Interesting People mailing list archives
National Science Foundation Update -- Mysteries of the Unregulated Internet
From: David Farber <dave () farber net>
Date: Fri, 3 Oct 2008 04:17:15 -0400
Begin forwarded message: From: bobr () bobrosenberg phoenix az us Date: October 3, 2008 1:41:53 AM EDT To: dave () farber netSubject: National Science Foundation Update -- Mysteries of the Unregulated Internet
Hi Dave Perhaps interesting to I.P. Cheers, Bob -- Bob Rosenberg P.O. Box 33023 Phoenix, AZ 85067-3023 Mobile: 602-206-2856 LandLine: 602-274-3012 bob () bobrosenberg phoenix az us **************"Once a government is committed to the principle of silencing the voice of opposition, it has only one way to go, and that is down the path of increasingly repressive measures, until it becomes a source of terror to all its citizens and
creates a country where everyone lives in fear." -- President Harry S. Truman, message to Congress, August 8, 1950 ************** From: National Science Foundation Update <nsf-update () nsf gov> Date: Wed, 1 Oct 2008 16:17:10 -0500 (CDT) Subject: Mysteries of the Unregulated Internet Mysteries of the Unregulated InternetImage showing a visualization study of inbound traffic on the NSFNET T1 backbone for September 1991. Researchers develop an alert system and protocol improvements to
keep Internet traffic flowing smoothly More at http://www.nsf.gov/discoveries/disc_summ.jsp?cntn_id=111970&govDel=USNSF_1 This is an NSF Discoveries item. Discovery Mysteries of the Unregulated InternetResearchers develop an alert system and protocol improvements to keep Internet
traffic flowing smoothlyImage showing a visualization study of inbound traffic on the NSFNET T1 backbone for
September 1991.Image of a visualization study of inbound traffic on the NSFNET T1 backbone for
September 1991. Credit and Larger Version September 29, 2008One Sunday afternoon last February, the YouTube Web site disappeared from the
Internet. YouTube didn't take it down.The problem came from Pakistan, when a telecommunications company suddenly began
rerouting traffic to and from the Web site into an Internet black hole.Incidents like this fascinate University of New Mexico (UNM) graduate student Josh Karlin. With a National Science Foundation (NSF) grant, he built and posted an Internet Alert Registry (IAR) that automatically sends an e-mail to registered Internet service providers when there is trouble with traffic in their section of the World Wide Web. The registry is free and any Internet service provider can sign
up for the warnings. What happened with YouTubeKarlin says anomalies in the way Internet traffic flows show up nearly 200 times a day. Most of the problems are small and disappear in a few hours. A few, like the hijacked YouTube traffic, are big and require Internet Service Providers (ISPs) to
work together to solve the problem."What happened is the ISPs that were close to Pakistan Telecom, that were in fact forwarding Pakistan's data, said 'Oh, this is obviously wrong. We're not going to propagate it.' And then they shut it off," said Karlin. "They filtered it out and then suddenly the problem disappeared and YouTube was getting data again."
Karlin points out most users don't think much about how the Internet works. He says we assume someone, somewhere is in charge, taking care of problems, settling
disputes, and punishing troublemakers.But that's not true. The Internet works because thousands of independent ISPs work
cooperatively together to keep traffic running smoothly. How it all worksEvery computer in the world that is connected to the Internet has an address. Those addresses come from the Internet Assigned Number Authority (IANA). That entity
assigns the numbers, but it doesn't police them."The IANA has been giving out these addresses for a very long time, and people have lost track of where they've gone," said Karlin. "So, some companies that were given Internet Protocol (IP) addresses have folded or sold them to other companies or broken them down into small blocks and given them out to other people, so nobody
really knows what's where."For instance, the University of New Mexico has thousands of Internet addresses assigned to it. But there is no agency that monitors whether UNM only uses the addresses it has been assigned. So how does any ISP sort out what is legitimate and
what is not?There are dozens of companies that sell services to help ISPs sort out suspicious activity from normal traffic. The IAR will alert providers as well. But researchers are only now trying to figure out how to handle suspicious traffic when it suddenly
appears.Karlin is one of them. He and his advisor, UNM computer science professor Stephanie Forrest, and Princeton University computer sciences professor Jennifer Rexford are working on an improvement to the Border Gateway Protocol. The modification changes preference to allow ISPs to automatically route traffic around a source that makes
an unexpected change in routing. Getting around problemsTheir protocol emphasizes the status quo. If traffic is flowing along like it is normally, it means everything is ok. If traffic suddenly begins to flow in a different way, the yellow flags go up and their protocol automatically selects a
more stable and trusted route.That buys time for the ISPs to figure out whether this is a traffic hijacking, as occurred in the YouTube case, or not. If an alarm is raised, as it was by YouTube,
the ISP can avoid using the anomalous route.The Internet Alert System and the new protocol will eventually work together so that routers can automatically avoid suspicious routes while the pertinent ISPs are informed of the problem. This way, potential problems unfold slowly rather than
instantly.Karlin has noted that the Internet began as a messaging system between researchers who trusted each other, and so far the system still basically works on the idea that routes being advertised around the world are correct. But as more and more networks join the Internet, the likelihood increases that mistakes will be made that cause problems. Karlin's new protocol treats the mistakes as mistakes rather than attacks
and allows for a positive, rather than a punitive, solution. -- Karen Wentworth, University of New Mexico kwent2 () unm eduThis Behind the Scenes article was provided to LiveScience in partnership with the
National Science Foundation. Investigators Josh Karlin Stephanie Forrest Jennifer Rexford Related Institutions/Organizations University of New Mexico Princeton University Locations New Mexico New Jersey Related Programs Trusted Computing Related Awards#0311686 Collaborative Research: Automated and Adaptive Diversity for Improving
Computer Systems Security Total Grants $250,000 Related WebsitesLiveScience.com: Behind the Scenes: Mysteries of the Unregulated Internet:
http://www.livescience.com/technology/080725-bts-internet-traffic.html Internet Alert Registry: http://iar.cs.unm.edu/ ------------------------------------------- Archives: https://www.listbox.com/member/archive/247/=now RSS Feed: https://www.listbox.com/member/archive/rss/247/ Powered by Listbox: http://www.listbox.com
Current thread:
- National Science Foundation Update -- Mysteries of the Unregulated Internet David Farber (Oct 03)