Close Menu
    Facebook X (Twitter) Instagram
    SciTechDaily
    • Biology
    • Chemistry
    • Earth
    • Health
    • Physics
    • Science
    • Space
    • Technology
    Facebook X (Twitter) Pinterest YouTube RSS
    SciTechDaily
    Home»Technology»25% of the World’s Internet Users Rely on Infrastructure That Is Susceptible to Attacks
    Technology

    25% of the World’s Internet Users Rely on Infrastructure That Is Susceptible to Attacks

    By University of California - San DiegoMay 27, 20221 Comment4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn WhatsApp Email Reddit
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email Reddit
    Digital World Internet Connectivity
    According to a large-scale study conducted by computer scientists, about a quarter of the world’s Internet users live in countries that are more susceptible than previously thought to targeted attacks on their Internet infrastructure.

    A study found that many developing nations are vulnerable to Internet attacks due to reliance on few providers and state-owned transit systems.

    About 25% of the world’s Internet users live in countries that are more vulnerable to targeted attacks on their Internet infrastructure than previously thought. Many of the at-risk countries are located in the Global South, which broadly includes the regions of Latin America, Asia, Africa, and Oceania.

    That’s the conclusion of a sweeping, large-scale study conducted by computer scientists at the University of California, San Diego (UCSD). The scientists surveyed 75 countries. 

    “We wanted to study the topology of the Internet to find weak links that, if compromised, would expose an entire nation’s traffic,” said Alexander Gamero-Garrido, the paper’s first author, who earned his Ph.D. in computer science at UCSD. 

    Differences in Internet Connectivity Structures

    The structure of Internet connectivity differs dramatically in different parts of the world. In many developed countries, such as the United States, a large number of Internet providers compete to provide services for a large number of users. These networks are directly connected to one another and exchange content, a process called direct peering. All the providers can also plug directly into the world’s Internet infrastructure.

    Internet Vulnerability Map
    Fraction of each country’s IP addresses that are exposed to observation or selective tampering by companies that connect Internet service providers to the global Internet. Countries are shaded in progressive shades of blue, with the most exposed countries in the darkest blue. Countries in gray were excluded from the study. Credit: University of California San Diego

    “But a large portion of the Internet doesn’t function with peering agreements for network connectivity,” Gamero-Garrido pointed out. 

    Vulnerability of State-Owned Transit Systems

    In other nations, many of them still developing countries, most users rely on a handful of providers for Internet access, and one of these providers serves an overwhelming majority of users. Not only that, but those providers rely on a limited number of companies called transit autonomous systems to get access to the global Internet and traffic from other countries. Researchers found that often these transit autonomous system providers are state-owned. 

    This, of course, makes countries with this type of Internet infrastructure particularly vulnerable to attacks because all that is needed is to cripple a small number of transit autonomous systems. These countries, of course, are also vulnerable if a main Internet provider experiences outages. 

    In the worst case scenario, one transit autonomous system serves all users. Cuba and Sierra Leone are close to this state of affairs. By contrast, Bangladesh went from only two to over 30 system providers, after the government opened that sector of the economy to private enterprise. 

    The Role of Government Regulation and Colonial Legacies

    This underlines the importance of government regulation when it comes to the number of Internet providers and transit autonomous systems available in a country. For example, researchers were surprised to find that many operators of submarine Internet cables are state-owned rather than privately operated.

    Researchers also found traces of colonialism in the topology of the Internet in the Global South. For example, French company Orange has a strong presence in some African countries. 

    Researchers relied on Border Gateway Protocol data, which tracks exchanges of routing and reachability information among autonomous systems on the Internet. They are aware that the data can be incomplete, introducing potential inaccuracies, though these are mitigated by the study’s methodology and validation with real, in-country Internet operators. 

    The next steps include looking at how critical facilities, such as hospitals, are connected to the Internet and how vulnerable they are. 

    Reference: “Quantifying Nations Exposure to Traffic Observation and Selective Tampering” by Alexander Gamero-Garrido, Esteban Carisimo, Shuai Hao, Bradley Huffaker, Alex C. Snoeren and Alberto Dainotti, 22 March 2022, International Conference on Passive and Active Network Measurement.
    DOI: 10.1007/978-3-030-98785-5_29
    PDF

    Authors: Alberto Dainotti (now at Georgia Institute of Technology),  Alexander Gamero-Garrido (now at Northeastern University), Bradley Huffaker and Alex C. Snoeren, University of California San Diego Esteban Carisimo, Northwestern University, Shuai Hao, Old Dominion University

    Never miss a breakthrough: Join the SciTechDaily newsletter.
    Follow us on Google and Google News.

    Cybersecurity Internet UCSD
    Share. Facebook Twitter Pinterest LinkedIn Email Reddit

    Related Articles

    Quantum Encryption Breakthrough Uses Light and Color to Create an Unhackable Internet

    Researchers Reveal What Happens When Your Phone Is Spying on You

    New Chip Can Prevent Hackers From Extracting Hidden Information From Smart Devices

    Computer Scientists Create Fake Videos That Fool State-of-the-Art Deepfake Detectors

    Popular Messenger Services – Such As WhatsApp, Signal, and Telegram – Are Extremely Insecure

    Princeton Has Developed a Technique for Tracking Online Foreign Misinformation Campaigns in Real Time

    New Algorithm Enables Wi-Fi Connected Vehicles to Share Data

    Chips As Mini Internets: CPU Cores Communicate by Networks Instead of Bus

    Optical Computer Memory Chips Could Ease Internet Traffic

    1 Comment

    1. xABBAAA on June 8, 2022 7:30 am

      … this will not be said by me…

      Reply
    Leave A Reply Cancel Reply

    • Facebook
    • Twitter
    • Pinterest
    • YouTube

    Don't Miss a Discovery

    Subscribe for the Latest in Science & Tech!

    Trending News

    Scientists May Have Found the Key to Jupiter and Saturn’s Moon Mystery

    Scientists Uncover Brain Changes That Link Pain to Depression

    Saunas May Do More Than Raise Body Temperature – They Activate Your Immune System

    Exercise in a Pill? Metformin Shows Surprising Effects in Cancer Patients

    Hidden Oceans of Magma Could Be Protecting Alien Life

    New Study Challenges Alzheimer’s Theories: It’s Not Just About Plaques

    Artificial Sweeteners May Harm Future Generations, Study Suggests

    Splashdown! NASA Artemis II Returns From Record-Breaking Moon Mission

    Follow SciTechDaily
    • Facebook
    • Twitter
    • YouTube
    • Pinterest
    • Newsletter
    • RSS
    SciTech News
    • Biology News
    • Chemistry News
    • Earth News
    • Health News
    • Physics News
    • Science News
    • Space News
    • Technology News
    Recent Posts
    • Humans Owe Their Eyes to a Tiny One-Eyed “Cyclops”
    • Researchers Capture Quantum Interference in One of Nature’s Rarest Atoms
    • Ancient DNA Reveals Irish Goats Have a 3,000-Year-Old Lineage Still Alive Today
    • Historians Reveal Secrets of the Strange Hat Wars That Shook Early Modern England
    • “A Plague Is Upon Us”: The Mass Death That Changed an Ancient City Forever
    Copyright © 1998 - 2026 SciTechDaily. All Rights Reserved.
    • Science News
    • About
    • Contact
    • Editorial Board
    • Privacy Policy
    • Terms of Use

    Type above and press Enter to search. Press Esc to cancel.