This has always been the case, and traffic splay and origin/sink
management has been more important than cost savings since at 
least 2002? Maybe 2001. Definitely before 2004.

On Mon, May 05, 2014 at 08:42:06PM -0700, wbn wrote:
> Hi fellow NANOGers -
> 
> I recently spent some time with peering coordinators at industry events 
> (NANOG, EPF, AFPIF, UKNOF, etc.) where I asked ?How does Internet Peering 
> affect Internet Security??
> 
> The result of this exercise is a white paper, currently in its draft 4-page 
> form, entitled ?How Internet Peering Improves Security.?
> 
> What I need now are a handful of people that are interested in this subject 
> and willing to let me talk through the draft in order to solicit direct 
> feedback. If interested, please send email to w...@drpeering.net with 
> subject: "Review How Internet Peering Improves Security" and I will reach out 
> to schedule some time.
> 
> Thanks in advance -
> 
> Bill
> 
> PS - Here is the abstract to help you decide if you are interested in helping 
> me document this for the community, and yes, as usual, I will be happy to 
> share the resulting white paper with anyone interested.
> 
> 
>                                                                       How 
> Internet Peering Improves Security
> 
> William B. Norton <w...@drpeering.net>
> 
>  
> 
> Abstract
> 
> Denial-of-Service attacks continue to flood the Internet at increasing scale. 
> They attack specific targets, while, as a side affect, disrupt any traffic 
> that traverses the network attack paths. During these attacks, impacted 
> Internet users may experience intermittent problems, such as video freeze 
> frames, garbled audio during phone or Skype calls, or error messages 
> indicating that their Internet cloud service is unavailable.
> 
> The ubiquitous and open nature of the Internet is both its value and its 
> downfall. All one needs for access to cloud storage systems (DropBox, 
> Box.net, etc.) is an Internet connection.  This also means that attackers 
> need only a few thousand broadband computers, infected with viruses and taken 
> over as zombies, to exploit this open Internet ecosystem and overwhelm even 
> the most robust Internet services.
> 
> The attacks are not predictable in time, scope, or scale, and the impacts are 
> far reaching, well beyond the source and destinations of the attacks. For 
> these reason, the commodity Internet may not suitable for a subset of 
> Internet applications. For example, some enterprise mission-critical 
> applications require consistency simply unavailable from today?s Internet 
> Transit services.
> 
> There is however a well-known interconnection approach that improves this 
> situation: an interconnection technique call ?Internet Peering.? This paper 
> will introduce Internet Peering and discuss how Internet security is improved 
> simply by using this common interconnection technique.
-- 
        RSUC / GweepNet / Spunk / FnB / CotSG / Usenix / NANOG

Reply via email to