[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3486622.3493980acmconferencesArticle/Chapter ViewAbstractPublication PageswiConference Proceedingsconference-collections
short-paper
Open access

A Framework for Internet Connectivity Risk Assessment Based on Graph Models

Published: 13 April 2022 Publication History

Abstract

Autonomous systems (AS) that relay Internet traffic are not equally well connected. The failure of just a tiny portion of them can render multiple sites inaccessible and disconnect multiple service providers from the global network, while targeted attacks can severely impact Internet connectivity. Modeling Internet topology and measuring Internet connectivity can help determine Internet vulnerabilities and improve Internet performance. With this in mind, we have redesigned and implemented a framework called CORIA that enables the analysis of Internet connectivity risks using large network graphs. The requirements we set for the design include technological extensibility, combination of different data sets, intuitive and customizable user interface, rich visual representation of results, and performance efficiency.

References

[1]
J. A. Hawkinson and T. J. Bates, “Guidelines for creation, selection, and registration of an Autonomous System (AS).” RFC 1930, 1930. [Online]. Available: https://rfc-editor.org/rfc/rfc1930.txt
[2]
D. Magoni, “Robustness performance of the Internet connectivity under targeted attacks,” in International Conference on Communication Technology Proceedings, 2003. ICCT 2003., Apr. 2003, vol. 2, pp. 1440–1443 vol.2.
[3]
A. Baumann and B. Fabian, “How Robust is the Internet? – Insights from Graph Analysis,” in Risks and Security of Internet and Systems, Cham, 2015, pp. 247–254.
[4]
S. Dombrowski, T. Ermakova, and B. Fabian, “Graph-based analysis of cloud connectivity at the internet protocol level,” IJCNDS, vol. 23, no. 1, p. 117, 2019.
[5]
B. Fabian, S. Kelkel, T. Ermakova, and A. Baumann, “Attacking Internet Border Routers – A Graph-Based Analysis of Strategies,” Social Science Research Network, Rochester, NY, SSRN Scholarly Paper ID 3213176, Jul. 2018.
[6]
B. Fabian, Z. Ghazaryan, and T. Ermakova, “Internet Connectivity of Financial Services – A Graph-Based Analysis,” Social Science Research Network, Rochester, NY, SSRN Scholarly Paper ID 3213204, Jul. 2018.
[7]
N. Thanthry, M. S. Ali, and R. Pendse, “Security, Internet connectivity and aircraft data networks,” in Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, Oct. 2005, pp. 251–255.
[8]
H. Seo, “Country Characteristics, Internet Connectivity and Combating Misinformation: A Network Analysis of Global North-South,” Hawaii International Conference on System Sciences 2021 (HICSS-54), Jan. 2021, [Online]. Available: https://aisel.aisnet.org/hicss-54/dsm/sna/4
[9]
L. M. Froeb, R. W. Oliver, and D. A. Weiskopf, “Geographic variation in Internet connectivity,” in Proceedings of HICSS-29: 29th Hawaii International Conference on System Sciences, Jan. 1996, vol. 2, pp. 480–485 vol.2.
[10]
M. Lad, R. Oliveira, B. Zhang, and L. Zhang, “Understanding Resiliency of Internet Topology against Prefix Hijack Attacks,” in 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’07), Jun. 2007, pp. 368–377.
[11]
C. Jianhong, X. Jianqing, and S. Liang, “A time-varying evolving Internet topology model,” in 2010 Second International Conference on Communication Systems, Networks and Applications, Jun. 2010, vol. 1, pp. 275–278.
[12]
R. Rossi, S. Fahmy, and N. Talukder, “A multi-level approach for evaluating internet topology generators,” in 2013 IFIP Networking Conference, May 2013, pp. 1–9.
[13]
C. A. Shue, A. J. Kalafut, and M. Gupta, “Abnormally Malicious Autonomous Systems and Their Internet Connectivity,” IEEE/ACM Transactions on Networking, vol. 20, no. 1, pp. 220–230, Feb. 2012.
[14]
S. Rajkumar and P. Ramanathan, “PriceMyRoute: A competitive pricing strategy for Internet connectivity service providers,” in 2011 IEEE Nineteenth IEEE International Workshop on Quality of Service, Jun. 2011, pp. 1–3.
[15]
B. Fabian, A. Baumann, M. Ehlert, V. Ververis, and T. Ermakova, “CORIA — Analyzing internet connectivity risks using network graphs,” in 2017 IEEE International Conference on Communications (ICC), May 2017, pp. 1–6.
[16]
A. R. Hevner, S. T. March, J. Park, and S. Ram, “Design Science in Information Systems Research,” MIS Quarterly, vol. 28, no. 1, pp. 75–105, 2004.
[17]
B. Donnet and T. Friedman, “Internet topology discovery: a survey,” IEEE Communications Surveys Tutorials, vol. 9, no. 4, pp. 56–69, 2007.
[18]
L. Basheir, “Power-law Degree Distribution Consistency in the AS-level Internet Topology,” in 2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE), Aug. 2018, pp. 1–5.
[19]
D. Fay, “Weighted Spectral Distribution for Internet Topology Analysis: Theory and Applications,” IEEE/ACM Transactions on Networking, vol. 18, no. 1, pp. 164–176, Feb. 2010.
[20]
L. Subedi and L. Trajković, “Spectral analysis of Internet topology graphs,” in Proceedings of 2010 IEEE International Symposium on Circuits and Systems, May 2010, pp. 1803–1806.
[21]
T. Witono and S. Yazid, “Analysis of Indonesia's Internet Topology Borders at the Autonomous System Level,” in 2020 3rd International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), Dec. 2020, pp. 545–550.
[22]
J. Wu, H. Deng, and Y. Tan, “Spectral measure of robustness for Internet topology,” in 2010 3rd International Conference on Computer Science and Information Technology, Jul. 2010, vol. 6, pp. 50–54.
[23]
G. Tilch, T. Ermakova, and B. Fabian, “A multilayer graph model of the internet topology,” IJNVO, vol. 22, no. 3, p. 219, 2020.
[24]
M. J. Zaki and W. M. Jr, Data Mining and Analysis: Fundamental Concepts and Algorithms. New York, NY: Cambridge University Press, 2014.
[25]
A. Baumann and B. Fabian, “Vulnerability Against Internet Disruptions – A Graph-Based Perspective,” Oct. 2015.
[26]
D. Kiene-Maksimovic, E. Zinovyeva, B. Fabian, and J. Park, “CORIA 2.0 – Augmenting a Universal Framework for Connectivity Risk Analysis,” Social Science Research Network, Rochester, NY, SSRN Scholarly Paper ID 3060327, Oct. 2017.
[27]
F. Tarissan, É. Rotenberg, M. Latapy, and C. Crespelle, “UDP Ping: A Dedicated Tool for Improving Measurements of the Internet Topology,” in 2014 IEEE 22nd International Symposium on Modelling, Analysis Simulation of Computer and Telecommunication Systems, Sep. 2014, pp. 506–509.
[28]
H. Kardes, M. Gunes, and T. Oz, “Cheleby: A subnet-level internet topology mapping system,” in 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012), Jan. 2012, pp. 1–10.
[29]
D. J. Rough and A. Quigley, “End-User Development of Experience Sampling Smartphone Apps -Recommendations and Requirements,” Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., vol. 4, no. 2, p. 56:1-56:19, Jun. 2020.
[30]
M. A. Canbaz, J. Thom, and M. H. Gunes, “Comparative analysis of internet topology data sets,” in 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), May 2017, pp. 635–640.
[31]
Y. Xu and Z. Wang, “On an IBA Topology Model for Internet Topology Structure,” in 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, Apr. 2010, vol. 2, pp. 114–117.
[32]
J. Chen and L. Trajkovic, “Analysis of Internet topology data,” in 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512), May 2004, vol. 4, p. IV–629.
[33]
U. Y. Keller, E. Savin, B. Fabian, and T. Ermakova, “Towards geographical analysis of the autonomous system network,” IJNVO, vol. 21, no. 3, p. 379, 2019.
[34]
R. T. Fielding, “Architectural styles and the design of network-based software architectures,” phd, University of California, Irvine, 2000.
[35]
M. Oehlers and B. Fabian, “Graph Metrics for Network Robustness—A Survey,” Mathematics, vol. 9, no. 8, Art. no. 8, Jan. 2021.
[36]
D. Papadimitriou and D. Careglio, “Nonparametric statistical methods to analyze the internet connectivity reliability,” in 2015 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR), May 2015, pp. 1–6.
[37]
M. Tantardini, F. Ieva, L. Tajoli, and C. Piccardi, “Comparing methods for comparing networks,” Sci Rep, vol. 9, no. 1, p. 17557, Nov. 2019.

Cited By

View all
  • (2022)The Internet of Things Network Penetration Testing Model Using Attack Graph Analysis2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)10.1109/ISMSIT56059.2022.9932758(360-368)Online publication date: 20-Oct-2022

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology
December 2021
698 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 April 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Autonomous systems
  2. Internet connectivity risk
  3. Internet robustness
  4. Parallel execution

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Conference

WI-IAT '21
Sponsor:
WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence
December 14 - 17, 2021
VIC, Melbourne, Australia

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)133
  • Downloads (Last 6 weeks)18
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2022)The Internet of Things Network Penetration Testing Model Using Attack Graph Analysis2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)10.1109/ISMSIT56059.2022.9932758(360-368)Online publication date: 20-Oct-2022

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media