Friday, May 27, 2022

A quarter of the world's Internet users rely on infrastructure that is susceptible to attacks

Reports and Proceedings

UNIVERSITY OF CALIFORNIA - SAN DIEGO

Map showing countries with the most at-risk infrastructure 

IMAGE: FRACTION OF EACH COUNTRY'S IP ADDRESSES THAT ARE EXPOSED TO OBSERVATION OR SELECTIVE TAMPERING BY COMPANIES THAT CONNECT INTERNET SERVICE PROVIDERS TO THE GLOBAL INTERNET. COUNTRIES ARE SHADED IN PROGRESSIVE SHADES OF BLUE, WITH WOST EXPOSED COUNTRIES IN THE DARKEST BLUE. COUNTRIES IN GRAY EXCLUDED FROM THE STUDY. view more 

CREDIT: UNIVERSITY OF CALIFORNIA SAN DIEGO

About a quarter of the world’s Internet users live in countries that are more susceptible than previously thought to targeted attacks on their Internet infrastructure. Many of the at-risk countries are located in the Global South. 

That’s the conclusion of a sweeping, large-scale study conducted by computer scientists at the University of California San Diego. The researchers surveyed 75 countries. 

“We wanted to study the topology of the Internet to find weak links that, if compromised, would expose an entire nation’s traffic,” said Alexander Gamero-Garrido, the paper’s first author, who earned his Ph.D. in computer science at UC San Diego. 

Researchers presented their findings at the Passive and Active Measurement Conference 2022 online this spring.

The structure of the Internet can differ dramatically in different parts of the world. In many developed countries, like the United States, a large number of Internet providers compete to provide services for a large number of users. These networks are directly connected to one another and exchange content, a process known as direct peering. All the providers can also plug directly into the world’s Internet infrastructure.

“But a large portion of the Internet doesn’t function with peering agreements for network connectivity,” Gamero-Garrido pointed out. 

In other nations, many of them still developing countries, most users rely on a handful of providers for Internet access, and one of these providers serves an overwhelming majority of users. Not only that, but those providers rely on a limited number of companies called transit autonomous systems to get access to the global Internet and traffic from other countries. Researchers found that often these transit autonomous system providers are state owned. 

This, of course, makes countries with this type of Internet infrastructure particularly vulnerable to attacks because all that is needed is to cripple a small number of transit autonomous systems. These countries, of course, are also vulnerable if a main Internet provider experiences outages. 

In the worst case scenario, one transit autonomous system serves all users. Cuba and Sierra Leone are close to this state of affairs. By contrast, Bangladesh went from only two to over 30 system providers, after the government opened that sector of the economy to private enterprise. 

This underlines the importance of government regulation when it comes to the number of Internet providers and transit autonomous systems available in a country. For example, researchers were surprised to find that many operators of submarine Internet cables are state-owned rather than privately operated.

Researchers also found traces of colonialism in the topology of the Internet in the Global South. For example, French company Orange has a strong presence in some African countries. 

Researchers relied on Border Gateway Protocol data, which tracks exchanges of routing and reachability information among autonomous systems on the Internet. They are aware that the data can be incomplete, introducing potential inaccuracies, though these are mitigated by the study’s methodology and validation with real, in-country Internet operators. 

Next steps include looking at how critical facilities, such as hospitals, are connected to the Internet and how vulnerable they are. 

Quantifying Nations’ Exposure to Traffic Observation and Selective Tampering (PDF)

 Alberto Dainotti (now at Georgia Institute of Technology),  Alexander Gamero-Garrido (now at Northeastern University), Bradley Huffaker and Alex C. Snoeren, University of California San Diego Esteban Carisimo, Northwestern University 
Shuai Hao, Old Dominion University 


 

No comments: