[171548] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Reviewers needed: How Internet Peering Improves Security

daemon@ATHENA.MIT.EDU (wbn)
Tue May 6 00:05:26 2014

X-Original-To: nanog@nanog.org
From: wbn <wbn@DrPeering.net>
Date: Mon, 5 May 2014 20:42:06 -0700
To: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org

Hi fellow NANOGers -

I recently spent some time with peering coordinators at industry events =
(NANOG, EPF, AFPIF, UKNOF, etc.) where I asked =93How does Internet =
Peering affect Internet Security?=94

The result of this exercise is a white paper, currently in its draft =
4-page form, entitled =93How Internet Peering Improves Security.=94

What I need now are a handful of people that are interested in this =
subject and willing to let me talk through the draft in order to solicit =
direct feedback. If interested, please send email to wbn@DrPeering.net =
with subject: "Review How Internet Peering Improves Security" and I will =
reach out to schedule some time.

Thanks in advance -

Bill

PS - Here is the abstract to help you decide if you are interested in =
helping me document this for the community, and yes, as usual, I will be =
happy to share the resulting white paper with anyone interested.


									=
How Internet Peering Improves Security

William B. Norton <wbn@DrPeering.net>

=20

Abstract

Denial-of-Service attacks continue to flood the Internet at increasing =
scale. They attack specific targets, while, as a side affect, disrupt =
any traffic that traverses the network attack paths. During these =
attacks, impacted Internet users may experience intermittent problems, =
such as video freeze frames, garbled audio during phone or Skype calls, =
or error messages indicating that their Internet cloud service is =
unavailable.

The ubiquitous and open nature of the Internet is both its value and its =
downfall. All one needs for access to cloud storage systems (DropBox, =
Box.net, etc.) is an Internet connection.  This also means that =
attackers need only a few thousand broadband computers, infected with =
viruses and taken over as zombies, to exploit this open Internet =
ecosystem and overwhelm even the most robust Internet services.

The attacks are not predictable in time, scope, or scale, and the =
impacts are far reaching, well beyond the source and destinations of the =
attacks. For these reason, the commodity Internet may not suitable for a =
subset of Internet applications. For example, some enterprise =
mission-critical applications require consistency simply unavailable =
from today=92s Internet Transit services.

There is however a well-known interconnection approach that improves =
this situation: an interconnection technique call =93Internet Peering.=93 =
This paper will introduce Internet Peering and discuss how Internet =
security is improved simply by using this common interconnection =
technique.=

home help back first fref pref prev next nref lref last post