Skip to main content

Resilience of the Internet Interconnection Ecosystem

  • Conference paper
  • First Online:
Economics of Information Security and Privacy III

Abstract

In 2010 the European Network and Information Security Agency (ENISA) launched a study to investigate the resilience of the Internet’s interconnection system and come up with policy recommendations. A large number of stakeholders were contacted, and their expertise has been reflected in the study. The formal outcome of the study was the publication by ENISA in early 2011 of a detailed technical report, “Inter-X: Resilience of the Internet Interconnection Ecosystem”. This paper presents a much abridged version of the ENISA report. In it, we present a summary of the problems that the Internet faces in keeping its interconnection system resilient, along with the recommendations proposed to policy makers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Contrast transit with peering, where an ISP will arrange with another to carry traffic to and from each other’s customers. Since peering with every network in the world is impractical, ISPs will purchase transit contracts to carry the traffic that cannot be handled by peering relationships. Note that transit traffic is invariably paid for, whereas peering (which is usually only with other ISPs of a similar size, or between “content” and “eyeball” ASs) is generally free.

  2. 2.

    An IXP is a location to which many ISPs (and CDNs) connect. For the cost of a single link, they can exchange traffic (usually peering traffic, but sometimes transit) with all the other ISPs and CDNs who are IXP members.

  3. 3.

    An Internet Engineering Task Force (IETF) Best Common Practice (BCP) is as official as it gets on the Internet.

  4. 4.

    For a popular perception of the problems that government is grappling with see Fight Cyber War Before Planes Fall Out of Sky [79].

  5. 5.

    Just as the final version of the ENISA report was submitted, Level 3 (the transit provider with the largest market share) announced that it was acquiring Global Crossing (the second largest market share) for $3 billion ($1.1 of which is debt assumption), giving the merged company just over half of the market [86].

References

  1. Agarwal S, Chuah C, Bhattacharyya S, Diot C (2004) The impact of BGP dynamics on intra-domain traffic. SIGMETRICS/Performance’04, ACM, pp 319–330

    Google Scholar 

  2. Akamai Inc. (2010) Facts & Figures. http://www.akamai.com/html/about/facts_figures.html#6

  3. Alleman J, Liebenau J (2004) Network resilience and its regulatory inhibitors. Bohlin E et al. (eds) Global economy and digital society, Elsevier, Amsterdam, pp 379–394

    Google Scholar 

  4. Alperovitch D (2010) US-based internet traffic redirected to China. McAfee blog. http://blogs.mcafee.com/mcafee-labs/u-s-based-internet-traffic-redirected-to-china

  5. Alperovitch D (2010) April route hijack: sifting through the confusion. McAfee blog. http://blogs.mcafee.com/mcafee-labs/april-route-hijack-sifting-through-the-confusion-2

  6. Augustin B, Krishnamurthy B, Willinger W (2009) IXPs: mapped? IMC’09, pp 336–349

    Google Scholar 

  7. Blumenfeld L (2003) Dissertation could be security threat. Washington Post. http://www.washingtonpost.com/ac2/wp-dyn/A23689-2003Jul7

  8. Blunk LJ (2005) New BGP analysis tools and a look at the AS9121 incident. http://iepg.org/march2005/bgptools+as9121.pdf

  9. Bono VJ (1997) 7007 Explanation and apology. NANOG mailing list. http://www.merit.edu/mail.archives/nanog/1997-04/msg00444.html

  10. Brown MA (2008) Pakistan hijacks YouTube. Renesys blog. http://www.renesys.com/blog/2008/02/pakistan_hijacks_youtube_1.shtml

  11. Bush R, Maennel O, Roughan M, Uhlig S (2009) Internet optometry: assessing the broken glasses in internet reachability. IMC’09, pp 242–253

    Google Scholar 

  12. Butler K, Farley TR, McDaniel P, Rexford J (2010) A survey of BGP security issues and solutions. Proc IEEE 98(1):100–122

    Article  Google Scholar 

  13. Caesar M, Rexford J (2005) BGP routing policies in ISP networks. IEEE Network 19(6):5–11

    Article  Google Scholar 

  14. Chadd A (2006) Murphy’s Law strikes again: AS7007. Murphy’s law mailing list. http://lists.ucc.gu.uwa.edu.au/pipermail/lore/2006-August/000040.html

  15. Chang H, Willinger W (2006) Difficulties measuring the internet’s AS-level ecosystem. Information sciences and systems, pp 1479–1483

    Google Scholar 

  16. Cisco Systems (2010) Cisco visual networking index: forecast and methodology, 2009–2014. White paper. http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-481360.pdf

  17. Claffy KC (2008) Ten things lawyers should know about the internet. http://www.caida.org/publications/papers/2008/lawyers_top_ten/

  18. CNet News Staff (1997) Router glitch cuts net access. CNet News. http://news.cnet.com/2100-1033-279235.html

  19. Cowie J (2010) How to build a cybernuke. Renesys blog. http://www.renesys.com/blog/2010/04/how-to-build-a-cybernuke.shtml

  20. Cowie JH, Ogielski AT, Premore BJ, Smith EA, Underwood T (2003) Impact of the 2003 blackouts on internet communications. Renesys. http://www.renesys.com/tech/reports/Renesys_BlackoutReport.pdf

  21. Cowie J, Popescu A, Underwood T (2005) Impact of hurricane Katrina on internet infrastructure. Renesys. http://www.renesys.com/tech/presentations/pdf/Renesys-Katrina-Report-9sep2005.pdf

  22. De Bruijne M (2007) Systems that should have failed: critical infrastructure protection in an institutionally fragmented environment. J Contingencies Crisis Manag 15(1):1–29

    Article  Google Scholar 

  23. ENISA (2009) Good practice guide on national exercises. ENISA technical report. http://www.enisa.europa.eu/act/res/policies/good-practices-1/exercises/national-exercise-good-practice-guide

  24. ENISA (2011) Inter-X: resilience of the internet interconnection ecosystem. ENISA technical report. Available at http://www.enisa.europa.eu/act/res/other-areas/inter-x.

  25. ENISA (2011) Cyber Europe 2010—evaluation report. ENISA technical report. Available at http://www.enisa.europa.eu/act/res/cyber-europe-2010/cyber-europe-2010-report

  26. Faratin P, Clark DD, Bauer S, Lehr W, Gilmore PW, Berger A (2008) The growing complexity of internet interconnection. Comm Strat 72:51–71

    Google Scholar 

  27. Feamster N, Winick J, Rexford J (2004) A model of BGP routing for network engineering. SIGMETRICS/Performance’04, ACM, pp 331–342

    Google Scholar 

  28. Ferguson P, Senie D (2000) Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. RFC 2827, RFC Editor

    Google Scholar 

  29. Fried M, Klemming L (2008) Severed cables in mediterranean disrupt communication. Bloomberg http://www.bloomberg.com/apps/news?pid=newsarchive&sid=aBa0lTN.dcoQ

  30. Gill P, Arlitt M, Li Z, Mahanti A (2008) The flattening internet topology: natural evolution. Unsightly barnacles or contrived collapse? Ninth passive and active measurement conference (PAM)

    Google Scholar 

  31. Gill P, Schapira M, Goldberg S (2011) Let the market drive deployment: a strategy for transitioning to BGP security. Boston University Computer Science, Technical report BUCS-TR-2011-003. http://www.cs.bu.edu/~goldbe/papers/sbgpTrans.html

    Google Scholar 

  32. Griffin TG, Premore BJ (2001) An experimental analysis of BGP convergence time. ICNP’01, pp 53–61

    Google Scholar 

  33. Griffin TG, Shepherd FB, Wilfong G (2002) The stable paths problem and interdomain routing. IEEE ACM T Network 10(2):232–243

    Article  Google Scholar 

  34. Hollnagel E, Woods DD, Leveson N (2006) Resilience engineering: concepts and precepts. Ashgate Publishing, Surrey, UK

    Google Scholar 

  35. Huston G (2009) The ISP column: is the transition to IPv6 a “market failure”? http://www.potaroo.net/ispcol/2009-09/v6trans.pdf

  36. Huston G IPv4 Address Report. http://www.potaroo.net/tools/ipv4/

  37. Huston G et al. CIDR Report. http://www.cidr-report.org

  38. ISC. The ISC domain survey. http://www.isc.org/solutions/survey

  39. Kent S (2011) Threat model for BGP path security. Working draft. http://tools.ietf.org/html/draft-kent-bgpsec-threats-01

  40. Kent S, Lynn C, Seo K (2000) Secure border gateway protocol (S-BGP). IEEE J Sel Area Comm 18(4):582–592

    Article  Google Scholar 

  41. Kitano H (2002) Systems biology: a brief overview. Science 295:1662–1664

    Article  Google Scholar 

  42. Kuhn R, Sriram K, Montgomery D (2007) Border gateway protocol security—recommendations of the National Institute of Standards and Technology. NIST. http://csrc.nist.gov/publications/nistpubs/800-54/SP800-54.pdf

  43. Kushman N, Kandula S, Katabi D (2007) Can you hear me now?! It must be BGP. SIGCOMM Comput Commun Rev 37:75–84

    Article  Google Scholar 

  44. Labovitz C, Iekel-Johnson S, McPherson D, Oberheide J, Jahanian F (2010) Internet inter-domain traffic. SIGCOMM’10, ACM, pp 75–86

    Google Scholar 

  45. Lepinski M, Kent S (2011) An infrastructure to support secure internet routing. Working draft. http://tools.ietf.org/html/draft-ietf-sidr-arch-12

  46. Lepinski M, Turner S (2011) An overview of BGPSEC. Working draft. http://tools.ietf.org/html/draft-lepinski-bgpsec-overview-00

  47. Level 3 Communications, Inc. 2006 FORM 10-K For the fiscal year ended. http://lvlt.client.shareholder.com/secfiling.cfm?filingID=1104659-07-88481

  48. Level 3 Communications, Inc. (2008) FORM 10-K For the fiscal year ended. http://lvlt.client.shareholder.com/secfiling.cfm?filingID=1047469-09-2002

  49. Level 3 Communications, Inc. (2010) FORM 10-K For the fiscal year ended. http://lvlt.client.shareholder.com/secfiling.cfm?filingID=1047469-11-1410

  50. Leyden J (2010) China routing snafu briefly mangles interweb—cockup, not conspiracy. The register. http://www.theregister.co.uk/2010/04/09/china_bgp_interweb_snafu/

  51. Longstaff P Security, resilience, and communication in unpredictable environments such as terrorism, Natural disasters and complex technology. (2005) http://pirp.harvard.edu/pubs_pdf/longsta/longsta-p05-3.pdf

  52. Magnuson S (2010) Cyber experts have proof that China has hijacked US-based internet traffic: UPDATED. National defense blog. http://www.nationaldefensemagazine.org/blog/Lists/Posts/Post.aspx?ID=249

  53. McCullagh D (2008) How Pakistan knocked YouTube offline (and how to make sure it never happens again). CNet. http://news.cnet.com/8301-10784_3-9878655-7.html

  54. McPherson D (2008) Internet routing insecurity: Pakistan nukes YouTube? Arbor networks blog http://asert.arbornetworks.com/2008/02/internet-routing-insecuritypakistan-nukes-youtube/

  55. Mohapatra P, Scudder J, Bush R, Austein R (Eds.) (2011) BGP prefix origin validation. Working draft. http://tools.ietf.org/html/draft-ietf-sidr-pfx-validate-01

  56. Norton B (2010) Internet transit prices—historical and projected. http://drpeering.net/white-papers/Internet-Transit-Pricing-Historical-And-Projected.php

  57. Odlyzko A (2010) Collective hallucinations and inefficient markets: the British railway mania of the 1840s. http://www.dtc.umn.edu/~odlyzko/doc/hallucinations.pdf

  58. Odlyzko A. Minnesota Internet Traffic Studies (MINTS). http://www.dtc.umn.edu/mints/

  59. Oliveira R, Pei D, Willinger W, Zhang B, Zhang L (2010) The (in)completeness of the observed internet AS-level structure. IEEE ACM T Network 18:109–112

    Article  Google Scholar 

  60. Partridge C et al. (2002) The internet under crisis conditions: learning from September 11. The National Academies Press, Washington

    Google Scholar 

  61. Popescu A (2008) Deja Vu all over again: cables cut in the mediterranean. Renesys blog. http://www.renesys.com/blog/2008/12/deja-vu-all-over-again-cables.shtml

  62. Popescu AC, Premore BJ, Underwood T (2005) The anatomy of a leak: AS9121. NANOG 34 http://www.renesys.com/tech/presentations/pdf/renesys-nanog34.pdf

  63. Quoitin B, Pelsser C, Swinnen L, Bonaventure O, Uhlig S (2003) Interdomain traffic engineering with BGP. IEEE Comm Mag 41(5):122–128

    Article  Google Scholar 

  64. Radovcic S (2010) European Internet Exchange Association 2010 Report on European IXPs. https://www.euro-ix.net/resources/reports/euro-ix_report_2010.pdf

  65. Rekhter Y, Li T, Hares S (2006) A border gateway protocol 4 (BGP-4). RFC4271, RFC Editor

    Google Scholar 

  66. RIPE NCC (2008) YouTube hijacking: A RIPE NCC RIS case study. http://www.ripe.net/news/study-youtube-hijacking.html

  67. Romijn E (2010) RIPE NCC and Duke University BGP Experiment. http://labs.ripe.net/Members/erik/ripe-ncc-and-duke-university-bgp-experiment

  68. Romijn E (2010) Re: did your BGP crash today? NANOG mailing list. http://www.merit.edu/mail.archives/nanog/msg11505.html

  69. Siganos G, Faloutsos M (2004) Analysing BGP policies: methodology and tool. INFOCOM’04, IEEE, pp 1640–1651

    Google Scholar 

  70. Smith DJ (2005) Reliability, maintainability and risk. 7th edn. Elsevier, Amsterdam

    Google Scholar 

  71. Soares M (2009) Brazilian blackout traced to sooty insulators, not hackers. Wired. http://www.wired.com/threatlevel/2009/11/brazil_blackout/

  72. Telegeography 2008 Four international cable breaks in a week. http://www.telegeography.com/cu/article.php?article_id=21567

  73. Telegeography (2010) IP transit prices continue their downward trend. http://www.telegeography.com/cu/article.php?article_id=35206

  74. UK Cabinet Office (2010) Cyber security. Fact Sheet 18. http://download.cabinetoffice.gov.uk/sdsr/factsheet18-cyber-security.pdf

  75. Underwood T (2005) Internet-wide catastrophe—last year. Renesys blog. http://www.renesys.com/blog/2005/12/internetwide_nearcatastrophela.shtml

  76. Wagner A (2008) Robustness and evolvability: a paradox resolved. Proc Biol Sci 275:91–100

    Article  Google Scholar 

  77. Wang F, Mao, Z.M., Wang J, Gao L, Bush R (2006) A measurement study on the impact of routing events on end-to-end internet path performance. SIGCOMM’06, ACM, pp 375–386

    Google Scholar 

  78. Wang L, Zhao X, Pei D, Bush R, Massey D, Mankin A, Wu SF, Zhang L (2002) Observation and analysis of BGP behavior under stress. IMW’02, ACM, pp 183–195

    Google Scholar 

  79. Wilson G (2010) Fight cyber war before planes fall out of sky. The Sun. http://www.thesun.co.uk/sol/homepage/news/3186185/Security-chiefs-warn-Britain-must-protect-itself-against-cyber-warfare-amid-government-cuts.html

  80. Xie L, Smith P, Banfield M, Leopold H, Sterbenz J, Hutchinson D (2005) Towards resilient networks using programmable networking technologies. IFIP IWAN

    Google Scholar 

  81. Yang YR, Xie H, Wang H, Silberschatz A, Kroshnamurthy A, Liu Y, Li LE (2005) On route selection for interdomain traffic engineering. IEEE Network 19(6):20–27

    Article  Google Scholar 

  82. Yannuzzi M, Masip-Bruin X, Bonaventure O (2005) Open issues in interdomain routing: a survey. IEEE Network 19(6):49–56

    Article  Google Scholar 

  83. Zmijewski E (2008) Mediterranean cable break—Part II. Renesys blog. http://www.renesys.com/blog/2008/01/mediterranean-cable-break-part-1.shtml

  84. Zmijewski E (2008) Mediterranean cable break—Part III. Renesys blog. http://www.renesys.com/blog/2008/02/mediterranean-cable-break-part.shtml

  85. Zmijewski E (2008) Mediterranean cable break—Part IV. Renesys blog. http://www.renesys.com/blog/2008/02/mediterranean-cable-break-part-3.shtml

  86. Zmijewski E (2011) A closer look at the “Level 3 + Global Crossing” union. CircleID. http://www.circleid.com/posts/20110414_a_closer_look_at_the_level_3_and_global_crossing_union/

Download references

Acknowledgements

We would particularly like to thank all the industry, academic and public sector stakeholders that took part in the survey we conducted as part of the study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chris Hall .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Hall, C., Anderson, R., Clayton, R., Ouzounis, E., Trimintzios, P. (2013). Resilience of the Internet Interconnection Ecosystem. In: Schneier, B. (eds) Economics of Information Security and Privacy III. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-1981-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-1981-5_6

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-1980-8

  • Online ISBN: 978-1-4614-1981-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics