Anapaya blog

Internet issues in B2B and how to address them

Lisa Garbe
Posted by Lisa Garbe on 13 May, 2020

In today’s world, businesses rely on stable and secure communication online. Many small and medium enterprises communicate to sub-contractors and business partners on a daily basis, often crossing national borders. While the internet has largely facilitated communication, it has also paved the way for new vulnerabilities of business operations.


Get the white paper


User experience issues

Network instability

In order to communicate with business partners or for remote employees to access the internal business network, companies usually rely on the public internet. When information is exchanged between two different locations, there is no control through which internet service providers (ISP) the data is routed to reach its final destination. The misconfiguration of routing tables by ISPs can lead to accidental rerouting of web traffic causing major delays communication. Such misconfigurations are common and often take place unnoticed.

Performance issues

It remains unclear an ISP determines the routes for customers’ data packets. Some ISPs may opt for the cheapest, but geographically longer, route. Others may choose the shortest, yet most expensive route to forward data packets. While the cheapest route may be performant enough for anti-virus updates or email communication, it may not be good enough for video conferences with remote participants. Since the customer has no control over their ISP’s routing preferences, the ISP may not necessarily choose the most appropriate route with regards to the customer’s need.

Network security issues

Man-in-the Middle Attacks

While most BGP misconfigurations are accidental, they can also be used strategically by hackers that perform so-called “man-in-the-middle" attacks. An attacker can change the path of a data packet rerouting it to their own network, also commonly known as route hijacking. This allows the attacker to perform so-called man-in-the-middle attacks such as stealing credentials or eavesdropping. The resulting unavailability of a service or compromised data can amount to huge financial losses for a company. In 2017, attackers rerouted online customers of a Brazilian bank to a reconstructed fake website where customers unknowingly handed over their credentials. 

DDoS Attacks

A distributed denial of service (DDoS) attack is a way to disrupt the traffic of a targeted server or network with the aim to bring down a website or specific web service. The attacker overwhelms the target’s website with messages, requests for connections, or fake packets, such that access to the targeted website is temporarily restricted. DDoS attacks are very precise in targeting specific websites and it is difficult to trace the source of the attack.  In 2016, hackers targeted the Swiss Federal Railways (SBB) resulting in the slowdown of online timetables and inaccessibility of the website for several hours. Sometimes, smaller attacks degrading a website’s performance are used by the attackers to infiltrate the network while the company’s security team is trying to address the DDoS attacks. Overall, DDoS attacks have increased in numbers, volume, and length in over the last two years.

How to address network issues?

For companies it is difficult to address network security problems as they rely on ISPs that are responsible for routing their traffic. Once a message leaves their company, they give up substantial control over how this message is routed to its final destination. The SCION-Internet, enabled by Anapaya, offers full transparency and control over the routes and allows the sender to determine through which ISPs traffic should be routed. In collaboration with ISPs, companies can hence adjust the routes to their own needs, for instance by avoiding traffic to be routed through specific countries. This also reduces the risk of DDoS attacks as it is unlikely that all different paths will be attacked at the same time. In order to further reduce such risk, business partners could send each other information about „hidden paths“: These hidden paths are not public and therefore assure business continuity for specific “peers” that agreed to exchange information through these hidden paths.


Get the white paper