Internet Integrity

Communities to Promote Internet Transparency, Diversity, and Best Practices

The Internet is comprised of 70,000+ individual networks that each operate independently but are intrinsically interconnected. There is no single entity that can “lay down the law” for the Internet and its use. Better coordination of discussions and practices, along with collaboration between stakeholders in the Internet ecosystem and beyond, is necessary to ensure a fully functional —and safer — Internet of the future. Collaboration is the way forward.

GCA’s Internet Integrity Program brings together key players in Internet infrastructure operations, including ecosystem institutions, network operator groups, and ISPs and other infrastructure operators, as well as adjacent industries, to identify top priorities for addressing cybersecurity issues that cannot be solved by any single actor or subset of actors independently.

Our initiatives use the three building blocks of the Internet —names, numbers, and routes— as a guiding principle and the establishment of communities of action as a preferred approach. Creating trust in the domain name space, fighting malicious unwanted traffic, and enhancing routing security will be some of our challenges in the years to come.

Internet Integrity Projects

Domain Trust

Domain names are the “street addresses” of all websites on the public Internet. But domain names can be faked, or “spoofed,” and hijacked to direct people to malware, phishing, and other malicious activities. GCA’s Domain Trust aims to solve this challenge.

The organizations in the Domain Trust Community work together to combat the abuse of domains at every stage, but especially at their very registration. Domain Trust includes an ever-growing data repository that provides registries, registrars, hosts, cyber protection agencies, and other community members with large-scale sets of data on known or suspected malicious and criminal domains. Thanks to the repository and to the exchange of best practices, these organizations can investigate those domains and take action to stop threats.

AIDE

The AIDE global network of open-source honeypots gathers data and records attacks against Internet of Things (IoT) devices or IoT-like devices. We collaborate with academics, regional cybersecurity entities, and researchers to analyze attacks and identify trends across the landscape of malware distribution these attacks represent. We also collaborate with network operators to identify and reduce the amount of unwanted traffic plaguing the Internet.

Initially designed to focus on IoT security only, AIDE has become an important repository of data about unwanted traffic, as collected by a geographically distributed network of IoT honeypots that includes ProxyPot, GCA’s proprietary technology. The AIDE community of researchers has begun exploring this data to turn their findings into specific action and best practices to protect the IoT and our networks as a whole.

GCA partners with AIDE desktop dashboard with blue overlay

MANRS

Unsecured routing is one of the most common paths for malicious threats to networks. Inadvertent errors can take entire countries offline, and attackers can steal an individual’s data or hold an organization’s network hostage. Network safety depends on a routing infrastructure that weeds out bad actors and accidental misconfigurations that wreak havoc on the Internet.

Based on the network operator industry’s willingness for collaborative agreement on best practices for routing security, the Mutually Agreed Norms for Routing Security (MANRS) initiative launched in 2014. Today, MANRS has grown from nine original operators to a community of more than 1,000 participants ranging from small enterprise networks to tier-1 transit providers, from IXPs to content delivery network (CDN) and cloud providers. GCA serves as the secretariat for the MANRS initiative, which is globally recognized as a beacon for securing global routing.

Internet Integrity Publications

Blog
Blog

GCA Comments on Potential US Government Rules for Routing Security

Last week, we filed comments in response to the United States Federal Communications Commission
Read More
Blog
Blog

New Research Explores How to Detect Attacks like Malware Over IPv6

Honeypots are isolated hosts that lure attackers so that the honeypot creator can gather data
Read More
Blog
Blog

The US Government is Making Moves on Routing Security. So Should You.

For all the network operators waiting for a clear sign that it’s time to step up in improving
Read More

Contact Us

If your work fits into the objectives of our Internet Integrity Program as a whole or of any of its open projects, please reach out to us. We welcome exploring possibilities for collaboration and partnership.