won't bind
   different AS interconnection relationships to its different VRRs, so
   it won't store the prefix validation rule table corresponding to each
   VRR.  Instead, the VRGS will only record the prefix validation rule
   table of the entire AS, and deploy the same validation rules on each
   VRR.  So in fact, the VRGS stores the union of all prefix validation
   rule tables which should be deployed on each VRR respectively.  Such
   processing method makes our validation scheme ignore the changes of
   network topology which do not cause the changes of AS relationships
   without blocking legitimate traffic additionally, and allow some
   forged traffic to pass.  At the same time, because the method
   decreases the frequency of updating validation rules, it also reduces
   the update cost of our source address validation scheme.

3.2.3.  Change of the routing information

   When the routing information of one AS changes, if the root of this
   change also causes the change of certain AS relationships, then the
   ASes whose relationships with neighbor ASes have changed or ASes
   which are affected indirectly by the change of AS relationships, need
   to be analyzed like the first case.  As for the ASes under the
   situation when the AS relationships remain unchanged, or ASes which
   are not affected by such changes in AS relationships, their
   forwarding tables may change due to the influence, but their AS
   number validation rule set don't change.  We will mainly discuss the
   second situations next.


















Ren, et al.               Expires 25 April 2024                [Page 17]

Internet-Draft              Inter-domain SAV                October 2023


                                          +-------------------+
                                          | External Network  |
                                          +-------+| |+-------+
                                                    /\
                                Forwarding Table 1  |
                                  |                 |
                                +--+--------------+| |+-+
                                |     AS1   |VRGS1|     |
                                +-+| |+-----------+| |+-+
                                  /\               /\
                                  /      ++++++     \
                           (C2P) /       |RPKI|      \ (C2P)
                                /        ++++++       \
                        +----+| |+----+         +----+| |+----+
                        | AS2 |VRGS2| |         | AS3 |VRGS3| |
                        +--+----------+         +----------+--+
                          |                                 |
                        Forwarding Table 2      Forwarding Table 3

                     Figure 5: A specific AS network 3


                                          +-------------------+
                                          | External Network' |
                                          +-------+| |+-------+
                                                    /\
                                Forwarding Table 1' |
                                  |                 |
                                +--+--------------+| |+-+
                                |     AS1   |VRGS1|     |
                                +-+| |+-----------+| |+-+
                                  /\               /\
                                  /      ++++++     \
                           (C2P) /       |RPKI|      \ (C2P)
                                /        ++++++       \
                        +----+| |+----+         +----+| |+----+
                        | AS2 |VRGS2| |         | AS3 |VRGS3| |
                        +--+----------+         +----------+--+
                          |                                 |
                        Forwarding Table 2'     Forwarding Table 3'

                     Figure 6: A specific AS network 3

   Then we assume such a specific scenario for analysis, and its
   detailed connections of all ASes are shown in Figure 5.  Initially,
   AS1 is connected to an external network whose forwarding table is
   represented as Forwarding Table1, and the forwarding tables of AS2
   and AS3 are represented as Forwarding Table2 and Forwarding Table3



Ren, et al.               Expires 25 April 2024                [Page 18]

Internet-Draft              Inter-domain SAV                October 2023


   respectively.  The change of the external network makes the
   forwarding table of AS1 change to Forwarding Table1'.  Because AS1 is
   connected to AS2 and AS3 respectively, the Forwarding tables of AS2
   and AS3 are updated to Forwarding Table2' and Forwarding Table3'
   under the influence of AS1.  But in addition, because the change of
   external network does not cause the changes in validation rules of
   AS1, the validation rules of AS2 and AS3 won't change owing to the
   influence.

   Under the circumstance when the network routing information changes,
   whether the validation rules of one AS change or not mainly depends
   on whether it is affected by the change of AS relationships.
   Therefore, even if one AS needs to update its validation rules, the
   essence of the update actually comes from the change of AS
   relationships, and the changes of routing information are only a
   reflection in one aspect of the impact of the changes in AS
   relationships.

3.2.4.  Change of the prefixes of AS

   A change in the set of address prefixes owned by one AS, means that
   the mapping from AS numbers to sets of prefixes stored in RPKI
   changes.  When this change happens, the VRGS of each AS needs to
   regenerate the prefix validation rule table based on the new mapping,
   and deploy the new rule table on the VRR.  Our scheme adopts the
   polling update method.  The VRGS within one AS initiatively queries
   the RPKI at regular intervals, for the address prefix sets
   corresponding to the AS numbers in the AS number validation rule set.
   If the union of all these prefix sets change, the VRGS will update
   its prefix validation rule table.

   With RPKI, we can obtain the mapping of address prefixes.  And in the
   current RPKI architecture, whenever a holder of IP address space
   wants to authorize an AS to announce, it first issues an end-entity
   certificate with its own private key, and then issues a Route Origin
   Authorization (short for ROA) with the private key of that EE
   certificate, finishing the binding of the IP address prefixes to this
   AS.[RFC6480] A ROA records the AS number and its authorized address
   prefixes.[RFC6482] The ROA objects are stored in the repository of
   RPKI [RFC6481] to facilitate the data synchronization by the relying
   parties (short for RP) through rsync [RFC5781] or RRDP protocols
   [RFC8182].  So the VRGS can utilize RPKI validator to obtain the
   certificates, ROA objects and other data regularly from the
   distributed repository to generate a local cache of RPKI data.
   Therefore, the ROA objects of one target AS can be queried using the
   AS number of it, and the set of IP address prefixes owned by this AS
   can be obtained.




Ren, et al.               Expires 25 April 2024                [Page 19]

Internet-Draft              Inter-domain SAV                October 2023


   In summary, our design of inter-domain source address validation can
   deal with the four circumstances of changing discussed above.  In
   some cases which can not be handled correctly, such as the scenarios
   when the network topology changes, our design will only allow some
   forged traffic to pass through mistakenly, but won't block legitimate
   traffic additionally.  The handle of the design meets our target that
   the method should not increase false blocking rate or increase false
   filtering rate greatly.  And when changes occur, changes that are
   more fine-grained than changes of AS relationships won't cause the
   change of AS number validation rules, which can reduce the frequency
   of rule changing effectively and improve the efficiency of
   maintaining validation rules.

4.  Considerations on Deployability

4.1.  Utilize existing information as much as possible

   Using information beyond existing that will inevitably incur
   additional costs due to its need for global upgrades.  At the same
   time, it will improve the deployment requirements, which is not
   conducive to the large-scale promotion of the validation scheme.
   Therefore, a source address validation scheme which is easy to be
   widely deployed in real networks always tends to utilize existing
   information as much as possible.  Similarly, when existing facilities
   can provide certain services, deployable solutions always prefer to
   utilize existing facilities.  For the source address validation
   schemes, existing information includes routing information, business
   relationships between different ASes, and the mapping from AS numbers
   to IP prefixes provided by RPKI.  Our solution is to utilize the
   existing AS relationship information to generate validation rules,
   and use the mapping from AS numbers to IP prefixes provided by RPKI.

4.2.  Prefer to use and exchange more abstract information

   Compared to more fine-grained and concrete information, abstract
   information, although distorted in details, can fundamentally
   simplify and quickly solve problems.  When using abstract information
   to simplify problems, it is often possible to reduce the
   computational cost of a solution while improving its efficiency,
   which is more conducive to promoting the deployment of validation
   solutions.  In this case, when multiple nodes collaborate, fine-
   grained rule information may not be transmitted among them, and each
   node may not necessarily have fine-grained rule information from
   other nodes.  Ultimately, specific validation rules can be generated
   using the abstract information.  As stated earlier, AS relationships
   basically determines the routing information between ASes.  On this
   basis, our scheme uses AS relationships which is more abstract
   instead of routing information, perform validation rule calculation



Ren, et al.               Expires 25 April 2024                [Page 20]

Internet-Draft              Inter-domain SAV                October 2023


   at the granularity of AS relationships, passes AS numbers between
   ASes instead of IP prefixes, and only generates prefix filtering
   rules based on AS number validation rules at the end.

4.3.  Balance accuracy, time and cost

   When the Internet routing remains stable, generating the most
   accurate filtering rules directly during the process of forwarding
   table establishment is the best validation scheme.  However, today's
   Internet often undergoes various levels of changes, which will
   trigger fluctuations in validation rules of different schemes until
   they converge again, such as various changes and their impacts in
   Section 3.2.  Long convergence time is not conducive for a scheme to
   providing effective validation support in a constantly changing
   network.  Therefore, in the dynamic network, an easily deployable
   validation scheme requires a good balance between convergence time
   and accuracy.

   On the other hand, when the calculation and deployment of rules cause
   almost no additional consumption, the most effective validation
   schemes tend to use the most complex and accurate schemes.  However,
   in real networks, validation schemes which require more data and
   complex computational processes often have higher costs.  Trading
   excessive expenses for a slight improvement in accuracy is an
   inappropriate choice.  Therefore, in practical situations, an easily
   deployable validation scheme requires a good balance between the
   computational cost and accuracy.

   The analysis of above two examples indicates that there may be
   contradictions, which are difficult to optimize simultaneously,
   between different evaluation metrics due to the hidden correlation in
   practical networks.

   A new metric should be designed that can be called "validation cost-
   effectiveness".  Calculate the ratio of total accuracy and average
   deployment cost, to reflect the validation cost-effectiveness in the
   cost dimension.  Calculate the ratio of total accuracy and average
   convergence time under various changing scenarios, to reflect the
   validation cost-effectiveness in the time dimension.

5.  Next Step

   In the current discussion and design, there are still some details
   that have not been covered.  We discuss the major and incidental AS
   relationships in Section 2, but there are some more complex and minor
   AS relationships which haven't been discussed.  What's more, with the
   rapid development of Internet applications, there may be other new
   incidental AS relationships which are not covered in this draft.  In



Ren, et al.               Expires 25 April 2024                [Page 21]

Internet-Draft              Inter-domain SAV                October 2023


   future research, we will further discuss this issue and work to
   propose solutions that can incrementally handle incidental AS
   relationships.

6.  Security Considerations

   The security considerations of our inter-domain source address
   validation scheme based on AS relationships are similar to those of
   [I-D.wu-savnet-inter-domain-architecture].

7.  IANA Considerations

   This document has no IANA requirements.

8.  References

8.1.  Normative References

   [RFC8182]  Bruijnzeels, T., Muravskiy, O., Weber, B., and R. Austein,
              "The RPKI Repository Delta Protocol (RRDP)", RFC 8182,
              DOI 10.17487/RFC8182, July 2017,
              <https://www.rfc-editor.org/info/rfc8182>.

   [RFC6481]  Huston, G., Loomans, R., and G. Michaelson, "A Profile for
              Resource Certificate Repository Structure", RFC 6481,
              DOI 10.17487/RFC6481, February 2012,
              <https://www.rfc-editor.org/info/rfc6481>.

   [RFC6482]  Lepinski, M., Kent, S., and D. Kong, "A Profile for Route
              Origin Authorizations (ROAs)", RFC 6482,
              DOI 10.17487/RFC6482, February 2012,
              <https://www.rfc-editor.org/info/rfc6482>.

   [RFC2827]  Ferguson, P. and D. Senie, "Network Ingress Filtering:
              Defeating Denial of Service Attacks which employ IP Source
              Address Spoofing", BCP 38, RFC 2827, DOI 10.17487/RFC2827,
              May 2000, <https://www.rfc-editor.org/info/rfc2827>.

   [RFC3704]  Baker, F. and P. Savola, "Ingress Filtering for Multihomed
              Networks", BCP 84, RFC 3704, DOI 10.17487/RFC3704, March
              2004, <https://www.rfc-editor.org/info/rfc3704>.

   [RFC8704]  Sriram, K., Montgomery, D., and J. Haas, "Enhanced
              Feasible-Path Unicast Reverse Path Forwarding", BCP 84,
              RFC 8704, DOI 10.17487/RFC8704, February 2020,
              <https://www.rfc-editor.org/info/rfc8704>.

8.2.  Informative References



Ren, et al.               Expires 25 April 2024                [Page 22]

Internet-Draft              Inter-domain SAV                October 2023


   [RFC5210]  Wu, J., Bi, J., Li, X., Ren, G., Xu, K., Williams, M., and
              RFC Editor, "A Source Address Validation Architecture
              (SAVA) Testbed and Deployment Experience",
              DOI 10.17487/rfc5210, June 2008,
              <http://dx.doi.org/10.17487/rfc5210>.

   [RFC5781]  Weiler, S., Ward, D., and R. Housley, "The rsync URI
              Scheme", RFC 5781, DOI 10.17487/RFC5781, February 2010,
              <https://www.rfc-editor.org/info/rfc5781>.

   [RFC6480]  Lepinski, M. and S. Kent, "An Infrastructure to Support
              Secure Internet Routing", RFC 6480, DOI 10.17487/RFC6480,
              February 2012, <https://www.rfc-editor.org/info/rfc6480>.

   [I-D.wu-savnet-inter-domain-problem-statement]
              Wu, J., Li, D., Liu, L., Huang, M., Sriram, K., Qin, L.,
              and N. Geng, "Source Address Validation in Inter-domain
              Networks Gap Analysis, Problem Statement, and
              Requirements", Work in Progress, Internet-Draft, draft-wu-
              savnet-inter-domain-problem-statement-09, 27 June 2023,
              <https://datatracker.ietf.org/doc/html/draft-wu-savnet-
              inter-domain-problem-statement-09>.

   [I-D.wu-savnet-inter-domain-architecture]
              Wu, J., Li, D., Huang, M., Chen, L., Geng, N., Liu, L.,
              and L. Qin, "Inter-domain Source Address Validation
              (SAVNET) Architecture", Work in Progress, Internet-Draft,
              draft-wu-savnet-inter-domain-architecture-04, 30 September
              2023, <https://datatracker.ietf.org/doc/html/draft-wu-
              savnet-inter-domain-architecture-04>.

   [I-D.sriram-sidrops-bar-sav]
              Sriram, K., Lubashev, I., and D. Montgomery, "Source
              Address Validation Using BGP UPDATEs, ASPA, and ROA (BAR-
              SAV)", Work in Progress, Internet-Draft, draft-sriram-
              sidrops-bar-sav-02, 17 December 2022,
              <https://datatracker.ietf.org/doc/html/draft-sriram-
              sidrops-bar-sav-02>.

   [I-D.ietf-sidrops-aspa-profile]
              Azimov, A., Uskov, E., Bush, R., Snijders, J., Housley,
              R., and B. Maddison, "A Profile for Autonomous System
              Provider Authorization", Work in Progress, Internet-Draft,
              draft-ietf-sidrops-aspa-profile-16, 10 July 2023,
              <https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-
              aspa-profile-16>.





Ren, et al.               Expires 25 April 2024                [Page 23]

Internet-Draft              Inter-domain SAV                October 2023


   [inferring-relationships]
              Gao, L., "On inferring autonomous system relationships in
              the Internet", December 2001,
              <https://ieeexplore.ieee.org/document/974527>.

   [characterizing-internet]
              Subramanian, L., Agarwal, S., Rexford, J., and R. H. Katz,
              "Characterizing the Internet hierarchy from multiple
              vantage points", June 2002,
              <https://ieeexplore.ieee.org/document/1019307>.

   [inferring-complex]
              Giotsas, V., Luckie, M., Huffaker, B., and K. claffy,
              "Inferring complex AS relationships", November 2014,
              <https://dl.acm.org/doi/10.1145/2663716.2663743>.

   [classifying-c2p]
              Thomas, E., Alexander, H., and S. Thomas, "Classifying
              customer-provider relationships in the Internet", July
              2002, <https://www.research-collection.ethz.ch/
              handle/20.500.11850/146759>.

   [computing-relationships]
              Battista, G. D., Patrignani, M., and M. Pizzonia,
              "Computing the types of the relationships between
              autonomous systems", July 2003,
              <https://ieeexplore.ieee.org/document/1208668>.

   [evaluation-inferences]
              Xia, J. and L. Gao, "On the evaluation of AS relationship
              inferences", November 2004,
              <https://ieeexplore.ieee.org/document/1378209>.

   [near-deterministic]
              Weinsberg, U., Shavitt, Y., and E. Shir, "Near-
              deterministic inference of AS relationships", June 2009,
              <https://ieeexplore.ieee.org/document/5206358>.

   [inference-classification]
              Fan, Q., Yin, H., Lin, C., Dong, J., and W. Song,
              "Inference Algorithm for Business Relationships in
              Internet Autonomous Systems", April 2014,
              <https://d.wanfangdata.com.cn/periodical/jsjxb201404019>.

   [ASRA]     Geng, N., "Autonomous System Relationship Authorization",
              September 2023,
              <https://conference.apnic.net/56/assets/files/APJS642/
              autonomous-system-re_1694481446.pdf>.



Ren, et al.               Expires 25 April 2024                [Page 24]

Internet-Draft              Inter-domain SAV                October 2023


Authors' Addresses

   Gang Ren
   Tsinghua University
   Beijing
   China
   Email: rengang@cernet.edu.cn


   Shuqi Liu
   Tsinghua University
   Beijing
   China
   Email: liu-sq23@mails.tsinghua.edu.cn


   Xia Yin
   Tsinghua University
   Beijing
   China
   Email: yxia@tsinghua.edu.cn






























Ren, et al.               Expires 25 April 2024                [Page 25]