Abstract
The Internet of today permeates societies and markets as a critical infrastructure. Dramatic network incidents have already happened in history with strong negative economic impacts. Therefore, assessing the vulnerability of Internet connections against failures, accidents and malicious attacks is an important field of high practical relevance. Based on a large integrated dataset describing the Internet as a complex graph, this paper develops a multi-dimensional Connectivity Risk Score that, to our knowledge, constitutes the first proposal for a topological connectivity-risk indicator of single Autonomous Systems, the organizational units of the Internet backbone. This score encompasses a variety of topological robustness metrics and can help risk managers to assess the vulnerability of their organizations even beyond network perimeters. Such analyses can be conducted in a user-friendly way with the help of CORIA, a newly developed software framework for connectivity risk analysis. Our approach can serve as an important element in an encompassing strategy to assess and improve companies’ connectivity to the Internet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
An exception is the RIPE IRR. This registry is considered as the most accurate and current one [18]. Therefore, from the RIPE registry all entries last changed in 2011 and 2012 have been included in this dataset.
- 2.
The complete list of identified metrics is available from the authors upon request.
References
CDW. Billions Lost due to IT Network Outages in 2010: Survey (2011). http://www.eweek.com/c/a/Enterprise-Networking/Billions-Lost-Due-to-IT-Network-Outages-in-2010-Survey-559569. Accessed 30 Apr 2015
Baumann, A., Fabian, B.: Who runs the internet? Classifying autonomous systems into industries. In: Proceedings of the 10th International Conference on Web Information Systems and Technologies (WEBIST), Barcelona, Spain (2014)
Tseng, J.C., Wu, C.-H.: An expert system approach to improving stability and reliability of web service. Expert Syst. Appl. 33(2), 379–388 (2007)
Baumann, A., Fabian, B.: How robust is the internet? – Insights from graph analysis. In: Lopez, J., Ray, I., Crispo, B. (eds.) CRiSIS 2014. LNCS, vol. 8924, pp. 247–254. Springer, Heidelberg (2015)
Albert, R., Jeong, H., Barabási, A.-L.: Error and attack tolerance of complex networks. Nature 406, 378–382 (2000)
Dolev, D., Jamin, S., Mokryn, O., Shavitt, Y.: Internet resiliency to attacks and failures under BGP policy routing. Comput. Netw. 50(16), 3183–3196 (2006)
Wu, J., Zhang, Y., Morley Mao, Z., Shin, K.G.: Internet routing resilience to failures: analysis and implications. In: Proceedings of 2007 ACM CoNEXT Conference (CoNEXT 2007), New York, NY, USA (2007)
Xiao, S., Xiao, G., Cheng, T.H.: Tolerance of intentional attacks in complex communication networks. IEEE Commun. Mag. 46(1), 146–152 (2008)
Deng, W., Karaliopoulos, M., Mühlbauer, W., Zhu, P., Lu, X., Plattner, B.: k-fault tolerance of the internet AS graph. Comput. Netw. 55(10), 2492–2503 (2011)
Zhao, J., Wu, J., Chen, M., Fang, Z., Xu, K.: K-core-preferred attack to the internet: is it more malicious than degree attack? In: Wang, J., Xiong, H., Ishikawa, Y., Xu, J., Zhou, J. (eds.) WAIM 2013. LNCS, vol. 7923, pp. 717–728. Springer, Heidelberg (2013)
Çetinkaya, E.K., Broyles, D., Dandekar, A., Srinivasan, S., Sterbenz, J.P.: Modelling communication network challenges for future internet resilience, survivability, and disruption tolerance: a simulation-based approach. Telecommun. Syst. 52(2), 751–766 (2013)
Shirazi, F., Diaz, C., Mullan, C., Wright, J., Buchmann, J.: Towards measuring resilience in anonymous communication networks. In: Proceedings of 6th Hot Topics in Privacy Enhancing Technologies (HotPETs 2013) (2013)
CAIDA AS Rank (2014). AS Ranking. http://as-rank.caida.org/. Accessed 30 Apr 2015
UCLA (2014). http://irl.cs.ucla.edu/. Accessed 30 Apr 2015
CAIDA Ark (2014). Archipelago Measurement Infrastructure. http://www.caida.org/projects/ark/. Accessed 30 Apr 2015
IRR.net (2014). Internet Routing Registry. http://www.irr.net/. Accessed 30 Apr 2015
Siganos, G., Faloutsos, M.: Detection of BGP routing misbehavior against cyber-terrorism. In: Proceedings of the 2005 IEEE Military Communications Conference (MILCOM 2005), pp. 923–929 (2005)
Zhang, B., Liu, R., Massey, D., Zhang, L.: Collecting the internet AS-level topology. ACM SIGCOMM Comput. Commun. Rev. 35(1), 53–61 (2005)
Mahadevan, P., Krioukov, D., Fomenkov, M., Huffaker, B., Dimitropoulos, X., Claffy, K., Vahdat, A.: The internet AS-level topology: three data sources and one definitive metric. ACM SIGCOMM Comput. Commun. Rev. (CCR) 36(1), 17–26 (2006)
Manzano, M., Calle, E., Harle, D.: Quantitative and qualitative network robustness analysis under different multiple failure scenarios. In: Proceedings of the 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, pp. 1–7 (2011)
NetworkX (2014). http://networkx.lanl.gov/. Accessed 30 Apr 2015
Redis (2014). http://redis.io/. Accessed 30 Apr 2015
Sinatra (2014). http://www.sinatrarb.com/intro.html. Accessed 30 Apr 2015
Twitter Bootstrap (2014). Twitter Bootstrap Library. http://getbootstrap.com/about/. Accessed 30 Apr 2015
Lin, Y.-K., Chang, P.-C.: Maintenance reliability estimation for a cloud computing network with nodes failure. Expert Syst. Appl. 38(11), 14185–14189 (2011)
Sterbenz, J.P.G., Hutchison, D., Çetinkaya, E.K., Jabbar, A., Rohrer, J.P., Schöller, M., Smith, P.: Resilience and survivability in communication networks: strategies, principles, and survey of disciplines. Comput. Netw. 54(8), 1245–1265 (2010)
Wang, Y., Chakrabarti, D., Wang, C., Faloutsos, C.: Epidemic spreading in real networks: an eigenvalue viewpoint. In: International Symposium on Reliable Distributed Systems, pp. 25–34 (2003)
D’Agostino, G., Scala, A., Zlatić, V., Caldarelli, G.: Robustness and assortativity for diffusion-like processes in scale-free networks. EPL (Europhysics Letters) 97(6), 68006 (2012)
Van Mieghem, P., Doerr, C., Wang, H., Hernandez, J.M., Hutchison, D., Karaliopoulos, M., Kooij, R.E.: A framework for computing topological network robustness. Delft University of Technology (2010)
ResumeNet (2011). http://www.resumenet.eu/. Accessed 14 Aug 2015
Fabian, B., Baumann, A., Lackner, J.: Topological analysis of cloud service connectivity. Comput. Ind. Eng. 88, 151–165 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Baumann, A., Fabian, B. (2016). Vulnerability Against Internet Disruptions – A Graph-Based Perspective. In: Rome, E., Theocharidou, M., Wolthusen, S. (eds) Critical Information Infrastructures Security. CRITIS 2015. Lecture Notes in Computer Science(), vol 9578. Springer, Cham. https://doi.org/10.1007/978-3-319-33331-1_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-33331-1_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-33330-4
Online ISBN: 978-3-319-33331-1
eBook Packages: Computer ScienceComputer Science (R0)