Abstract
In 2010 the European Network and Information Security Agency (ENISA) launched a study to investigate the resilience of the Internet’s interconnection system and come up with policy recommendations. A large number of stakeholders were contacted, and their expertise has been reflected in the study. The formal outcome of the study was the publication by ENISA in early 2011 of a detailed technical report, “Inter-X: Resilience of the Internet Interconnection Ecosystem”. This paper presents a much abridged version of the ENISA report. In it, we present a summary of the problems that the Internet faces in keeping its interconnection system resilient, along with the recommendations proposed to policy makers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Contrast transit with peering, where an ISP will arrange with another to carry traffic to and from each other’s customers. Since peering with every network in the world is impractical, ISPs will purchase transit contracts to carry the traffic that cannot be handled by peering relationships. Note that transit traffic is invariably paid for, whereas peering (which is usually only with other ISPs of a similar size, or between “content” and “eyeball” ASs) is generally free.
- 2.
An IXP is a location to which many ISPs (and CDNs) connect. For the cost of a single link, they can exchange traffic (usually peering traffic, but sometimes transit) with all the other ISPs and CDNs who are IXP members.
- 3.
An Internet Engineering Task Force (IETF) Best Common Practice (BCP) is as official as it gets on the Internet.
- 4.
For a popular perception of the problems that government is grappling with see Fight Cyber War Before Planes Fall Out of Sky [79].
- 5.
Just as the final version of the ENISA report was submitted, Level 3 (the transit provider with the largest market share) announced that it was acquiring Global Crossing (the second largest market share) for $3 billion ($1.1 of which is debt assumption), giving the merged company just over half of the market [86].
References
Agarwal S, Chuah C, Bhattacharyya S, Diot C (2004) The impact of BGP dynamics on intra-domain traffic. SIGMETRICS/Performance’04, ACM, pp 319–330
Akamai Inc. (2010) Facts & Figures. http://www.akamai.com/html/about/facts_figures.html#6
Alleman J, Liebenau J (2004) Network resilience and its regulatory inhibitors. Bohlin E et al. (eds) Global economy and digital society, Elsevier, Amsterdam, pp 379–394
Alperovitch D (2010) US-based internet traffic redirected to China. McAfee blog. http://blogs.mcafee.com/mcafee-labs/u-s-based-internet-traffic-redirected-to-china
Alperovitch D (2010) April route hijack: sifting through the confusion. McAfee blog. http://blogs.mcafee.com/mcafee-labs/april-route-hijack-sifting-through-the-confusion-2
Augustin B, Krishnamurthy B, Willinger W (2009) IXPs: mapped? IMC’09, pp 336–349
Blumenfeld L (2003) Dissertation could be security threat. Washington Post. http://www.washingtonpost.com/ac2/wp-dyn/A23689-2003Jul7
Blunk LJ (2005) New BGP analysis tools and a look at the AS9121 incident. http://iepg.org/march2005/bgptools+as9121.pdf
Bono VJ (1997) 7007 Explanation and apology. NANOG mailing list. http://www.merit.edu/mail.archives/nanog/1997-04/msg00444.html
Brown MA (2008) Pakistan hijacks YouTube. Renesys blog. http://www.renesys.com/blog/2008/02/pakistan_hijacks_youtube_1.shtml
Bush R, Maennel O, Roughan M, Uhlig S (2009) Internet optometry: assessing the broken glasses in internet reachability. IMC’09, pp 242–253
Butler K, Farley TR, McDaniel P, Rexford J (2010) A survey of BGP security issues and solutions. Proc IEEE 98(1):100–122
Caesar M, Rexford J (2005) BGP routing policies in ISP networks. IEEE Network 19(6):5–11
Chadd A (2006) Murphy’s Law strikes again: AS7007. Murphy’s law mailing list. http://lists.ucc.gu.uwa.edu.au/pipermail/lore/2006-August/000040.html
Chang H, Willinger W (2006) Difficulties measuring the internet’s AS-level ecosystem. Information sciences and systems, pp 1479–1483
Cisco Systems (2010) Cisco visual networking index: forecast and methodology, 2009–2014. White paper. http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-481360.pdf
Claffy KC (2008) Ten things lawyers should know about the internet. http://www.caida.org/publications/papers/2008/lawyers_top_ten/
CNet News Staff (1997) Router glitch cuts net access. CNet News. http://news.cnet.com/2100-1033-279235.html
Cowie J (2010) How to build a cybernuke. Renesys blog. http://www.renesys.com/blog/2010/04/how-to-build-a-cybernuke.shtml
Cowie JH, Ogielski AT, Premore BJ, Smith EA, Underwood T (2003) Impact of the 2003 blackouts on internet communications. Renesys. http://www.renesys.com/tech/reports/Renesys_BlackoutReport.pdf
Cowie J, Popescu A, Underwood T (2005) Impact of hurricane Katrina on internet infrastructure. Renesys. http://www.renesys.com/tech/presentations/pdf/Renesys-Katrina-Report-9sep2005.pdf
De Bruijne M (2007) Systems that should have failed: critical infrastructure protection in an institutionally fragmented environment. J Contingencies Crisis Manag 15(1):1–29
ENISA (2009) Good practice guide on national exercises. ENISA technical report. http://www.enisa.europa.eu/act/res/policies/good-practices-1/exercises/national-exercise-good-practice-guide
ENISA (2011) Inter-X: resilience of the internet interconnection ecosystem. ENISA technical report. Available at http://www.enisa.europa.eu/act/res/other-areas/inter-x.
ENISA (2011) Cyber Europe 2010—evaluation report. ENISA technical report. Available at http://www.enisa.europa.eu/act/res/cyber-europe-2010/cyber-europe-2010-report
Faratin P, Clark DD, Bauer S, Lehr W, Gilmore PW, Berger A (2008) The growing complexity of internet interconnection. Comm Strat 72:51–71
Feamster N, Winick J, Rexford J (2004) A model of BGP routing for network engineering. SIGMETRICS/Performance’04, ACM, pp 331–342
Ferguson P, Senie D (2000) Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. RFC 2827, RFC Editor
Fried M, Klemming L (2008) Severed cables in mediterranean disrupt communication. Bloomberg http://www.bloomberg.com/apps/news?pid=newsarchive&sid=aBa0lTN.dcoQ
Gill P, Arlitt M, Li Z, Mahanti A (2008) The flattening internet topology: natural evolution. Unsightly barnacles or contrived collapse? Ninth passive and active measurement conference (PAM)
Gill P, Schapira M, Goldberg S (2011) Let the market drive deployment: a strategy for transitioning to BGP security. Boston University Computer Science, Technical report BUCS-TR-2011-003. http://www.cs.bu.edu/~goldbe/papers/sbgpTrans.html
Griffin TG, Premore BJ (2001) An experimental analysis of BGP convergence time. ICNP’01, pp 53–61
Griffin TG, Shepherd FB, Wilfong G (2002) The stable paths problem and interdomain routing. IEEE ACM T Network 10(2):232–243
Hollnagel E, Woods DD, Leveson N (2006) Resilience engineering: concepts and precepts. Ashgate Publishing, Surrey, UK
Huston G (2009) The ISP column: is the transition to IPv6 a “market failure”? http://www.potaroo.net/ispcol/2009-09/v6trans.pdf
Huston G IPv4 Address Report. http://www.potaroo.net/tools/ipv4/
Huston G et al. CIDR Report. http://www.cidr-report.org
ISC. The ISC domain survey. http://www.isc.org/solutions/survey
Kent S (2011) Threat model for BGP path security. Working draft. http://tools.ietf.org/html/draft-kent-bgpsec-threats-01
Kent S, Lynn C, Seo K (2000) Secure border gateway protocol (S-BGP). IEEE J Sel Area Comm 18(4):582–592
Kitano H (2002) Systems biology: a brief overview. Science 295:1662–1664
Kuhn R, Sriram K, Montgomery D (2007) Border gateway protocol security—recommendations of the National Institute of Standards and Technology. NIST. http://csrc.nist.gov/publications/nistpubs/800-54/SP800-54.pdf
Kushman N, Kandula S, Katabi D (2007) Can you hear me now?! It must be BGP. SIGCOMM Comput Commun Rev 37:75–84
Labovitz C, Iekel-Johnson S, McPherson D, Oberheide J, Jahanian F (2010) Internet inter-domain traffic. SIGCOMM’10, ACM, pp 75–86
Lepinski M, Kent S (2011) An infrastructure to support secure internet routing. Working draft. http://tools.ietf.org/html/draft-ietf-sidr-arch-12
Lepinski M, Turner S (2011) An overview of BGPSEC. Working draft. http://tools.ietf.org/html/draft-lepinski-bgpsec-overview-00
Level 3 Communications, Inc. 2006 FORM 10-K For the fiscal year ended. http://lvlt.client.shareholder.com/secfiling.cfm?filingID=1104659-07-88481
Level 3 Communications, Inc. (2008) FORM 10-K For the fiscal year ended. http://lvlt.client.shareholder.com/secfiling.cfm?filingID=1047469-09-2002
Level 3 Communications, Inc. (2010) FORM 10-K For the fiscal year ended. http://lvlt.client.shareholder.com/secfiling.cfm?filingID=1047469-11-1410
Leyden J (2010) China routing snafu briefly mangles interweb—cockup, not conspiracy. The register. http://www.theregister.co.uk/2010/04/09/china_bgp_interweb_snafu/
Longstaff P Security, resilience, and communication in unpredictable environments such as terrorism, Natural disasters and complex technology. (2005) http://pirp.harvard.edu/pubs_pdf/longsta/longsta-p05-3.pdf
Magnuson S (2010) Cyber experts have proof that China has hijacked US-based internet traffic: UPDATED. National defense blog. http://www.nationaldefensemagazine.org/blog/Lists/Posts/Post.aspx?ID=249
McCullagh D (2008) How Pakistan knocked YouTube offline (and how to make sure it never happens again). CNet. http://news.cnet.com/8301-10784_3-9878655-7.html
McPherson D (2008) Internet routing insecurity: Pakistan nukes YouTube? Arbor networks blog http://asert.arbornetworks.com/2008/02/internet-routing-insecuritypakistan-nukes-youtube/
Mohapatra P, Scudder J, Bush R, Austein R (Eds.) (2011) BGP prefix origin validation. Working draft. http://tools.ietf.org/html/draft-ietf-sidr-pfx-validate-01
Norton B (2010) Internet transit prices—historical and projected. http://drpeering.net/white-papers/Internet-Transit-Pricing-Historical-And-Projected.php
Odlyzko A (2010) Collective hallucinations and inefficient markets: the British railway mania of the 1840s. http://www.dtc.umn.edu/~odlyzko/doc/hallucinations.pdf
Odlyzko A. Minnesota Internet Traffic Studies (MINTS). http://www.dtc.umn.edu/mints/
Oliveira R, Pei D, Willinger W, Zhang B, Zhang L (2010) The (in)completeness of the observed internet AS-level structure. IEEE ACM T Network 18:109–112
Partridge C et al. (2002) The internet under crisis conditions: learning from September 11. The National Academies Press, Washington
Popescu A (2008) Deja Vu all over again: cables cut in the mediterranean. Renesys blog. http://www.renesys.com/blog/2008/12/deja-vu-all-over-again-cables.shtml
Popescu AC, Premore BJ, Underwood T (2005) The anatomy of a leak: AS9121. NANOG 34 http://www.renesys.com/tech/presentations/pdf/renesys-nanog34.pdf
Quoitin B, Pelsser C, Swinnen L, Bonaventure O, Uhlig S (2003) Interdomain traffic engineering with BGP. IEEE Comm Mag 41(5):122–128
Radovcic S (2010) European Internet Exchange Association 2010 Report on European IXPs. https://www.euro-ix.net/resources/reports/euro-ix_report_2010.pdf
Rekhter Y, Li T, Hares S (2006) A border gateway protocol 4 (BGP-4). RFC4271, RFC Editor
RIPE NCC (2008) YouTube hijacking: A RIPE NCC RIS case study. http://www.ripe.net/news/study-youtube-hijacking.html
Romijn E (2010) RIPE NCC and Duke University BGP Experiment. http://labs.ripe.net/Members/erik/ripe-ncc-and-duke-university-bgp-experiment
Romijn E (2010) Re: did your BGP crash today? NANOG mailing list. http://www.merit.edu/mail.archives/nanog/msg11505.html
Siganos G, Faloutsos M (2004) Analysing BGP policies: methodology and tool. INFOCOM’04, IEEE, pp 1640–1651
Smith DJ (2005) Reliability, maintainability and risk. 7th edn. Elsevier, Amsterdam
Soares M (2009) Brazilian blackout traced to sooty insulators, not hackers. Wired. http://www.wired.com/threatlevel/2009/11/brazil_blackout/
Telegeography 2008 Four international cable breaks in a week. http://www.telegeography.com/cu/article.php?article_id=21567
Telegeography (2010) IP transit prices continue their downward trend. http://www.telegeography.com/cu/article.php?article_id=35206
UK Cabinet Office (2010) Cyber security. Fact Sheet 18. http://download.cabinetoffice.gov.uk/sdsr/factsheet18-cyber-security.pdf
Underwood T (2005) Internet-wide catastrophe—last year. Renesys blog. http://www.renesys.com/blog/2005/12/internetwide_nearcatastrophela.shtml
Wagner A (2008) Robustness and evolvability: a paradox resolved. Proc Biol Sci 275:91–100
Wang F, Mao, Z.M., Wang J, Gao L, Bush R (2006) A measurement study on the impact of routing events on end-to-end internet path performance. SIGCOMM’06, ACM, pp 375–386
Wang L, Zhao X, Pei D, Bush R, Massey D, Mankin A, Wu SF, Zhang L (2002) Observation and analysis of BGP behavior under stress. IMW’02, ACM, pp 183–195
Wilson G (2010) Fight cyber war before planes fall out of sky. The Sun. http://www.thesun.co.uk/sol/homepage/news/3186185/Security-chiefs-warn-Britain-must-protect-itself-against-cyber-warfare-amid-government-cuts.html
Xie L, Smith P, Banfield M, Leopold H, Sterbenz J, Hutchinson D (2005) Towards resilient networks using programmable networking technologies. IFIP IWAN
Yang YR, Xie H, Wang H, Silberschatz A, Kroshnamurthy A, Liu Y, Li LE (2005) On route selection for interdomain traffic engineering. IEEE Network 19(6):20–27
Yannuzzi M, Masip-Bruin X, Bonaventure O (2005) Open issues in interdomain routing: a survey. IEEE Network 19(6):49–56
Zmijewski E (2008) Mediterranean cable break—Part II. Renesys blog. http://www.renesys.com/blog/2008/01/mediterranean-cable-break-part-1.shtml
Zmijewski E (2008) Mediterranean cable break—Part III. Renesys blog. http://www.renesys.com/blog/2008/02/mediterranean-cable-break-part.shtml
Zmijewski E (2008) Mediterranean cable break—Part IV. Renesys blog. http://www.renesys.com/blog/2008/02/mediterranean-cable-break-part-3.shtml
Zmijewski E (2011) A closer look at the “Level 3 + Global Crossing” union. CircleID. http://www.circleid.com/posts/20110414_a_closer_look_at_the_level_3_and_global_crossing_union/
Acknowledgements
We would particularly like to thank all the industry, academic and public sector stakeholders that took part in the survey we conducted as part of the study.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this paper
Cite this paper
Hall, C., Anderson, R., Clayton, R., Ouzounis, E., Trimintzios, P. (2013). Resilience of the Internet Interconnection Ecosystem. In: Schneier, B. (eds) Economics of Information Security and Privacy III. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-1981-5_6
Download citation
DOI: https://doi.org/10.1007/978-1-4614-1981-5_6
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-1980-8
Online ISBN: 978-1-4614-1981-5
eBook Packages: Computer ScienceComputer Science (R0)