<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-xu-sidrops-asrank-vulnerabilities-00" category="info" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Structural Vulnerabilities in ASRank under Adversarial Conditions</title>
    <seriesInfo name="Internet-Draft" value="draft-xu-sidrops-asrank-vulnerabilities-00"/>
    <author initials="Y." surname="Xu" fullname="Yi Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>y-xu22@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="Y." surname="Chen" fullname="Yihao Chen">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>yh-chen21@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="K." surname="Xu" fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="Q." surname="Li" fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Wu" fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <street>30 Shuangqing Road</street>
          <city>Beijing</city>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <workgroup>SIDROPS Working Group</workgroup>
    <abstract>
      <?line 80?>

<t>This document analyzes the structural vulnerabilities of ASRank, a widely used algorithm for inferring Autonomous System (AS) business relationships from BGP routing data. ASRank plays a key role in security research and BGP operation, yet its inference process is highly sensitive to small changes in input data. This sensitivity introduces risks in adversarial conditions, where inference results may be manipulated without detection. This document outlines the design of ASRank, identifies its structural vulnerabilities, analyzes a minimal manipulation example, and discusses the security implications and potential countermeasures.</t>
    </abstract>
  </front>
  <middle>
    <?line 84?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet comprises over 80,000 ASes interconnected via the Border Gateway Protocol (BGP). These interconnections are governed by business relationships, primarily provider-to-customer (P2C) and peer-to-peer (P2P), which directly influence routing policies and global path selection.</t>
      <t>Since AS business relationships are not publicly disclosed, operators and researchers rely on inference algorithms to identify them from observed BGP routing data. Among these, CAIDA's ASRank algorithm <xref target="ASRank"/> is the most widely used methods that underpins CAIDA's public AS relationship dataset <xref target="CAIDA_Dataset"/> and has supported hundreds of scientific studies  and operational tools.</t>
      <t>Despite its critical role, the security of ASRank under adversarial conditions remains largely unexplored. ASRank's inference process relies on AS triplets, which are sequences of three consecutive Autonomous Systems extracted from BGP paths, and applies a greedy ordering based on transit degree. This design introduces sensitivity to small input perturbations, which can alter inference order and lead to cascading misclassifications.</t>
      <t>The objective of this document is to highlight the security risks introduced by structural vulnerabilities in ASRank, which may allow  adversaries to manipulate AS relationship inference results at scale. Given ASRank's widespread use in both operational networks and research, such manipulation can undermine the reliability of critical datasets and downstream analyses. This document also discusses the security implications of these vulnerabilities and outlines potential countermeasures.</t>
      <t>The rest of this document is structured as follows: Section 2 provides background on AS relationships and inference techniques. Section 3 presents an overview of the ASRank algorithm. Section 4 analyzes structural vulnerabilities in ASRank's inference process. Section 5 introduces a minimal manipulation example to illustrate the impact of input perturbations. Section 6 discusses the security implications of these vulnerabilities. Section 7 outlines potential mitigation strategies. Finally, Section 8 concludes the document.</t>
    </section>
    <section anchor="background-and-as-relationship-inference">
      <name>Background and AS Relationship Inference</name>
      <t>ASes interconnect under business agreements that define how traffic is exchanged between them. The two primary types of AS relationships are P2C and P2P. In a P2C relationship, the provider offers transit services to the customer in exchange for payment. In a P2P relationship, two ASes exchange traffic without settlement, typically to reach each other's customers.</t>
      <t>These relationships play a central role in shaping BGP routing policies, including route selection and export behavior. However, AS relationships are generally considered proprietary and are not publicly disclosed. As a result, researchers and operators rely on inference algorithms to estimate these relationships from observed BGP routing data.</t>
      <t>Most inference methods operate on BGP paths collected from public vantage points and apply heuristic or statistical techniques to classify AS links. Among these, CAIDA's ASRank algorithm is the most widely used and influential approaches.</t>
    </section>
    <section anchor="asrank-overview">
      <name>ASRank Overview</name>
      <t>ASRank is a multi-stage algorithm developed by CAIDA to infer AS relationships from empirical BGP routing data. It is used to generate CAIDA's public AS relationship datasets and has become a foundational tool in BGP researches and operations.</t>
      <t>The algorithm begins by sanitizing BGP paths, removing those that contain artifacts such as loops, reserved AS numbers, or Internet Exchange Points (IXPs). It then sorts ASes in descending order of transit degree, computed from counts of AS triplets observed in the data. Based on this ordering, ASRank first identifies a clique of top-level ASes and infers the corresponding P2P relationships within the clique. After filtering poisoned paths further, it infers P2C relationships in a greedy, top-down manner. During this process, newly inferred relationships serve as a basis for subsequent inferences, thereby progressively determining P2C relationships until no additional ones can be resolved. The algorithm then handles special cases, such as ASes with atypical transit patterns. Finally, any remaining unresolved links are inferred as P2P relationships.</t>
      <t>While ASRank's design enables scalable and automated inference, its reliance on triplet-based statistics and order-sensitive heuristics introduces structural vulnerabilities, which are discussed in the following sections.</t>
    </section>
    <section anchor="vulnerabilities-in-asrank-inference">
      <name>Vulnerabilities in ASRank Inference</name>
      <t>A central component of ASRank's inference process is the P2C classification phase, which accounts for the majority of inferred relationships. In this phase, ASRank processes ASes in descending order of their transit degree, a metric defined as the number of distinct neighbors adjacent to an AS when it appears in the middle position of observed AS triplets (X, Y, Z). For each AS, ASRank examines relevant triplets (X, Y, Z) and applies a heuristic: if the relationship between AS X and AS Y is P2P (denoted as X - Y) or P2C (denoted as X &gt; Y), the algorithm infers a P2C relationship AS Y &gt; AS Z.</t>
      <t>A key characteristic of this process is its order-dependence: the relationships inferred earlier influence which triplets can trigger further inferences, shaping the final output. In practice, many ASes have similar transit degrees. As a result, even small changes in the input data can perturb the processing order, leading to different inference sequences and potentially altering the resulting AS relationships.</t>
      <t>This sensitivity introduces a structural vulnerability. Minor perturbations in the input data can trigger cascading inference changes, resulting in qualitatively different relationship graphs. In open environments where BGP data is collected from public vantage points, this behavior creates an opportunity for inference results to be influenced or manipulated without directly modifying the algorithm. These characteristics raise concerns about the robustness of ASRank in adversarial or noisy settings, especially given its widespread use in BGP researches and operations.</t>
    </section>
    <section anchor="a-minimal-example-of-manipulations">
      <name>A Minimal Example of Manipulations</name>
      <t>Consider the following observed BGP paths, where we highlight only the contiguous AS-path segments that are relevant for inference:</t>
      <artwork><![CDATA[
    path 1:  ... M N A B C D
    path 2:  ... M N A B E
    path 3:  ... M N A F
    path 4:  ... M N A G
]]></artwork>
      <t>These paths represent a typical scenario where multiple downstream ASes are accessible through a shared chain of transit providers. ASRank initially infers a top-level clique of major transit ASes. For simplicity, we assume that <tt>M</tt> and <tt>N</tt> are part of this clique, with their mutual relationship already inferred as P2P (<tt>M-N</tt>).</t>
      <t>From these paths, ASRank extracts AS triplets and computes the transit degrees (denoted by <tt>TD</tt>). AS <tt>A</tt> appears as the middle AS in four triplets and has four distinct neighbors, yielding <tt>TD(A)=4</tt>. Similarly, <tt>TD(B)=3</tt> and <tt>TD(C)=2</tt>, while <tt>D</tt>, <tt>E</tt>, <tt>F</tt>, and <tt>G</tt> all have a transit degree of zero. ASRank thus visits ASes in the following order:</t>
      <artwork><![CDATA[
    A -> B -> C -> D -> E -> F -> G
]]></artwork>
      <t>Starting with <tt>A</tt>, ASRank infers <tt>N&gt;A</tt> from <tt>(M,N,A)</tt> as <tt>M-N</tt> is already known. It then moves to <tt>B</tt>, inferring <tt>A&gt;B</tt> from the triplet <tt>(N,A,B)</tt>, based on the previously inferred <tt>N&gt;A</tt>. Following this sequence, ASRank infers the following P2C relationships:</t>
      <artwork><![CDATA[
    {N > A, A > B, B > C, C > D, B > E, A > F, A > G}
]]></artwork>
      <t>Now consider adding two additional BGP paths:</t>
      <artwork><![CDATA[
    path 5:  ... X A B D C Y
    path 6:  ... X F D G Y
]]></artwork>
      <t>Due to the new introduced AS triplets, the transit degree of <tt>D</tt> increases to <tt>TD(D)=4</tt>, surpassing that of <tt>C</tt>, whose transit degree becomes <tt>TD(C)=3</tt>. As a result, <tt>D</tt> is visited before <tt>C</tt>, resulting in the updated inference order:</t>
      <artwork><![CDATA[
    A -> B -> D -> C -> ...
]]></artwork>
      <t>This reordered traversal leads to a different inference chain. When visiting <tt>D</tt>, the relationship <tt>A&gt;B</tt> has already been inferred, and <tt>(A,B,D)</tt> in path 5 therefore satisfies the heuristic and implies <tt>B&gt;D</tt>. Later, when visiting <tt>C</tt>, <tt>(B,D,C)</tt> in path 5 together with the newly inferred <tt>B&gt;D</tt> again matches the heuristic and implies <tt>D&gt;C</tt>. Consequently, the final set of inferred relationships includes:</t>
      <artwork><![CDATA[
    {N > A, A > B, B > D, D > C, B > C, B > E, A > F, A > G}
]]></artwork>
      <t>Compared to the original outcome, <tt>C&gt;D</tt> is replaced by <tt>D&gt;C</tt>, and a new P2C relationship <tt>B&gt;D</tt> is inferred.</t>
    </section>
    <section anchor="security-implications">
      <name>Security Implications</name>
      <t>Because ASRank-derived datasets are widely used in both academic studies and operational tools, inaccuracies in inferred AS relationships can propagate into downstream systems, undermining the reliability of Internet measurements and topology analysis, and leading to incorrect assumptions about routing behavior and connectivity.</t>
      <t>Manipulated or unstable inferences can lead to misleading views of Internet structure and behavior. For instance, incorrect relationships may distort the AS hierarchy or misrepresent network reachability. Such errors can reduce the accuracy of systems that depend on AS relationship data for tasks like anomaly detection, route validation, and security monitoring.</t>
      <t>Moreover, inaccurate ASRank inferences can unfairly elevate an AS's perceived importance, giving it undue visibility, influence, or business advantage. This can also distort peering decisions and mislead customers.</t>
    </section>
    <section anchor="mitigation-considerations">
      <name>Mitigation Considerations</name>
      <t>To address ASRank's vulnerabilities, two areas require attention: improving inference robustness and limiting the injection of forged AS paths.</t>
      <t>At the inference level, robustness can be enhanced by using organizational or business-affiliation data to flag relationships that don't align with expected economic logic. Rather than making early, fixed decisions, ASRank could analyze the full relationship graph to reduce the impact of inference order. Since forged paths may coexist with valid ones, detecting internal inconsistencies, like unexpected reversals in relationships, can help identify and verify suspicious inferences.</t>
      <t>At the routing layer, deploying path validation mechanisms can reduce the risk of forged triplets. BGPsec <xref target="RFC8205"/> provides cryptographic protection for AS paths but is limited by low adoption and reduced effectiveness under partial deployment. Newer approaches like ASPA <xref target="I-D.ietf-sidrops-aspa-verification"/> and ASRA <xref target="I-D.geng-sidrops-asra-profile"/> offer more practical alternatives by verifying legitimate AS connections, though they are still in early stages and face known limitations.</t>
    </section>
    <section anchor="conclusion">
      <name>Conclusion</name>
      <t>This document analyzes the structural vulnerabilities of ASRank, a widely used algorithm for inferring AS business relationships from BGP routing data. We describe how ASRank’s order-sensitive inference process can lead to unstable or incorrect relationship classifications under small input changes. A minimal example demonstrates how minor perturbations in BGP paths can trigger cascading inference shifts. These vulnerabilities raise concerns about the reliability of ASRank-derived datasets, especially in adversarial or noisy conditions. Strengthening inference robustness and deploying path validation mechanisms are essential steps toward improving the security and trustworthiness of AS relationship inference.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document includes no request to IANA.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The structural weaknesses in ASRank's inference process may be exploited to manipulate AS relationship outputs without altering the algorithm itself. Such manipulation can distort Internet topology views, mislead routing decisions, and undermine downstream systems that rely on inferred AS relationships. While this document does not describe specific attack strategies, it highlights the risks posed by inference sensitivity and the potential for undetected influence. Mitigation strategies are discussed in Section 7. Operators and researchers are encouraged to interpret ASRank-derived data with caution and consider complementary validation mechanisms.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8205" target="https://www.rfc-editor.org/info/rfc8205" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8205.xml">
          <front>
            <title>BGPsec Protocol Specification</title>
            <author fullname="M. Lepinski" initials="M." role="editor" surname="Lepinski"/>
            <author fullname="K. Sriram" initials="K." role="editor" surname="Sriram"/>
            <date month="September" year="2017"/>
            <abstract>
              <t>This document describes BGPsec, an extension to the Border Gateway Protocol (BGP) that provides security for the path of Autonomous Systems (ASes) through which a BGP UPDATE message passes. BGPsec is implemented via an optional non-transitive BGP path attribute that carries digital signatures produced by each AS that propagates the UPDATE message. The digital signatures provide confidence that every AS on the path of ASes listed in the UPDATE message has explicitly authorized the advertisement of the route.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8205"/>
          <seriesInfo name="DOI" value="10.17487/RFC8205"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ASRank" target="https://doi.org/10.1145/2504730.2504747">
          <front>
            <title>AS relationships, customer cones, and validation</title>
            <author initials="M." surname="Luckie" fullname="Matthew Luckie,">
              <organization/>
            </author>
            <author initials="B." surname="Huffaker" fullname="Bradley Huffaker">
              <organization/>
            </author>
            <author initials="A." surname="Dhamdhere" fullname="Amogh Dhamdhere">
              <organization/>
            </author>
            <author initials="V." surname="Giotsas" fullname="Vasileios Giotsas">
              <organization/>
            </author>
            <author initials="K." surname="Claffy" fullname="KC Claffy">
              <organization/>
            </author>
            <date year="2013" month="October" day="23"/>
          </front>
          <seriesInfo name="IMC 2013, Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 243–256" value=""/>
        </reference>
        <reference anchor="CAIDA_Dataset" target="https://www.caida.org/catalog/datasets/as-relationships/">
          <front>
            <title>AS Relationships Dataset</title>
            <author initials="" surname="CAIDA" fullname="CAIDA">
              <organization/>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-sidrops-aspa-verification" target="https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-verification-24" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-sidrops-aspa-verification.xml">
          <front>
            <title>BGP AS_PATH Verification Based on Autonomous System Provider Authorization (ASPA) Objects</title>
            <author fullname="Alexander Azimov" initials="A." surname="Azimov">
              <organization>Yandex</organization>
            </author>
            <author fullname="Eugene Bogomazov" initials="E." surname="Bogomazov">
              <organization>Qrator Labs</organization>
            </author>
            <author fullname="Randy Bush" initials="R." surname="Bush">
              <organization>Internet Initiative Japan &amp; Arrcus, Inc.</organization>
            </author>
            <author fullname="Keyur Patel" initials="K." surname="Patel">
              <organization>Arrcus</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders"/>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="19" month="October" year="2025"/>
            <abstract>
              <t>This document describes procedures that make use of Autonomous System Provider Authorization (ASPA) objects in the Resource Public Key Infrastructure (RPKI) to verify the Border Gateway Protocol (BGP) AS_PATH attribute of advertised routes. This AS_PATH verification enhances routing security by adding means to detect and mitigate route leaks and AS_PATH manipulations.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sidrops-aspa-verification-24"/>
        </reference>
        <reference anchor="I-D.geng-sidrops-asra-profile" target="https://datatracker.ietf.org/doc/html/draft-geng-sidrops-asra-profile-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.geng-sidrops-asra-profile.xml">
          <front>
            <title>A Profile for Autonomous System Relationship Authorization (ASRA)</title>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>NIST</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="17" month="October" year="2025"/>
            <abstract>
              <t>This document defines a Cryptographic Message Syntax (CMS) protected content type for Autonomous System Relationship Authorization (ASRA) objects for use with the Resource Public Key Infrastructure (RPKI). An ASRA is a digitally signed object through which the issuer (the holder of an Autonomous System identifier), can authorize one or more other Autonomous Systems (ASes) as its customers and lateral peers. When validated, an ASRA's eContent can be used for detection and mitigation of BGP AS path manipulation attacks together with Autonomous System Provider Authorization (ASPA). ASRA is complementary to ASPA.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-geng-sidrops-asra-profile-02"/>
        </reference>
      </references>
    </references>
    <?line 196?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
