How can a small Internet service provider in Pennsylvania become the reason for millions of locations around the world? It happened on 24th June when users were unable to reach a large part of the web.
The root cause is the dissection of Cloudfire, which is one of the leading content hosts on the Internet, depending on the affected sites.
Clouddlare tracked the problem of a regional ISP in Pennsylvania, who accidentally announced on the rest of the internet that the best ways to access Cloudflare were through their small network.
This gave ISP a large part of global traffic, which inspected its limited capacity and restrained the arrival of cloudfire on the rest of the Internet.
As mentioned by Cloudflare, the internet was equal to a full highway on the neighborhood road.
This incident highlighted the magnitude of the Internet. In 2017 alone, there were approximately 14,000 such accidents.
Given that it is very important for most of the world’s economic and social life, should the network not only be designed to withstand short hiccups, but also to withstand major calamities, and prevent small problems from changing into big problems. for?
Management bodies, such as the European Network and Information Security Agency, have repeatedly warned of the risk of such incidents due to global internet failure. However, the internet is still fragile.
Like the street network, the internet has highways and intersections, with cable and router. The navigation system that manages data flow around the network is called the border gateway protocol.
When you visit this site, the Border Gateway Protocol sets the path through which location data will be transferred to your device.
The problem is that the Gateway Gateway Protocol was designed for only a temporary solution, a good enough solution when the Internet was growing rapidly in the late 1980s.
After this, they proved to be good enough to help the network maintain large scale and became part of every primary router that manages the flow of data on major internet routes.
But it was not built keeping security in mind, and no mechanism was added to ensure that the paths sent by the gateway protocol for data were valid. As a result, routing errors are not detected until they cause the crowd and obstruction.
Even worse, who has access to the backbone router – which is trivial for someone with the right knowledge and budget – can create counterfeit methods to disrupt legitimate traffic, disrupt services and tap the communication.
This means that the modern Internet operates using an unsafe protocol which is used daily to organize communication with governments, financial institutions, weapon makers and coded currencies, often inspired by politics. – happens in the form of part of the war.
These problems have been known since at least 1998, when a group of hackers explained to the US Congress how easy it was to settle online communication. However, little has changed.
It was found that deploying necessary cryptographic solutions was difficult to replace the mid-flight planes.
Recent issues related to the Boeing 737 Max, such as in the case of actual flight, the regulators have the power to frame the entire fleet until repair. But there is no central authority on the internet.
It is the owner of various parts of the infrastructure and is managed by various institutions including corporations, governments and universities.
Conflicts between different researches, often in the interest of competition, mean that they have no incentives to make their own share of the Internet.
The organization will have to face the huge cost of deployment and operational risks, which come with switching to new technology, but it will not take any advantage unless a significant mass of other networks do so.
The most realistic solution will be to develop security protocols that do not require global coordination. But efforts to do this have also been interrupted by decentralized ownership of the Internet.
Operators have limited knowledge of what happens outside their network because companies’ desire is to keep their business confidential.
Consequently, the most important communication infrastructure in our society is not a complete sight on any day.
It underpaces the effort to design Internet behavior, making it difficult to design and evaluate dependable solutions.
Direct effects of this disappointing situation on national security have prompted government agencies to speed up their activities to protect important Internet infrastructure.
For example, in the United Kingdom, the National Cyber Space Center has just launched an active cyber security program, which keeps the security of internet guidance at the top of its priorities.