scholarly journals Analysis of the use of complete orders to abstract the internet connectivity at the autonomous system level

IET Networks ◽  
2018 ◽  
Vol 7 (1) ◽  
pp. 23-32
Author(s):  
Pedro David Arjona‐Villicaña ◽  
Costas C Constantinou ◽  
Alexander S Stepanenko ◽  
Jesús Acosta‐Elías
2005 ◽  
Vol 71 (6) ◽  
Author(s):  
Ginestra Bianconi ◽  
Guido Caldarelli ◽  
Andrea Capocci

2021 ◽  
Vol 5 (6) ◽  
pp. 1161-1170
Author(s):  
Valen Brata Pranaya ◽  
Theophilus Wellem

The validity of the routing advertisements sent by one router to another is essential for Internet connectivity. To perform routing exchanges between Autonomous Systems (AS) on the Internet, a protocol known as the Border Gateway Protocol (BGP) is used. One of the most common attacks on routers running BGP is prefix hijacking. This attack aims to disrupt connections between AS and divert routing to destinations that are not appropriate for crimes, such as fraud and data breach. One of the methods developed to prevent prefix hijacking is the Resource Public Key Infrastructure (RPKI). RPKI is a public key infrastructure (PKI) developed for BGP routing security on the Internet and can be used by routers to validate routing advertisements sent by their BGP peers. RPKI utilizes a digital certificate issued by the Certification Authority (CA) to validate the subnet in a routing advertisement. This study aims to implement BGP and RPKI using the Bird Internet Routing Daemon (BIRD). Simulation and implementation are carried out using the GNS3 simulator and a server that acts as the RPKI validator. Experiments were conducted using 4 AS, 7 routers, 1 server for BIRD, and 1 server for validators, and there were 26 invalid or unknown subnets advertised by 2 routers in the simulated topology. The experiment results show that the router can successfully validated the routing advertisement received from its BGP peer using RPKI. All invalid and unknown subnets are not forwarded to other routers in the AS where they are located such that route hijacking is prevented.  


Author(s):  
Alberto Garcia-Robledo ◽  
Arturo Diaz-Perez ◽  
Guillermo Morales-Luna

This Chapter studies the correlations among well-known complex network metrics and presents techniques to coarse the topology of the Internet at the Autonomous System (AS) level. We present an experimental study on the linear relationships between a rich set of complex network metrics, to methodologically select a subset of non-redundant and potentially independent metrics that explain different aspects of the topology of the Internet. Then, the selected metrics are used to evaluate graph coarsening algorithms to reduce the topology of AS networks. The presented coarsening algorithms exploit the k-core decomposition of graphs to preserve relevant complex network properties.


2016 ◽  
pp. 1-31
Author(s):  
M. G. Michael

When or how uberveillance will be implemented in its full-blown manifestation is still a subject for some intriguing discussion and a topic of robust disagreement, but what is generally accepted by most of the interlocutors is that an “uberveillance society” will emerge sooner rather than later, and that one way or another this will mean an immense upheaval in all of our societal, business, and government relationships. What is apparent from the numerous qualitative and quantitative studies conducted is that microchipping people is a discernibly divisive issue. If we continue on the current trajectory, we will soon see further divisions – not just between those who have access to the Internet and those who do not, but between those who subjugate themselves to be physically connected to the Web of Things and People, and those who are content enough to simply have Internet connectivity through external devices like smart phones, to those who opt to live completely off the grid. Time will only tell how we as human-beings will adapt after we willingly adopt innovations with extreme and irreversible operations. This introduction serves to provide a background context for the term uberveillance, which has received significant international attention since its establishment.


2021 ◽  
pp. 581-598
Author(s):  
Timotius Witono ◽  
Setiadi Yazid

Sign in / Sign up

Export Citation Format

Share Document