"Review How Internet Peering Improves Security" [Re: Reviewers needed: How Internet Peering Improves Security]

Joe Provo nanog-post at rsuc.gweep.net
Wed May 7 11:19:12 UTC 2014


This has always been the case, and traffic splay and origin/sink
management has been more important than cost savings since at 
least 2002? Maybe 2001. Definitely before 2004.

On Mon, May 05, 2014 at 08:42:06PM -0700, wbn wrote:
> Hi fellow NANOGers -
> 
> I recently spent some time with peering coordinators at industry events (NANOG, EPF, AFPIF, UKNOF, etc.) where I asked ?How does Internet Peering affect Internet Security??
> 
> The result of this exercise is a white paper, currently in its draft 4-page form, entitled ?How Internet Peering Improves Security.?
> 
> What I need now are a handful of people that are interested in this subject and willing to let me talk through the draft in order to solicit direct feedback. If interested, please send email to wbn at DrPeering.net with subject: "Review How Internet Peering Improves Security" and I will reach out to schedule some time.
> 
> Thanks in advance -
> 
> Bill
> 
> PS - Here is the abstract to help you decide if you are interested in helping me document this for the community, and yes, as usual, I will be happy to share the resulting white paper with anyone interested.
> 
> 
> 									How Internet Peering Improves Security
> 
> William B. Norton <wbn at DrPeering.net>
> 
>  
> 
> Abstract
> 
> Denial-of-Service attacks continue to flood the Internet at increasing scale. They attack specific targets, while, as a side affect, disrupt any traffic that traverses the network attack paths. During these attacks, impacted Internet users may experience intermittent problems, such as video freeze frames, garbled audio during phone or Skype calls, or error messages indicating that their Internet cloud service is unavailable.
> 
> The ubiquitous and open nature of the Internet is both its value and its downfall. All one needs for access to cloud storage systems (DropBox, Box.net, etc.) is an Internet connection.  This also means that attackers need only a few thousand broadband computers, infected with viruses and taken over as zombies, to exploit this open Internet ecosystem and overwhelm even the most robust Internet services.
> 
> The attacks are not predictable in time, scope, or scale, and the impacts are far reaching, well beyond the source and destinations of the attacks. For these reason, the commodity Internet may not suitable for a subset of Internet applications. For example, some enterprise mission-critical applications require consistency simply unavailable from today?s Internet Transit services.
> 
> There is however a well-known interconnection approach that improves this situation: an interconnection technique call ?Internet Peering.? This paper will introduce Internet Peering and discuss how Internet security is improved simply by using this common interconnection technique.
-- 
        RSUC / GweepNet / Spunk / FnB / CotSG / Usenix / NANOG



More information about the NANOG mailing list