SlideShare a Scribd company logo
1 of 21
Peering Improves Security
William B. Norton
Chief Strategy Officer, IIX
Executive Director, DrPeering International
wbn@iixPeering.net
wbn@DrPeering.net
US Telecom Webinar
Live from Silicon Valley
October 30, 2013 10AM PST
Meet the Presenter
• Started working on Internet (NSFNET) in
1988
• 1st “Chairman” of North American
Network Operator Group (NANOG) (19941998)
• 1998-2008 Co-Founder & Chief Technical
Liaison, Equinix Inc. (NSDQ: EQIX)
• 2008-Present - Executive Director, DrPeering
Int’l
• Two-day On-Site Peering Workshops (EU/Africa)
• The 2013 Internet Peering Playbook

• 2013 Chief Strategy Officer, International
Agenda…
Agenda
• Introduction: What you need to know about
Peering for this talk
• Thesis: How Peering Improves Security
1. Less vulnerable to DDOS side affects
2. Fewer network elements make peering less
vulnerable
3. Security response and recovery time are
improved with peers

• Discussion: Q&A
What you need to know…
Section I: Introduction

WHAT YOU NEED TO KNOW ABOUT
PEERING
Internet Transit Service Model
• 99.9% of all
• Announce
Reachability
• Metered
Service
• Simple
• “Internet
This Way”
5
95th

percentile measurement
•
•
•
•

95th Percentile Billing Calculation
5 minute samples
Month of deltas
95th percentile
Max(in,out)

6
Transit Prices Drop
Internet Price Declines (U.S.)
•
•
•
•

“Can’t go lower”
“No one is making $”
Pricing varies widely
Trend unmistakable

7
Internet Peering…
What is Internet Peering?

• Definition: Internet Peering is the business relationship whereby two
companies reciprocally provide access to each others’ customers.

8
Internet Peering

3 Key Points
1. Peering is not a transitive relationship
2. Peering is not a perfect substitute
3. Peering is typically settlement free

9
The Top 5 Motivations to Peer
1. Lower Transit Costs
(#1 ISP Motivation to Peer)
2. Improve end user experience
(#1 Content Motivation)
3. Better control over routing-strategic
(Yahoo!, NetFlix 2008)
4. Usage based billing – make more money by peering
(AboveNet)
5. Sell more underlying transport capacity
(Telecom Italia)
NEW 6. Peering Improves Security!
10
Section II: Thesis

HOW PEERING IMPROVES
SECURITY: 3 TENETS
On the Commodity Internet

T
$

$

P
C

B

T
A

D

$

T
E
B

$

T

F

$

T
G

Traffic traverses
potentially many networks
before reaching its destination

intermingled
All traffic in the Commodity Internet is
intermingled
T
$

$

P
C

D

B

$

T
B
E

$

T

T
A

F

$

T
G

Which works fine when
there is plenty of interconnection
Bandwidth, networks have plenty of
Memory, CPU, etc. Aggregation Efficiency are great.
Works fine until
But when there are DDOS attacks…

T
$

$

P
C

$

D

T
B
E

B

$

T

T
A

X

F

$

T
G

…anywhere along the transit path,
Packet loss, latency,
poor performance.
Result: DOS: AG Unable to establish a secure channel.
Spot events…
But when there are Spot Events…

T
$

$

P
C

$

D

T
B
E

B

$

T

T
A

X

F

Note:
Not just DDOS
Spot Events (MS Update, Oprah interview, etc.)

$

T
G

…anywhere along the transit path,
Packet loss, latency,
poor performance.
Result: DOS: AG Unable to establish a secure channel.

Peering bypass
1) Peering Bypasses the Commodity
Internet
T
$

$

P
C

D

$

T
B
E

B

$

T

T
X

A

“Important Traffic is Peered”
– Andreas Sturm (DE-CIX)

1) By making specific traffic Immune
from the side affects of DDOS,
Peering Improves Security

F

$

T
G

Peering
Point (IXP)
2nd: vulnerability
Commodity Internet has many points
of vulnerability
Networks can be hijacked

T
$

$

P
C

B

D

$

T
B
E

$

T

T
A

No visibility to upstream compromises
May be in protected IDC or
On the top of a telephone pole

F
Interconnects can be
tapped, mirrored,
redirected, captured

$

T
G

Peering bypass
2) Peering Reduces the network
vulnerability
Networks can be hijacked

T
$

$

P
C

D

$

T
B
E

B

$

T

T
A

F
Interconnects can be
tapped, mirrored,
redirected, captured

For the subset of peered traffic.
Hardened building
Better Visibility, peers should notice disruption.
Peering Improves Security

$

T
G

Peering
Point (IXP)
3) Peering Improves Recovery Time
Networks can be hijacked

T
$

$

P
C

D

$

T
B
E

B

$

T

T
A

F
Interconnects can be
tapped, mirrored,
redirected, captured

Practical Matter – peers exchange
Contact Info, NOC #’s, network maps,
Escalation procedures, cell phone #’s
You met the personfaster resolution times.

$

T
G

Peering
Point (IXP)
Peering Improves Security
1. Internet Transit intermingles traffic
– Vulnerable to DDOS side affect
– Peering bypasses the “wild wild west commodity
Internet”

2. Internet Transit more points of vulnerability
– Interconnects and networks along the path
– Peering involves fewer network elements between
content and eyeballs

3. Security response is faster with peers
– Upstream NOCs won’t take your call
Thank you for your time!
Email me !
Talk about (agree/disagree) the thesis “Peering Improves Security”
How peering might help your situation

wbn@iixPeering.net

More Related Content

What's hot

Hyperscalable Unified IoT Platform - Janko Isidorovic - Codemotion Amsterdam ...
Hyperscalable Unified IoT Platform - Janko Isidorovic - Codemotion Amsterdam ...Hyperscalable Unified IoT Platform - Janko Isidorovic - Codemotion Amsterdam ...
Hyperscalable Unified IoT Platform - Janko Isidorovic - Codemotion Amsterdam ...Codemotion
 
Future wireless - open roaming
Future wireless - open roamingFuture wireless - open roaming
Future wireless - open roamingJisc
 
Protecting your Peering Edge
Protecting your Peering EdgeProtecting your Peering Edge
Protecting your Peering EdgeInternet Society
 
09 the global-internet-peering-ecosystem
09 the global-internet-peering-ecosystem 09 the global-internet-peering-ecosystem
09 the global-internet-peering-ecosystem William Norton
 
Internet peering, graphics only
Internet peering, graphics onlyInternet peering, graphics only
Internet peering, graphics onlyBrough Turner
 
Building the Internet of Things
Building the Internet of ThingsBuilding the Internet of Things
Building the Internet of ThingsAngelo Corsaro
 
Readying the campus for the internet of things (io t) - Networkshop44
Readying the campus for the internet of things (io t) - Networkshop44Readying the campus for the internet of things (io t) - Networkshop44
Readying the campus for the internet of things (io t) - Networkshop44Jisc
 
Understanding Remote Peering - Connecting to the Core of the Internet
Understanding Remote Peering - Connecting to the Core of the InternetUnderstanding Remote Peering - Connecting to the Core of the Internet
Understanding Remote Peering - Connecting to the Core of the InternetWilliam Norton
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of ThingsS.Mostafa Sayyedi
 
5G and IoT Security
5G and IoT Security5G and IoT Security
5G and IoT SecurityNUS-ISS
 
It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...David Terrar
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptpriyanka reddy
 
Live, Work, Play with Intelligent Robots
Live, Work, Play with Intelligent RobotsLive, Work, Play with Intelligent Robots
Live, Work, Play with Intelligent RobotsNUS-ISS
 
Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...
Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...
Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...Internet Society
 
"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013Ryan Koop
 

What's hot (20)

Hyperscalable Unified IoT Platform - Janko Isidorovic - Codemotion Amsterdam ...
Hyperscalable Unified IoT Platform - Janko Isidorovic - Codemotion Amsterdam ...Hyperscalable Unified IoT Platform - Janko Isidorovic - Codemotion Amsterdam ...
Hyperscalable Unified IoT Platform - Janko Isidorovic - Codemotion Amsterdam ...
 
ION Malta - MANRS Introduction
ION Malta - MANRS IntroductionION Malta - MANRS Introduction
ION Malta - MANRS Introduction
 
Future wireless - open roaming
Future wireless - open roamingFuture wireless - open roaming
Future wireless - open roaming
 
Protecting your Peering Edge
Protecting your Peering EdgeProtecting your Peering Edge
Protecting your Peering Edge
 
Web rtc for iot, edge computing use cases
Web rtc for iot, edge computing use casesWeb rtc for iot, edge computing use cases
Web rtc for iot, edge computing use cases
 
09 the global-internet-peering-ecosystem
09 the global-internet-peering-ecosystem 09 the global-internet-peering-ecosystem
09 the global-internet-peering-ecosystem
 
Internet peering, graphics only
Internet peering, graphics onlyInternet peering, graphics only
Internet peering, graphics only
 
Building the Internet of Things
Building the Internet of ThingsBuilding the Internet of Things
Building the Internet of Things
 
Readying the campus for the internet of things (io t) - Networkshop44
Readying the campus for the internet of things (io t) - Networkshop44Readying the campus for the internet of things (io t) - Networkshop44
Readying the campus for the internet of things (io t) - Networkshop44
 
Understanding Remote Peering - Connecting to the Core of the Internet
Understanding Remote Peering - Connecting to the Core of the InternetUnderstanding Remote Peering - Connecting to the Core of the Internet
Understanding Remote Peering - Connecting to the Core of the Internet
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
 
ION Malta - IETF Update
ION Malta - IETF UpdateION Malta - IETF Update
ION Malta - IETF Update
 
5G and IoT Security
5G and IoT Security5G and IoT Security
5G and IoT Security
 
It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Live, Work, Play with Intelligent Robots
Live, Work, Play with Intelligent RobotsLive, Work, Play with Intelligent Robots
Live, Work, Play with Intelligent Robots
 
Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...
Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...
Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...
 
"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013
 
Fog computing
Fog computingFog computing
Fog computing
 
ION Malta - Opening Slides
ION Malta - Opening SlidesION Malta - Opening Slides
ION Malta - Opening Slides
 

Viewers also liked

13.1 internet exchange-point-playbook
13.1 internet exchange-point-playbook13.1 internet exchange-point-playbook
13.1 internet exchange-point-playbookWilliam Norton
 
15.1 transition create-peering-strategy
15.1 transition create-peering-strategy15.1 transition create-peering-strategy
15.1 transition create-peering-strategyWilliam Norton
 
Remote Internet Peering Vs IP Transit: A Shift in Internet Architecture
Remote Internet Peering Vs IP Transit: A Shift in Internet ArchitectureRemote Internet Peering Vs IP Transit: A Shift in Internet Architecture
Remote Internet Peering Vs IP Transit: A Shift in Internet ArchitectureRuth Plater
 
Peering in an IP World - Technology Requirements (3-nov, 2009)
Peering in an IP World - Technology Requirements (3-nov, 2009)Peering in an IP World - Technology Requirements (3-nov, 2009)
Peering in an IP World - Technology Requirements (3-nov, 2009)steve ulrich
 
Docker summit : Docker Networking Control-plane & Data-Plane
Docker summit : Docker Networking Control-plane & Data-PlaneDocker summit : Docker Networking Control-plane & Data-Plane
Docker summit : Docker Networking Control-plane & Data-PlaneMadhu Venugopal
 
13 the taxonomy-of-internet-data-centers
13 the taxonomy-of-internet-data-centers13 the taxonomy-of-internet-data-centers
13 the taxonomy-of-internet-data-centersWilliam Norton
 
Cilium - Fast IPv6 Container Networking with BPF and XDP
Cilium - Fast IPv6 Container Networking with BPF and XDPCilium - Fast IPv6 Container Networking with BPF and XDP
Cilium - Fast IPv6 Container Networking with BPF and XDPThomas Graf
 
Docker Networking with New Ipvlan and Macvlan Drivers
Docker Networking with New Ipvlan and Macvlan DriversDocker Networking with New Ipvlan and Macvlan Drivers
Docker Networking with New Ipvlan and Macvlan DriversBrent Salisbury
 
Technical Introduction to IBM's Open Blockchain (OBC)
Technical Introduction to IBM's Open Blockchain (OBC)Technical Introduction to IBM's Open Blockchain (OBC)
Technical Introduction to IBM's Open Blockchain (OBC)Altoros
 
Docker London: Container Security
Docker London: Container SecurityDocker London: Container Security
Docker London: Container SecurityPhil Estes
 
Building an AI Startup: Realities & Tactics
Building an AI Startup: Realities & TacticsBuilding an AI Startup: Realities & Tactics
Building an AI Startup: Realities & TacticsMatt Turck
 
LinuxCon 2015 Linux Kernel Networking Walkthrough
LinuxCon 2015 Linux Kernel Networking WalkthroughLinuxCon 2015 Linux Kernel Networking Walkthrough
LinuxCon 2015 Linux Kernel Networking WalkthroughThomas Graf
 

Viewers also liked (12)

13.1 internet exchange-point-playbook
13.1 internet exchange-point-playbook13.1 internet exchange-point-playbook
13.1 internet exchange-point-playbook
 
15.1 transition create-peering-strategy
15.1 transition create-peering-strategy15.1 transition create-peering-strategy
15.1 transition create-peering-strategy
 
Remote Internet Peering Vs IP Transit: A Shift in Internet Architecture
Remote Internet Peering Vs IP Transit: A Shift in Internet ArchitectureRemote Internet Peering Vs IP Transit: A Shift in Internet Architecture
Remote Internet Peering Vs IP Transit: A Shift in Internet Architecture
 
Peering in an IP World - Technology Requirements (3-nov, 2009)
Peering in an IP World - Technology Requirements (3-nov, 2009)Peering in an IP World - Technology Requirements (3-nov, 2009)
Peering in an IP World - Technology Requirements (3-nov, 2009)
 
Docker summit : Docker Networking Control-plane & Data-Plane
Docker summit : Docker Networking Control-plane & Data-PlaneDocker summit : Docker Networking Control-plane & Data-Plane
Docker summit : Docker Networking Control-plane & Data-Plane
 
13 the taxonomy-of-internet-data-centers
13 the taxonomy-of-internet-data-centers13 the taxonomy-of-internet-data-centers
13 the taxonomy-of-internet-data-centers
 
Cilium - Fast IPv6 Container Networking with BPF and XDP
Cilium - Fast IPv6 Container Networking with BPF and XDPCilium - Fast IPv6 Container Networking with BPF and XDP
Cilium - Fast IPv6 Container Networking with BPF and XDP
 
Docker Networking with New Ipvlan and Macvlan Drivers
Docker Networking with New Ipvlan and Macvlan DriversDocker Networking with New Ipvlan and Macvlan Drivers
Docker Networking with New Ipvlan and Macvlan Drivers
 
Technical Introduction to IBM's Open Blockchain (OBC)
Technical Introduction to IBM's Open Blockchain (OBC)Technical Introduction to IBM's Open Blockchain (OBC)
Technical Introduction to IBM's Open Blockchain (OBC)
 
Docker London: Container Security
Docker London: Container SecurityDocker London: Container Security
Docker London: Container Security
 
Building an AI Startup: Realities & Tactics
Building an AI Startup: Realities & TacticsBuilding an AI Startup: Realities & Tactics
Building an AI Startup: Realities & Tactics
 
LinuxCon 2015 Linux Kernel Networking Walkthrough
LinuxCon 2015 Linux Kernel Networking WalkthroughLinuxCon 2015 Linux Kernel Networking Walkthrough
LinuxCon 2015 Linux Kernel Networking Walkthrough
 

Similar to How Internet Peering Improves Security

Cloud Computing,雲端運算-中研院網格計畫主持人林誠謙
Cloud Computing,雲端運算-中研院網格計畫主持人林誠謙Cloud Computing,雲端運算-中研院網格計畫主持人林誠謙
Cloud Computing,雲端運算-中研院網格計畫主持人林誠謙Tracy Chen
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTINGHoang Nguyen
 
Network_System_Admin.docx
Network_System_Admin.docxNetwork_System_Admin.docx
Network_System_Admin.docxPhilip Martin
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 ) ClubHack
 
FreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksFreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksGeekNightHyderabad
 
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routing
Michael schapira - Hebrew University Jeruslaem - Secure Internet RoutingMichael schapira - Hebrew University Jeruslaem - Secure Internet Routing
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routingvpnmentor
 
The Considerations for Internet of Things @ 2017
The Considerations for Internet of Things @ 2017The Considerations for Internet of Things @ 2017
The Considerations for Internet of Things @ 2017Jian-Hong Pan
 
Astricon - Realities of Global Infrastructure in the Cloud
Astricon - Realities of Global Infrastructure in the CloudAstricon - Realities of Global Infrastructure in the Cloud
Astricon - Realities of Global Infrastructure in the CloudCory von Wallenstein
 
Simplifying IoT by Solving Software Complexity at the Edge
Simplifying IoT by Solving Software Complexity at the EdgeSimplifying IoT by Solving Software Complexity at the Edge
Simplifying IoT by Solving Software Complexity at the EdgeSamy Fodil
 
IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetNathan Wallace, PhD, PE
 
Computer Networks Foundation 2022
Computer Networks Foundation 2022Computer Networks Foundation 2022
Computer Networks Foundation 2022OxfordCambridge
 
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Jason Shen
 

Similar to How Internet Peering Improves Security (20)

Cloud Computing,雲端運算-中研院網格計畫主持人林誠謙
Cloud Computing,雲端運算-中研院網格計畫主持人林誠謙Cloud Computing,雲端運算-中研院網格計畫主持人林誠謙
Cloud Computing,雲端運算-中研院網格計畫主持人林誠謙
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
Network_System_Admin.docx
Network_System_Admin.docxNetwork_System_Admin.docx
Network_System_Admin.docx
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 )
 
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
[IJET-V1I6P4] Authors: Bhatia Shradha, Doshi Jaina,Jadhav Preeti, Shah Nikita
 
ppt
pptppt
ppt
 
Networking
NetworkingNetworking
Networking
 
FreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksFreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networks
 
Essay On Network Security
Essay On Network SecurityEssay On Network Security
Essay On Network Security
 
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routing
Michael schapira - Hebrew University Jeruslaem - Secure Internet RoutingMichael schapira - Hebrew University Jeruslaem - Secure Internet Routing
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routing
 
The Considerations for Internet of Things @ 2017
The Considerations for Internet of Things @ 2017The Considerations for Internet of Things @ 2017
The Considerations for Internet of Things @ 2017
 
Astricon - Realities of Global Infrastructure in the Cloud
Astricon - Realities of Global Infrastructure in the CloudAstricon - Realities of Global Infrastructure in the Cloud
Astricon - Realities of Global Infrastructure in the Cloud
 
Simplifying IoT by Solving Software Complexity at the Edge
Simplifying IoT by Solving Software Complexity at the EdgeSimplifying IoT by Solving Software Complexity at the Edge
Simplifying IoT by Solving Software Complexity at the Edge
 
IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the Internet
 
Session 3 Results
Session 3 ResultsSession 3 Results
Session 3 Results
 
SDN-based Inter-Cloud Federation for OF@TEIN
SDN-based Inter-Cloud Federation for OF@TEINSDN-based Inter-Cloud Federation for OF@TEIN
SDN-based Inter-Cloud Federation for OF@TEIN
 
Ministry of Foreign Affairs
Ministry of Foreign AffairsMinistry of Foreign Affairs
Ministry of Foreign Affairs
 
Computer Networks Foundation 2022
Computer Networks Foundation 2022Computer Networks Foundation 2022
Computer Networks Foundation 2022
 
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
 
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009
 

More from William Norton

14 the folly-of-peering-ratios
14 the folly-of-peering-ratios14 the folly-of-peering-ratios
14 the folly-of-peering-ratiosWilliam Norton
 
11 internet peering-playbook
11 internet peering-playbook11 internet peering-playbook
11 internet peering-playbookWilliam Norton
 
10 the 21st-century-internet-peering-ecosystem
10 the 21st-century-internet-peering-ecosystem10 the 21st-century-internet-peering-ecosystem
10 the 21st-century-internet-peering-ecosystemWilliam Norton
 
08 the 20th-century-internet-peering-ecosystem
08 the 20th-century-internet-peering-ecosystem08 the 20th-century-internet-peering-ecosystem
08 the 20th-century-internet-peering-ecosystemWilliam Norton
 
7.2 day 2 agenda opening
7.2 day 2 agenda opening7.2 day 2 agenda opening
7.2 day 2 agenda openingWilliam Norton
 
07.1 break client specific application decks
07.1 break   client specific application decks07.1 break   client specific application decks
07.1 break client specific application decksWilliam Norton
 
07 public vs-private-peering-debate
07 public vs-private-peering-debate07 public vs-private-peering-debate
07 public vs-private-peering-debateWilliam Norton
 
05 the business-case-for-internet-peering
05 the business-case-for-internet-peering05 the business-case-for-internet-peering
05 the business-case-for-internet-peeringWilliam Norton
 
04a peering simulation-game
04a peering simulation-game04a peering simulation-game
04a peering simulation-gameWilliam Norton
 
03 internet transit-playbook
03 internet transit-playbook03 internet transit-playbook
03 internet transit-playbookWilliam Norton
 
01 internet peering-workshop-agenda
01 internet peering-workshop-agenda01 internet peering-workshop-agenda
01 internet peering-workshop-agendaWilliam Norton
 

More from William Norton (20)

14 the folly-of-peering-ratios
14 the folly-of-peering-ratios14 the folly-of-peering-ratios
14 the folly-of-peering-ratios
 
12.1 lunch break
12.1 lunch break12.1 lunch break
12.1 lunch break
 
11 internet peering-playbook
11 internet peering-playbook11 internet peering-playbook
11 internet peering-playbook
 
10.1.break
10.1.break10.1.break
10.1.break
 
10 the 21st-century-internet-peering-ecosystem
10 the 21st-century-internet-peering-ecosystem10 the 21st-century-internet-peering-ecosystem
10 the 21st-century-internet-peering-ecosystem
 
08 the 20th-century-internet-peering-ecosystem
08 the 20th-century-internet-peering-ecosystem08 the 20th-century-internet-peering-ecosystem
08 the 20th-century-internet-peering-ecosystem
 
7.2 day 2 agenda opening
7.2 day 2 agenda opening7.2 day 2 agenda opening
7.2 day 2 agenda opening
 
07.1.1 application
07.1.1 application07.1.1 application
07.1.1 application
 
07.1 break client specific application decks
07.1 break   client specific application decks07.1 break   client specific application decks
07.1 break client specific application decks
 
07 public vs-private-peering-debate
07 public vs-private-peering-debate07 public vs-private-peering-debate
07 public vs-private-peering-debate
 
06 selecting an-ixp
06 selecting an-ixp06 selecting an-ixp
06 selecting an-ixp
 
05 the business-case-for-internet-peering
05 the business-case-for-internet-peering05 the business-case-for-internet-peering
05 the business-case-for-internet-peering
 
04c.1.break
04c.1.break04c.1.break
04c.1.break
 
04a peering simulation-game
04a peering simulation-game04a peering simulation-game
04a peering simulation-game
 
04 internet peering
04 internet peering04 internet peering
04 internet peering
 
03.1.break
03.1.break03.1.break
03.1.break
 
03 internet transit-playbook
03 internet transit-playbook03 internet transit-playbook
03 internet transit-playbook
 
02 internet transit
02 internet transit02 internet transit
02 internet transit
 
01 internet peering-workshop-agenda
01 internet peering-workshop-agenda01 internet peering-workshop-agenda
01 internet peering-workshop-agenda
 
16 peering policies
16 peering policies16 peering policies
16 peering policies
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

How Internet Peering Improves Security

  • 1. Peering Improves Security William B. Norton Chief Strategy Officer, IIX Executive Director, DrPeering International wbn@iixPeering.net wbn@DrPeering.net US Telecom Webinar Live from Silicon Valley October 30, 2013 10AM PST
  • 2. Meet the Presenter • Started working on Internet (NSFNET) in 1988 • 1st “Chairman” of North American Network Operator Group (NANOG) (19941998) • 1998-2008 Co-Founder & Chief Technical Liaison, Equinix Inc. (NSDQ: EQIX) • 2008-Present - Executive Director, DrPeering Int’l • Two-day On-Site Peering Workshops (EU/Africa) • The 2013 Internet Peering Playbook • 2013 Chief Strategy Officer, International Agenda…
  • 3. Agenda • Introduction: What you need to know about Peering for this talk • Thesis: How Peering Improves Security 1. Less vulnerable to DDOS side affects 2. Fewer network elements make peering less vulnerable 3. Security response and recovery time are improved with peers • Discussion: Q&A What you need to know…
  • 4. Section I: Introduction WHAT YOU NEED TO KNOW ABOUT PEERING
  • 5. Internet Transit Service Model • 99.9% of all • Announce Reachability • Metered Service • Simple • “Internet This Way” 5 95th percentile measurement
  • 6. • • • • 95th Percentile Billing Calculation 5 minute samples Month of deltas 95th percentile Max(in,out) 6 Transit Prices Drop
  • 7. Internet Price Declines (U.S.) • • • • “Can’t go lower” “No one is making $” Pricing varies widely Trend unmistakable 7 Internet Peering…
  • 8. What is Internet Peering? • Definition: Internet Peering is the business relationship whereby two companies reciprocally provide access to each others’ customers. 8
  • 9. Internet Peering 3 Key Points 1. Peering is not a transitive relationship 2. Peering is not a perfect substitute 3. Peering is typically settlement free 9
  • 10. The Top 5 Motivations to Peer 1. Lower Transit Costs (#1 ISP Motivation to Peer) 2. Improve end user experience (#1 Content Motivation) 3. Better control over routing-strategic (Yahoo!, NetFlix 2008) 4. Usage based billing – make more money by peering (AboveNet) 5. Sell more underlying transport capacity (Telecom Italia) NEW 6. Peering Improves Security! 10
  • 11. Section II: Thesis HOW PEERING IMPROVES SECURITY: 3 TENETS
  • 12. On the Commodity Internet T $ $ P C B T A D $ T E B $ T F $ T G Traffic traverses potentially many networks before reaching its destination intermingled
  • 13. All traffic in the Commodity Internet is intermingled T $ $ P C D B $ T B E $ T T A F $ T G Which works fine when there is plenty of interconnection Bandwidth, networks have plenty of Memory, CPU, etc. Aggregation Efficiency are great. Works fine until
  • 14. But when there are DDOS attacks… T $ $ P C $ D T B E B $ T T A X F $ T G …anywhere along the transit path, Packet loss, latency, poor performance. Result: DOS: AG Unable to establish a secure channel. Spot events…
  • 15. But when there are Spot Events… T $ $ P C $ D T B E B $ T T A X F Note: Not just DDOS Spot Events (MS Update, Oprah interview, etc.) $ T G …anywhere along the transit path, Packet loss, latency, poor performance. Result: DOS: AG Unable to establish a secure channel. Peering bypass
  • 16. 1) Peering Bypasses the Commodity Internet T $ $ P C D $ T B E B $ T T X A “Important Traffic is Peered” – Andreas Sturm (DE-CIX) 1) By making specific traffic Immune from the side affects of DDOS, Peering Improves Security F $ T G Peering Point (IXP) 2nd: vulnerability
  • 17. Commodity Internet has many points of vulnerability Networks can be hijacked T $ $ P C B D $ T B E $ T T A No visibility to upstream compromises May be in protected IDC or On the top of a telephone pole F Interconnects can be tapped, mirrored, redirected, captured $ T G Peering bypass
  • 18. 2) Peering Reduces the network vulnerability Networks can be hijacked T $ $ P C D $ T B E B $ T T A F Interconnects can be tapped, mirrored, redirected, captured For the subset of peered traffic. Hardened building Better Visibility, peers should notice disruption. Peering Improves Security $ T G Peering Point (IXP)
  • 19. 3) Peering Improves Recovery Time Networks can be hijacked T $ $ P C D $ T B E B $ T T A F Interconnects can be tapped, mirrored, redirected, captured Practical Matter – peers exchange Contact Info, NOC #’s, network maps, Escalation procedures, cell phone #’s You met the personfaster resolution times. $ T G Peering Point (IXP)
  • 20. Peering Improves Security 1. Internet Transit intermingles traffic – Vulnerable to DDOS side affect – Peering bypasses the “wild wild west commodity Internet” 2. Internet Transit more points of vulnerability – Interconnects and networks along the path – Peering involves fewer network elements between content and eyeballs 3. Security response is faster with peers – Upstream NOCs won’t take your call
  • 21. Thank you for your time! Email me ! Talk about (agree/disagree) the thesis “Peering Improves Security” How peering might help your situation wbn@iixPeering.net

Editor's Notes

  1. The Internet Transit service is shown in the diagram below provides access to the global Internet by:announcing the customer route across the Internet so any network on the Internet knows how to reach the customer network, andannouncing to the customer the information necessary to be able to send traffic to any destination in the Internet.In this mini ecosystem, we see the Cyan ISP purchasing transit from the Orange Transit Provider. The Orange ISP announces to the Cyan ISP reachability to the entire Internet (shown as many colored networks to the right of the Transit Providers). The Transit Providers propagate the Cyan route (shown as a cyan circle) across the Internet so that all networks know how to reach the Cyan ISP. With this reciprocal Internet Transit service, all Internet attachments know how to reach the Cyan ISP, and the Cyan ISP knows how to reach all Internet destinations.
  2. Why did the 95th percentile come into existence? In the early Internet days, Internet traffic was charged on a circuit capacity basis. But if you didn’t use very much of this capacity, you were still paying as if you did. This made Internet Transit tough to sell so the usage-based (metered) model began. Initially some ISPs charged on average use, which ended up being skewed by the occasional burstiness associated with a spot event. To address this, one ISP adopted the 95th percentile measure that was primarily introduced to not overly punish a customer for the occasional spike in traffic volume, and still allow the ISP to bill based the load placed on its network. This approach seemed palatable and sold. The rest of the industry followed suit and 95-5 was born.
  3. WestNet is an ISP with green customers, MidNet is an ISP with blue customers, and EastNet is an ISP with red customers.WestNet is in a Peering relationship with MidNet in which WestNet learns how to reach MidNet's blue customers, and MidNet reciprocally learns how to reach WestNet's green customers.EastNet is in a Peering relationship with MidNet in which EastNet learns how to reach MidNet's blue customers, and MidNet reciprocally learns how to reach EastNet's red customers.After these two peering sessions are established, the routing tables are in place as shown in the boxes beneath the ISP clouds. Since MidNet peers with both EastNet and WestNet, MidNet customers can reach both EastNet and WestNet customers.