scholarly journals The network information systems directive (EU) 2016/1148: internet service providers and registraties

2020 ◽  
Vol 338 ◽  
pp. 111-122
Author(s):  
Domenica Bagnato

The NIS Directive [1] defines critical infrastructures and operators of essential services. It also calls for organizational measures to ensure these infrastructures are protected from cybercrime and terrorism. This also includes the establishment of a national framework for emergency response. The list of essential services in Annex II does contain certain elements of Internet infrastructures, such as Domain Name Servers and Internet Exchange Points. However, in a truly remarkable omission, the Directive does not include Internet Service Providers (ISP) [2]. Since operators of essential services are subject to stringent security requirements, it would be helpful to include them as operators of essential services. This seems even more appropriate as many other Annex II infrastructures, such as banking, health and transport, heavily rely on a working Internet infrastructure, which is largely dependent on ISPs. This paper discusses the omission in the NIS Directive of the ISPs and the incomplete list and codependent registries namely, the IP address space registry and the Autonomous System registry and their necessity in supporting the root Domain Name System.

2020 ◽  
Vol 2020 ◽  
pp. 1-14
Author(s):  
Mariano Di Martino ◽  
Peter Quax ◽  
Wim Lamotte

Zero-rating is a technique where internet service providers (ISPs) allow consumers to utilize a specific website without charging their internet data plan. Implementing zero-rating requires an accurate website identification method that is also efficient and reliable to be applied on live network traffic. In this paper, we examine existing website identification methods with the objective of applying zero-rating. Furthermore, we demonstrate the ineffectiveness of these methods against modern encryption protocols such as Encrypted SNI and DNS over HTTPS and therefore show that ISPs are not able to maintain the current zero-rating approaches in the forthcoming future. To address this concern, we present “Open-Knock,” a novel approach that is capable of accurately identifying a zero-rated website, thwarts free-riding attacks, and is sustainable on the increasingly encrypted web. In addition, our approach does not require plaintext protocols or preprocessed fingerprints upfront. Finally, our experimental analysis unveils that we are able to convert each IP address to the correct domain name for each website in the Tranco top 6000 websites list with an accuracy of 50.5% and therefore outperform the current state-of-the-art approaches.


2019 ◽  
Vol 2 (3) ◽  
pp. 238-242
Author(s):  
Andreas Tedja ◽  
Charles Lim ◽  
Heru Purnomo Ipung

The Internet has become the biggest medium for people to communicate with otherpeople all around the world. However, the Internet is also home to hackers with maliciouspurposes. This poses a problem for Internet Service Providers (ISP) and its user, since it ispossible that their network is compromised and damages may be done. There are many types ofmalware that currently exist on the Internet. One of the growing type of malware is botnet.Botnet can infect a system and make it a zombie machine capable of doing distributed attacksunder the command of the botmaster. In order to make detection of botnet more difficult,botmasters often deploy fast flux. Fast flux will shuffle IP address of the domain of themalicious server, making tracking and detection much more difficult. However, there are stillnumerous ways to detect fast flux, one of them is by analysing DNS data. Domain Name System(DNS) is a crucial part of the Internet. DNS works by translating IP address to its associateddomain name. DNS are often being exploited by hackers to do its malicious activities. One ofthem is to deploy fast flux.Because the characteristics of fast flux is significantly different thannormal Internet traffic characteristics, it is possible to detect fast flux from normal Internettraffic from its DNS information. However, while detecting fast flux services, one must becautious since there are a few Internet services which have almost similar characteristics as fastflux service. This research manages to detect the existence of fast flux services in an ISPnetwork. The result is that fast flux mostly still has the same characteristics as found on previousresearches. However, current fast flux trend is to use cloud hosting services. The reason behindthis is that cloud hosting services tend to have better performance than typical zombie machine.Aside from this, it seems like there has been no specific measures taken by the hosting service toprevent this, making cloud hosting service the perfect medum for hosting botnet and fast fluxservices.


ADALAH ◽  
2020 ◽  
Vol 4 (2) ◽  
Author(s):  
Munadhil Abdul Muqsith

Abstract:The internet developed for the first time in Indonesia in the early 1990s. Starting from the pagayuban network, it is now expanding without boundaries anywhere. A survey conducted by the Indonesian Internet Service Providers Association (APJII) said that the number of internet users in Indonesia in 2012 reached 63 million people or 24.23 percent of the country's total population. Next year, that figure is predicted to increase by close to 30 percent to 82 million users and continue to grow to 107 million in 2014 and 139 million or 50 percent of the total population in 2015. million people. This matter also results in political communication with the internet media, or is often said to be cyber politics. Cyber politics in Indonesia has faced growth in recent years. There are many facilities that support the growth of cyber politics, such as Facebook, Twitter, mailing list, YouTube, and others.Keywords: Cyberpolitik, Internet  Abstrak:Internet berkembang pertama kali di Indonesia pada awal tahun 1990-an. Diawali dari pagayuban network kini berkembang luas tanpa batas dimanapun juga. Suatu survei yang diselenggarakan Asosiasi Penyelenggara Jasa Internet Indonesia (APJII) mengatakan kalau jumlah pengguna internet di Indonesia tahun 2012 menggapai 63 juta orang ataupun 24,23 persen dari total populasi negeri ini. Tahun depan, angka itu diprediksi naik dekat 30 persen jadi 82 juta pengguna serta terus berkembang jadi 107 juta pada 2014 serta 139 juta ataupun 50 persen total populasi pada 2015. juta orang. Perihal ini pula berakibat pada komunikasi politik dengan media internet, ataupun kerap diucap dengan cyber politic. Cyber politic di Indonesia hadapi pertumbuhan sebagian tahun terakhir. Banyaknya fasilitas yang menunjang pertumbuhan cyber politic semacam terdapatnya facebook, Twitter, mailing list, youtobe, serta lain-lain.Kata Kunci: Cyberpolitik, Internet 


2019 ◽  
Vol 10 (2) ◽  
pp. 168-177
Author(s):  
Haerdiansyah Syahnur ◽  
Jafar Basalamah

This study aimed to analyze the customer experience seen from the level of actual performance and the level of importance of services provided by internet service providers PT. XYZ in Makassar City. Variables and attributes issued by TM Forum GB 912 consisting of Customer Management, Fulfillment, Assurance, and Billing, are used to analyze the performance provided by customer service in the field. The analysis technique will be carried out using the Importance Performance Analysis and Customer Satisfaction Index consisting of quadrant analysis and gap analysis used to investigate customer satisfaction and identify variables whose performance is deemed to need improvement. Data were collected using a platform-based questionnaire application from 100 respondents selected using random sampling techniques. The results showed that customers were satisfied with the performance and quality of services provided. The customer satisfaction index value obtained by CSI analysis shows a value of 82.006%. In conclusion, that the Fulfillment variable is a service variable that is considered the most important customer and requires improvement because its performance is still relatively low. While the variables considered good and need to be maintained are the Billing variable. Other service variables are sorted based on priority of improvement in a row, namely Fulfillment, Customer Management, and Assurance.


2017 ◽  
Vol 15 (3) ◽  
pp. 41
Author(s):  
Zoltán Szűts ◽  
Jinil Yoo

Tanulmányunk témája a netsemlegesség. Először magát a fogalmat definiáljuk többféle módon, majd a netsemlegességgel kapcsolatos törvényhozói, internet- és tartalomszolgáltatói, valamint felhasználói kihívásokat, problémákat és válaszokat mutatjuk be. Számos szerző szerint az internet legnagyobb, immár tradicionális értéke a nyíltság, sokszínűség, tartalomgazdagság, tértől és időtől független társadalmi és perszonális kommunikációba való szabad belépés és a szabad verseny lehetősége. A netsemlegesség mellett és ellen felhozott érvek bemutatását is ezek a szempontok alapján tesszük. Kiemelt szerepet kap a netsemlegesség megsértésének kategorizálása is. Tanulmányunkban közlünk egy törvényalkotási kronológiát, mely az USA-ra, az EU-ra és Kelet-Ázsiára fókuszál, illetve ismertetjük a BEREC 2011-es felmérésének az EU-ban alkalmazott, internetszolgáltatói gyakorlatra vonatkozó eredményeit. A munkát az Internet.org kezdeményezést vizsgáló esettanulmány zárja, végül ezt követik a jövővel kapcsolatos kérdések, és néhány lehetséges válasz. --- Net neutrality - definitions and the standpoints of legislators, content providers, Internet service providers and users This article examines the topic of net neutrality. Firstly, it provides us with a theoretical insight and several definitions. Then it presents the issues and challenges legislators, ISP’s, content providers and users face. Several authors state that the biggest virtue and value of Internet lies in open access, diversity, richness of content, free competition, and low barrier entry for users in order to participate in personal social communication. Our presentation of arguments pro and cons net neutrality will be built on the basis of these considerations. Priority will be given to the introduction of several categories of net neutrality violations. In our paper we will present a legislative chronology in the topic focusing on USA, EU and Korea-Japan as well as the findings of the 2011 BEREC survey. Finally we examine the Internet.org project. In the conclusion, the article offers several more issues to be discussed and provides some possible answers.


Sign in / Sign up

Export Citation Format

Share Document