Featured Research

from universities, journals, and other organizations

Is Internet backbone vulnerable to cyber attack?

Date:
December 15, 2010
Source:
Inderscience
Summary:
While cyber attacks on the internet involving malware, hacking and distributed denial of service are featured in the headlines most often, researchers in Switzerland suggest that physical attack on internet backbones, servers and internet data hubs could be just as important a problem in sustaining network functions.

While cyber attacks on the internet involving malware, hacking and distributed denial of service are featured in the headlines most often, researchers in Switzerland suggest that physical attack on internet backbones, servers and internet data hubs could be just as important a problem in sustaining network functions.

Related Articles


Writing in the December issue of the International Journal of Critical Infrastructures, the team suggests that physical damage to critical communication networks can lead to a cascade of failures and major disruption to functions due to the interdependency of different critical infrastructures. In 2003, university student Sean Gorman famously mapped the paths of fibre-optic cables across the USA for his PhD dissertation at George Mason University and showed just how easy it would be to locate critical choke points from public records and data. It would not be difficult to block those choke points. Moreover, carriers under increasing economic pressure are not investing in redundant fibre-optic cables and are also simply using road and rail conduits to cut costs and avoid construction works across cities.

"All this brings critical communication backbones into a potentially unsafe condition," says Ling Zhou of the Laboratory for Safety Analysis, Swiss Federal Institute of Technology Zurich (ETH). She points out that fibre optic cables are not the only vulnerable components of the internet. Other physical components of the internet, like servers, bridges and hubs, routers, personal computers, can also be vulnerable parts.

"Effective functioning of today's societies is based on critical infrastructures, i.e., large scale infrastructures whose degradation, disruption or destruction would have a serious impact on health, safety, security or well-being of citizens or the effective functioning of governments and/or economy," However, most critical infrastructures are privately owned. The owners and operators focus on their own infrastructure and business framework and have only limited interest in the consequences of failed components beyond their domain.

The coincidence of two accidental physical problems in January 2006, knocked out internet access across the western USA. Internet traffic had been rerouted via Arizona after flood damage to equipment in California but construction workers accidentally cut through a fibre optic cable there knocking out Sprint's Western US network for three and a half hours on the afternoon of the 9th. Other similar incidents occur unpredictably, usually when two or more physical faults occur at the same time or coincide with virtual issues such as the spread of malicious software or traffic overflow. This one incident simply highlights just how vulnerable the networks could be to deliberate physical attacks at two or more places.

Zhou has used SWITCH, the Swiss national network for research and education, as the focus of a case study and simulation of how such physical damage might impact on networks and the internet as a whole in the future.

Her results offer three main recommendations for protecting critical network infrastructure that should be considered at the national level:

  • First Common connection points, where several cables or network hubs meet, should be regarded as key protected infrastructure.
  • Secondly, backbone and service providers should be persuaded and supported in protecting their network backbone and to diversify the physical routing of fibre optic cables.
  • Thirdly, national governments need to cooperate with service providers and define a series of basic safety standards for what is currently an entirely unregulated sector of information and communication technologies.

Story Source:

The above story is based on materials provided by Inderscience. Note: Materials may be edited for content and length.


Journal Reference:

  1. Ling Zhou et al. Vulnerability analysis of the physical part of the internet. International Journal of Critical Infrastructures, 2010, 6, 402-420

Cite This Page:

Inderscience. "Is Internet backbone vulnerable to cyber attack?." ScienceDaily. ScienceDaily, 15 December 2010. <www.sciencedaily.com/releases/2010/12/101214085539.htm>.
Inderscience. (2010, December 15). Is Internet backbone vulnerable to cyber attack?. ScienceDaily. Retrieved December 22, 2014 from www.sciencedaily.com/releases/2010/12/101214085539.htm
Inderscience. "Is Internet backbone vulnerable to cyber attack?." ScienceDaily. www.sciencedaily.com/releases/2010/12/101214085539.htm (accessed December 22, 2014).

Share This


More From ScienceDaily



More Computers & Math News

Monday, December 22, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Can Bitcoin Survive 2015?

Can Bitcoin Survive 2015?

Newsy (Dec. 22, 2014) Bitcoin's stock has tumbled significantly this year, but more companies now accept it, leading supporters and critics alike to weigh in on its future. Video provided by Newsy
Powered by NewsLook.com
Touch-Free Smart Phone Empowers Mobility-Impaired

Touch-Free Smart Phone Empowers Mobility-Impaired

Reuters - Innovations Video Online (Dec. 21, 2014) A touch-free phone developed in Israel enables the mobility-impaired to operate smart phones with just a movement of the head. Suzannah Butcher reports. Video provided by Reuters
Powered by NewsLook.com
Building Google Into Cars

Building Google Into Cars

Reuters - Business Video Online (Dec. 19, 2014) Google's next Android version could become the standard that'll power your vehicle's entertainment and navigation features, Reuters has learned. Fred Katayama reports. Video provided by Reuters
Powered by NewsLook.com
After Sony Hack, What's Next?

After Sony Hack, What's Next?

Reuters - US Online Video (Dec. 19, 2014) The hacking attack on Sony Pictures has U.S. government officials weighing their response to the cyber-attack. Linda So reports. Video provided by Reuters
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:

Strange & Offbeat Stories


Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins