2020 12th International Conference on Cyber Conflict (CyCon) 2020
DOI: 10.23919/cycon49761.2020.9131726
|View full text |Cite
|
Sign up to set email alerts
|

Measuring the Fragmentation of the Internet: The Case of the Border Gateway Protocol (BGP) During the Ukrainian Crisis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 25 publications
0
7
0
1
Order By: Relevance
“…Scholars have begun to use the characteristics of a country's Internet technology network of autonomous systems (ASs) and the number of "points of control" to rank and characterize digital infrastructure in terms of the level of control governments can exert over citizen access to telecommunications networks and the data flowing across them (Douzet et al, 2020). Autonomous systems route traffic to and from individual devices to the broader Internet, which in turn is a collection of other ASs.…”
Section: Infrastructure Of Repressionmentioning
confidence: 99%
“…Scholars have begun to use the characteristics of a country's Internet technology network of autonomous systems (ASs) and the number of "points of control" to rank and characterize digital infrastructure in terms of the level of control governments can exert over citizen access to telecommunications networks and the data flowing across them (Douzet et al, 2020). Autonomous systems route traffic to and from individual devices to the broader Internet, which in turn is a collection of other ASs.…”
Section: Infrastructure Of Repressionmentioning
confidence: 99%
“…Among them, CAIDA's AS Core Internet Graph research is representative [16]. BGP routing information analysis produces various information such as topology changes, routing connections, network instability, network threats, and network attributes [16][17][18][19][20].…”
Section: Bgp Route View Project Overviewsmentioning
confidence: 99%
“…Cyberspace attack capability exerts firepower in cyberspace, but physical destruction rarely occurs [6]. However, if a critical physical node and network infrastructure is destroyed, simultaneous effects can be created in the physical and cyberspace domains [6,20].…”
Section: Cyber Ipb Visualization Plan At the Physical Network Layermentioning
confidence: 99%
“…Les couches basses représentent donc un enchevêtrement de routes physiques et logiques où circulent la totalité des flux de données échangées sur Internet, quelle que soit la plateforme, le service ou le logiciel que l'on utilise. De fait, il s'agit de corridors ayant une importance géopolitique significative (Pétiniaud et Salamatian, 2020), ainsi qu'ont pu le montrer certains travaux récents qui se sont intéressés aux stratégies de contrôle mise en place par l'Iran (Salamatian et al, 2019) ou par divers acteurs dans le cadre de la crise ukrainienne (Douzet et al, 2020). En effet, toute tentative de manipulation (Demchak et al, 2018), de contrôle ou de mise hors d'état de fonctionner de ces flux physiques ou logiques a des conséquences directes sur la circulation des données, et donc sur le fonctionnement global d'Internet et de toutes les activités humaines qui s'y déroulent (Dainotti et al, 2011).…”
Section: éTat De L'artunclassified