skip to main content
10.1145/3209811.3211887acmconferencesArticle/Chapter ViewAbstractPublication PagescompassConference Proceedingsconference-collections
research-article

Nation-State Hegemony in Internet Routing

Published:20 June 2018Publication History

ABSTRACT

While the growth of the Internet has fostered more efficient communications around the world, there is a large digital divide between Western countries and the rest of the world. Countries such as Brazil, China, and Saudi Arabia have questioned and criticized America's Internet hegemony. This paper studies the extent to which various countries rely on the United States and other Western countries to connect to popular Internet destinations in those countries. Unfortunately, our measurements reveal that underserved regions are dependent on North American and Western European regions for two reasons: local content is often hosted in foreign countries (such as the United States and the Netherlands), and networks within a country often fail to peer with one another. Fortunately, we also find that routing traffic through strategically placed relay nodes can in some cases reduce the number of transnational routing detours by more than a factor of two, which subsequently reduces the dependence of underserved regions on other regions. Based on these findings, we design and implement Region-Aware Networking, RAN, a lightweight system that routes a client's web traffic around specified countries with no modifications to client software (and in many cases with little performance overhead).

References

  1. D. Andersen, H. Balakrishnan, F. Kaashoek, and R. Morris. Resilient Overlay Networks. In ACM Symposium on Operating Systems Principles (SOSP), volume 35. ACM, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. B. Augustin, X. Cuvellier, B. Orgogozo, F. Viger, T. Friedman, M. Latapy, C. Magnien, and R. Teixeira. Avoiding Traceroute Anomalies with Paris Traceroute. In ACM Internet Measurement Conference, pages 153--158. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A Baker's Dozen, 2015 Edition. http://research.dyn.com/2016/04/a-bakers-dozen-2015-edition/.Google ScholarGoogle Scholar
  4. S. Banerjee, T. G. Griffin, and M. Pias. The Interdomain Connectivity of PlanetLab Nodes. In Passive and Active Network Measurement, pages 73--82. Springer, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  5. Z. S. Bischof, J. P. Rula, and F. E. Bustamante. In and Out of Cuba: Characterizing Cuba's Connectivity. In The 2015 ACM Internet Measurement Conference, pages 487--493. ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Brazil Builds Internet Cable To Portugal To Avoid NSA Surveillance. http://www.ibtimes.com/brazil-builds-internet-cable-portugal-avoid-nsa-surveillance-1717417.Google ScholarGoogle Scholar
  7. Brazil Conference will Plot Internet's Future Post NSA Spying. http://www.reuters.com/article/us-internet-conference-idUSBREA3L1OJ20140422.Google ScholarGoogle Scholar
  8. Brazil Looks to Break from US Centric Internet. http://news.yahoo.com/brazil-looks-break-us-centric-internet-040702309.html.Google ScholarGoogle Scholar
  9. Brazil to Host Global Internet Summit in Ongoing Fight Against NSA Surveillance. https://www.rt.com/news/brazil-internet-summit-fight-nsa-006/.Google ScholarGoogle Scholar
  10. Brazil's President Tells U.N. That NSA Spying Violates Human Rights. http://www.usnews.com/news/articles/2013/09/24/brazils-president-tells-un-that-nsa-spying-violates-human-rights.Google ScholarGoogle Scholar
  11. Brazil to Press for Local Internet Data Storage After NSA Spying. https://www.rt.com/news/brazil-brics-internet-nsa-895/, 2013.Google ScholarGoogle Scholar
  12. CAIDA: Center for Applied Internet Data Analysis. http://www.caida.org/home/.Google ScholarGoogle Scholar
  13. Data. https://bitbucket.org/ransomresearch/data/.Google ScholarGoogle Scholar
  14. Digital Colonialism & the Internet as a Tool of Cultural Hegemony. http://www.knowledgecommons.in/brasil/en/whats-wrong-with-current-internet-governance/digital-colonialism-the-internet-as-a-tool-of-cultural-hegemony/.Google ScholarGoogle Scholar
  15. R. Dingledine, N. Mathewson, and P. Syverson. Tor: The Second-Generation Onion Router. Technical report, DTIC Document, 2004.Google ScholarGoogle Scholar
  16. B. Eriksson, P. Barford, B. Maggs, and R. Nowak. Posit: a Lightweight Approach for IP Geolocation. ACM SIGMETRICS Performance Evaluation Review, 40(2):2--11, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. B. Eriksson, P. Barford, J. Sommers, and R. Nowak. A Learning-Based Approach for IP Geolocation. In Passive and Active Measurement, pages 171--180. Springer, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. EU Challenges US Gegemony in Global Internet Governance. http://www.euractiv.com/section/digital/news/eu-challenges-us-hegemony-in-global-internet-governance/.Google ScholarGoogle Scholar
  19. R. Fanou, P. Francois, and E. Aben. On the Diversity of Interdomain Routing in Africa. In International Conference on Passive and Active Network Measurement, pages 41--54. Springer, 2015.Google ScholarGoogle Scholar
  20. L. Gao. On Inferring Autonomous System Relationships in the Internet. IEEE/ACM Transactions on Networking (ToN), 9(6):733--745, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Gharaibeh, A. Shah, B. Huffaker, H. Zhang, R. Ensafi, and C. Papadopoulos. A Look at Router Geolocation in Public and Commercial Databases. 2017.Google ScholarGoogle Scholar
  22. P. Gill, Y. Ganjali, B. Wong, and D. Lie. Dude, WhereâĂŹs That IP?: Circumventing Measurement-Based IP Geolocation. In Proceedings of the 19th USENIX Conference on Security, pages 16--16. USENIX Association, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. C. Guo, Y. Liu, W. Shen, H. J. Wang, Q. Yu, and Y. Zhang. Mining the Web and the Internet for Accurate IP Address Geolocations. In INFOCOM 2009, IEEE, pages 2841--2845. IEEE, 2009.Google ScholarGoogle Scholar
  24. A. Gupta, M. Calder, N. Feamster, M. Chetty, E. Calandro, and E. Katz-Bassett. Peering at the InternetâĂŹs Frontier: A First Look at ISP Interconnectivity in Africa. In Passive and Active Measurement, pages 204--213. Springer, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Y. He, M. Faloutsos, and S. Krishnamurthy. Quantifying Routing Asymmetry in the Internet at the AS Level. In Global Telecommunications Conference, volume 3, pages 1474--1479. IEEE, 2004.Google ScholarGoogle Scholar
  26. Y. He, M. Faloutsos, S. Krishnamurthy, and B. Huffaker. On Routing Asymmetry in the Internet. In Global Telecommunications Conference, volume 2, pages 6--pp. IEEE, 2005.Google ScholarGoogle Scholar
  27. How Brazil Crowdsourced a Landmark Law. http://foreignpolicy.com/2016/01/19/how-brazil-crowdsourced-a-landmark-law/, 2016.Google ScholarGoogle Scholar
  28. Z. Hu, J. Heidemann, and Y. Pradkin. Towards Geolocation of Millions of IP Addresses. In ACM Internet Measurement Conference, pages 123--130. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. B. Huffaker, M. Fomenkov, and K. Claffy. Geocompare: A Comparison of Public and Commercial Geolocation Databases. Proc. NMMC, pages 1--12, 2011.Google ScholarGoogle Scholar
  30. Internet Hegemony and the Digital Divide. http://www.economist.com/node/5165014.Google ScholarGoogle Scholar
  31. J. Karlin, S. Forrest, and J. Rexford. Nation-state Routing: Censorship, Wiretapping, and BGP. arXiv preprint arXiv:0903.3218, 2009.Google ScholarGoogle Scholar
  32. E. Katz-Bassett, J. P. John, A. Krishnamurthy, D. Wetherall, T. Anderson, and Y. Chawathe. Towards IP Geolocation Using Delay and Topology Measurements. In ACM Internet Measurement Conference, pages 71--84. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. E. Katz-Bassett, H. V. Madhyastha, V. K. Adhikari, C. Scott, J. Sherry, P. Van Wesep, T. E. Anderson, and A. Krishnamurthy. Reverse Traceroute. In NSDI, volume 10, pages 219--234, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. D. Levin, Y. Lee, L. Valenta, Z. Li, V. Lai, C. Lumezanu, N. Spring, and B. Bhattacharjee. Alibi Routing. In The 2015 ACM Conference on Special Interest Group on Data Communication, pages 611--624. ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. H. V. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, and A. Venkataramani. iPlane: An Information Plane for Distributed Services. In The 7th Symposium on Operating Systems Design and Implementation, pages 367--380. USENIX Association, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. MaxMind. https://www.maxmind.com/en/home.Google ScholarGoogle Scholar
  37. No Internet Hegemony: Xi. http://www.globaltimes.cn/content/958926.shtml.Google ScholarGoogle Scholar
  38. J. A. Obar and A. Clement. Internet Surveillance and Boomerang Routing: A Call for Canadian Network Sovereignty. In TEM 2013: The Technology & Emerging Media Track-Annual Conference of the Canadian Communication Association (Victoria), 2012.Google ScholarGoogle Scholar
  39. V. Paxson. End-to-end Routing Behavior in the Internet. IEEE/ACM transactions on Networking, 5(5):601--615, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. S. Peter, U. Javed, Q. Zhang, D. Woos, T. Anderson, and A. Krishnamurthy. One Tunnel is (Often) Enough. ACM SIGCOMM Computer Communication Review, 44(4):99--110, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. PlanetLab. http://planet-lab.org/.Google ScholarGoogle Scholar
  42. I. Poese, S. Uhlig, M. A. Kaafar, B. Donnet, and B. Gueye. IP Geolocation Databases: Unreliable? ACM SIGCOMM Computer Communication Review, 41(2):53--56, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Promoting the Use of Internet Exchange Points (IXPs): A Guide to Policy, Management and Technical Issues. https://www.internetsociety.org/sites/default/files/Promoting%20the%20use%20of%20IXPs.pdf, 2012.Google ScholarGoogle Scholar
  44. RAN. https://bitbucket.org/ransomresearch/ran/.Google ScholarGoogle Scholar
  45. RIPE Atlas. https://atlas.ripe.net/.Google ScholarGoogle Scholar
  46. H. Roberts, D. Larochelle, R. Faris, and J. Palfrey. Mapping Local Internet Control. In Computer Communications Workshop (Hyannis, CA, 2011), IEEE, 2011.Google ScholarGoogle Scholar
  47. A. Shah and C. Papadopoulos. Characterizing International BGP Detours. Technical Report CS-15-104, Colorado State University, 2015.Google ScholarGoogle Scholar
  48. TeleGeography Submarine Cable Map. http://www.submarinecablemap.com/.Google ScholarGoogle Scholar
  49. M. Wählisch, S. Meiling, and T. C. Schmidt. A Framework for Nation-Centric Classification and Observation of the Internet. In The ACM CoNEXT Student Workshop, page 15. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. M. Wählisch, T. C. Schmidt, M. de Brün, and T. Häberlen. Exposing a Nation-centric View on the German Internet--A Change in Perspective on AS-level. In Passive and Active Measurement, pages 200--210. Springer, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. D. L. Zhihao Li, Stephen Herwig. DeTor: Provably Avoiding Geographic Regions in Tor. In USENIX Security 2017, 2017.Google ScholarGoogle Scholar
  52. S. Zhou, G.-Q. Zhang, and G.-Q. Zhang. Chinese Internet AS-level topology. Communications, IET, 1(2):209--214, 2007.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    COMPASS '18: Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies
    June 2018
    472 pages
    ISBN:9781450358163
    DOI:10.1145/3209811

    Copyright © 2018 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 20 June 2018

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate25of50submissions,50%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader