The Ukrainian Internet Under Attack: an NDT Perspective

13Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

On February 24, 2022, Russia began a large-scale invasion of Ukraine, the first widespread conflict in a country with high levels of network penetration. Because the Internet was designed with resilience under warfare in mind, the war in Ukraine offers the networking community a unique opportunity to evaluate whether and to what extent this design goal has been realized. We provide an early glimpse at Ukrainian network resilience over 54 days of war using data from Measurement Lab’s Network Diagnostic Tool (NDT). We find that NDT users’ network performance did indeed degrade – e.g. with average packet loss rates increasing by as much as 500% relative to pre-wartime baselines in some regions – and that the intensity of the degradation correlated with the presence of Russian troops in the region. Performance degradation also correlated with changes in traceroute paths; we observed an increase in path diversity and significant changes to routing decisions at Ukrainian border Autonomous Systems (ASes) post-invasion. Overall, the use of diverse and changing paths speaks to the resilience of the Internet’s underlying routing algorithms, while the correlated degradation in performance highlights a need for continued efforts to ensure usability and stability during war.

Cite

CITATION STYLE

APA

Jain, A., Patra, D., Xu, P., Sherry, J., & Gill, P. (2022). The Ukrainian Internet Under Attack: an NDT Perspective. In Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC (pp. 166–178). Association for Computing Machinery. https://doi.org/10.1145/3517745.3561449

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free