Skip to main content

Vulnerability Against Internet Disruptions – A Graph-Based Perspective

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9578))

Abstract

The Internet of today permeates societies and markets as a critical infrastructure. Dramatic network incidents have already happened in history with strong negative economic impacts. Therefore, assessing the vulnerability of Internet connections against failures, accidents and malicious attacks is an important field of high practical relevance. Based on a large integrated dataset describing the Internet as a complex graph, this paper develops a multi-dimensional Connectivity Risk Score that, to our knowledge, constitutes the first proposal for a topological connectivity-risk indicator of single Autonomous Systems, the organizational units of the Internet backbone. This score encompasses a variety of topological robustness metrics and can help risk managers to assess the vulnerability of their organizations even beyond network perimeters. Such analyses can be conducted in a user-friendly way with the help of CORIA, a newly developed software framework for connectivity risk analysis. Our approach can serve as an important element in an encompassing strategy to assess and improve companies’ connectivity to the Internet.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    An exception is the RIPE IRR. This registry is considered as the most accurate and current one [18]. Therefore, from the RIPE registry all entries last changed in 2011 and 2012 have been included in this dataset.

  2. 2.

    The complete list of identified metrics is available from the authors upon request.

References

  1. CDW. Billions Lost due to IT Network Outages in 2010: Survey (2011). http://www.eweek.com/c/a/Enterprise-Networking/Billions-Lost-Due-to-IT-Network-Outages-in-2010-Survey-559569. Accessed 30 Apr 2015

  2. Baumann, A., Fabian, B.: Who runs the internet? Classifying autonomous systems into industries. In: Proceedings of the 10th International Conference on Web Information Systems and Technologies (WEBIST), Barcelona, Spain (2014)

    Google Scholar 

  3. Tseng, J.C., Wu, C.-H.: An expert system approach to improving stability and reliability of web service. Expert Syst. Appl. 33(2), 379–388 (2007)

    Article  Google Scholar 

  4. Baumann, A., Fabian, B.: How robust is the internet? – Insights from graph analysis. In: Lopez, J., Ray, I., Crispo, B. (eds.) CRiSIS 2014. LNCS, vol. 8924, pp. 247–254. Springer, Heidelberg (2015)

    Google Scholar 

  5. Albert, R., Jeong, H., Barabási, A.-L.: Error and attack tolerance of complex networks. Nature 406, 378–382 (2000)

    Article  Google Scholar 

  6. Dolev, D., Jamin, S., Mokryn, O., Shavitt, Y.: Internet resiliency to attacks and failures under BGP policy routing. Comput. Netw. 50(16), 3183–3196 (2006)

    Article  MATH  Google Scholar 

  7. Wu, J., Zhang, Y., Morley Mao, Z., Shin, K.G.: Internet routing resilience to failures: analysis and implications. In: Proceedings of 2007 ACM CoNEXT Conference (CoNEXT 2007), New York, NY, USA (2007)

    Google Scholar 

  8. Xiao, S., Xiao, G., Cheng, T.H.: Tolerance of intentional attacks in complex communication networks. IEEE Commun. Mag. 46(1), 146–152 (2008)

    Article  Google Scholar 

  9. Deng, W., Karaliopoulos, M., Mühlbauer, W., Zhu, P., Lu, X., Plattner, B.: k-fault tolerance of the internet AS graph. Comput. Netw. 55(10), 2492–2503 (2011)

    Article  Google Scholar 

  10. Zhao, J., Wu, J., Chen, M., Fang, Z., Xu, K.: K-core-preferred attack to the internet: is it more malicious than degree attack? In: Wang, J., Xiong, H., Ishikawa, Y., Xu, J., Zhou, J. (eds.) WAIM 2013. LNCS, vol. 7923, pp. 717–728. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  11. Çetinkaya, E.K., Broyles, D., Dandekar, A., Srinivasan, S., Sterbenz, J.P.: Modelling communication network challenges for future internet resilience, survivability, and disruption tolerance: a simulation-based approach. Telecommun. Syst. 52(2), 751–766 (2013)

    Google Scholar 

  12. Shirazi, F., Diaz, C., Mullan, C., Wright, J., Buchmann, J.: Towards measuring resilience in anonymous communication networks. In: Proceedings of 6th Hot Topics in Privacy Enhancing Technologies (HotPETs 2013) (2013)

    Google Scholar 

  13. CAIDA AS Rank (2014). AS Ranking. http://as-rank.caida.org/. Accessed 30 Apr 2015

  14. UCLA (2014). http://irl.cs.ucla.edu/. Accessed 30 Apr 2015

  15. CAIDA Ark (2014). Archipelago Measurement Infrastructure. http://www.caida.org/projects/ark/. Accessed 30 Apr 2015

  16. IRR.net (2014). Internet Routing Registry. http://www.irr.net/. Accessed 30 Apr 2015

  17. Siganos, G., Faloutsos, M.: Detection of BGP routing misbehavior against cyber-terrorism. In: Proceedings of the 2005 IEEE Military Communications Conference (MILCOM 2005), pp. 923–929 (2005)

    Google Scholar 

  18. Zhang, B., Liu, R., Massey, D., Zhang, L.: Collecting the internet AS-level topology. ACM SIGCOMM Comput. Commun. Rev. 35(1), 53–61 (2005)

    Article  Google Scholar 

  19. Mahadevan, P., Krioukov, D., Fomenkov, M., Huffaker, B., Dimitropoulos, X., Claffy, K., Vahdat, A.: The internet AS-level topology: three data sources and one definitive metric. ACM SIGCOMM Comput. Commun. Rev. (CCR) 36(1), 17–26 (2006)

    Google Scholar 

  20. Manzano, M., Calle, E., Harle, D.: Quantitative and qualitative network robustness analysis under different multiple failure scenarios. In: Proceedings of the 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, pp. 1–7 (2011)

    Google Scholar 

  21. NetworkX (2014). http://networkx.lanl.gov/. Accessed 30 Apr 2015

  22. Redis (2014). http://redis.io/. Accessed 30 Apr 2015

  23. Sinatra (2014). http://www.sinatrarb.com/intro.html. Accessed 30 Apr 2015

  24. Twitter Bootstrap (2014). Twitter Bootstrap Library. http://getbootstrap.com/about/. Accessed 30 Apr 2015

  25. Lin, Y.-K., Chang, P.-C.: Maintenance reliability estimation for a cloud computing network with nodes failure. Expert Syst. Appl. 38(11), 14185–14189 (2011)

    MathSciNet  Google Scholar 

  26. Sterbenz, J.P.G., Hutchison, D., Çetinkaya, E.K., Jabbar, A., Rohrer, J.P., Schöller, M., Smith, P.: Resilience and survivability in communication networks: strategies, principles, and survey of disciplines. Comput. Netw. 54(8), 1245–1265 (2010)

    Article  MATH  Google Scholar 

  27. Wang, Y., Chakrabarti, D., Wang, C., Faloutsos, C.: Epidemic spreading in real networks: an eigenvalue viewpoint. In: International Symposium on Reliable Distributed Systems, pp. 25–34 (2003)

    Google Scholar 

  28. D’Agostino, G., Scala, A., Zlatić, V., Caldarelli, G.: Robustness and assortativity for diffusion-like processes in scale-free networks. EPL (Europhysics Letters) 97(6), 68006 (2012)

    Article  Google Scholar 

  29. Van Mieghem, P., Doerr, C., Wang, H., Hernandez, J.M., Hutchison, D., Karaliopoulos, M., Kooij, R.E.: A framework for computing topological network robustness. Delft University of Technology (2010)

    Google Scholar 

  30. ResumeNet (2011). http://www.resumenet.eu/. Accessed 14 Aug 2015

  31. Fabian, B., Baumann, A., Lackner, J.: Topological analysis of cloud service connectivity. Comput. Ind. Eng. 88, 151–165 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Annika Baumann .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Baumann, A., Fabian, B. (2016). Vulnerability Against Internet Disruptions – A Graph-Based Perspective. In: Rome, E., Theocharidou, M., Wolthusen, S. (eds) Critical Information Infrastructures Security. CRITIS 2015. Lecture Notes in Computer Science(), vol 9578. Springer, Cham. https://doi.org/10.1007/978-3-319-33331-1_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-33331-1_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-33330-4

  • Online ISBN: 978-3-319-33331-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics