Abstract
On February 24, 2022, Russia began a large-scale invasion of Ukraine, the first widespread conflict in a country with high levels of network penetration. Because the Internet was designed with resilience under warfare in mind, the war in Ukraine offers the networking community a unique opportunity to evaluate whether and to what extent this design goal has been realized. We provide an early glimpse at Ukrainian network resilience over 54 days of war using data from Measurement Lab’s Network Diagnostic Tool (NDT). We find that NDT users’ network performance did indeed degrade – e.g. with average packet loss rates increasing by as much as 500% relative to pre-wartime baselines in some regions – and that the intensity of the degradation correlated with the presence of Russian troops in the region. Performance degradation also correlated with changes in traceroute paths; we observed an increase in path diversity and significant changes to routing decisions at Ukrainian border Autonomous Systems (ASes) post-invasion. Overall, the use of diverse and changing paths speaks to the resilience of the Internet’s underlying routing algorithms, while the correlated degradation in performance highlights a need for continued efforts to ensure usability and stability during war.
Cite
CITATION STYLE
Jain, A., Patra, D., Xu, P., Sherry, J., & Gill, P. (2022). The Ukrainian Internet Under Attack: an NDT Perspective. In Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC (pp. 166–178). Association for Computing Machinery. https://doi.org/10.1145/3517745.3561449
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.