The study found that nearly a quarter of the world’s Internet infrastructure is vulnerable to attack From UCSD

The following is the The study found that nearly a quarter of the world’s Internet infrastructure is vulnerable to attack From UCSD recommended by recordtrend.com. And this article belongs to the classification: network security.
In an article published on march22,2022, computer scientists at the University of California, San Diego (UCSD) conducted first-line comprehensive large-scale research on 75 market regions around the world. It turns out that about a quarter of the world’s Internet users rely on vulnerable infrastructure – far more than previously estimated. From the perspective of regional distribution, many market regions facing risks are located in the southern hemisphere, including Latin America, Asia, Africa and Oceania.
Study diagram – 8: color depth represents the degree of risk
Alexander gamero Garrido, a doctor of UCSD computer science, said: “we have conducted research on the extension structure of the Internet in order to find the weakest link when the infrastructure is damaged.”.
Study diagram – 1: impact factors
Internet connection structures vary in different regions of the world. For example, in many developed countries represented by the United States, a large number of Internet access service providers (ISPs) compete to provide services for the majority of users.
Research diagram – 2: Paths not observed in the border gateway protocol (BGP)
These networks are interwoven, support direct connected switched content (also known as direct peer-to-peer interconnection), and all ISPs have direct access to the global Internet infrastructure.
Research Map – 3: CTI wireframe distribution of top five ases in each region
However, in many other regions (mostly developing countries), ISPs do not use direct peer-to-peer Internet access – usually only a few service providers can choose, and the head effect is obvious (a large ISP provides services to the vast majority of users).
Research diagram – 4: the overlapping bar chart shows the CTI values of the top five ases
Not only that, these providers also rely on a limited number of “traffic autonomous systems” (usually state-owned) to access traffic on the global Internet and other countries or maps.
Study map – 5: CTI value of head as
The researchers pointed out that this situation makes regions with such Internet infrastructure particularly vulnerable to attack, because attackers only need to weaken the few traffic autonomous systems they target.
Research Map – 6: CTI and some regions of local / state-owned as
In the worst case, there is only one transit autonomous system in some regions to serve all Internet users (such as Cuba and Sierra Leone). However, in areas that are more open to private ISPs, their traffic autonomous systems are much more abundant (for example, Bangladesh has increased from 2 to more than 30).
Research Map – 7: the state-owned source address space collected in the research (orange bar) / ctin (blue bar)
In addition, the researchers were surprised to find that many submarine Internet optical cables are owned by state-owned operators, and many traces of the colonial era are left in the Internet supplement structure in the Southern Hemisphere – for example, the French operator orange has a strong influence in some African countries.
Research diagram – 9: National flow weight distribution
It is reported that researchers have tracked the routing and reachable information exchange between autonomous systems on the Internet with the help of border gateway protocol (BGP) data.
Research mapping – 10: input source and analysis of as connection model (CTI index)
However, these data can not fully reflect the overall picture of the global Internet, so the research results shared in this paper can only be used as a general reference.
From cnbeta Com read more: UCSD: 48% of applications ignore Apple’s security policy Gao: the US personnel administration still has 1/3 security measures that have not been rectified in place spiceworks: 239 network security start-ups attracted more than $1.4 billion in venture capital in 2013 amplify research: only 33% of large enterprises have not been hacked by hackers Allianz: 2020 Internet users’ network security satisfaction survey Akamai: 65.1% of web application attacks come from SQL injection to AI reshape network security : Casting digital security Xinjiang (download attached) Proofpoint: two thirds of the world’s chief information security officers predict that they will encounter destructive cyber attacks in the next 12 months. After hackers attacked Sony Pictures, they released 13 interesting findings. University of Florida: research found that hackers are more likely to cheat when they are happy. FBI: in 2020, the amount of cybercrime losses reached $4.2 billion, an increase of 20% year-on-year. By may 2021, the number of job vacancies in U.S. cyber security reached 465000. Tencent: Research on the black industry chain of mobile payment network in 2016 Report CNCERT: there were 9068 network vulnerability incidents in China in 2014, a year-on-year increase of 3 times. Symantec: 2014 global network security report (download attached)
If you want to get the full report, you can contact us by leaving us the comment. If you think the information here might be helpful to others, please actively share it. If you want others to see your attitude towards this report, please actively comment and discuss it. Please stay tuned to us, we will keep updating as much as possible to record future development trends.
RecordTrend.com is a website that focuses on future technologies, markets and user trends. We are responsible for collecting the latest research data, authority data, industry research and analysis reports. We are committed to becoming a data and report sharing platform for professionals and decision makers. We look forward to working with you to record the development trends of today’s economy, technology, industrial chain and business model.Welcome to follow, comment and bookmark us, and hope to share the future with you, and look forward to your success with our help.