Internet Integrity

Communities to Promote Internet Transparency, Diversity and Best Practices

There is no single entity that can “lay down the law” for the Internet and its use. Better coordination of discussions and practices, along with collaboration between stakeholders in the Internet ecosystem and beyond, is necessary to ensure a fully functional —and safer — Internet of the future. Collaboration is the way forward.

GCA’s Internet Integrity Program aims to bring together key players in Internet infrastructure operations, including ecosystem institutions, network operator groups, and ISPs and other infrastructure operators, as well as adjacent industries, in order to identify top priorities for addressing cybersecurity issues that cannot be solved by any single actor or subset of actors independently.

Our initiatives use the three building blocks of the Internet —names, numbers, and routes— as a guiding principle and the establishment of communities of action as a preferred approach. Creating trust in the domain name space, fighting malicious unwanted traffic, and enhancing routing security will be some of our challenges in the years to come.

Internet Integrity Projects

Domain Trust

Domain names are the “street addresses” of all websites on the public Internet. But domain names can be spoofed, and hijacked to direct people to malware, phishing and other malicious intents. GCA’s Domain Trust aims to solve this challenge.

The organizations in the Domain Trust Community work together to combat the abuse of domains at every stage, but especially at their very registration. Domain Trust includes an ever-growing and expanding data repository that provides registries, registrars, hosts, cyber protection agencies, and other community members with large-scale sets of data on known or suspected malicious and criminal domains. Thanks to the repository and to the exchange of best practices, these organizations can investigate those domains and take action to stop threats.

AIDE

Today, we are experiencing exponential growth in Internet-connected devices, the so-called Internet of Things or IoT. From smart home devices, to medical equipment, manufacturing automation and beyond, our world is more connected than ever before. This creates new risks in the IP address space.

Initially designed to focus on IoT security only, AIDE has become an important repository of data about unwanted traffic collected by a geographically distributed network of IoT honeypots that includes ProxyPot, a GCA’s proprietary technology. A community of researchers has begun exploring that data in order to turn their findings into specific action and best practices to protect the IoT but also our networks as a whole.

GCA partners with AIDE desktop dashboard with blue overlay

MANRS

Insecure routing is one of the most common paths for malicious threats to networks. Inadvertent errors can take entire countries offline, and attackers can steal an individual’s data or hold an organization’s network hostage. Network safety depends on a routing infrastructure that weeds out bad actors and accidental misconfigurations that wreak havoc on the Internet.

In 2014, the Internet Society recognized the industry’s willingness for collaborative agreement on best practices for routing security and helped build the Mutually Agreed Norms for Routing Security (MANRS) initiative. In less than a decade, MANRS has grown from nine original operators to a community of more than 1,000 participants ranging from small enterprise networks to tier-1 transit providers, from IXPs to content delivery network (CDN) and cloud providers. MANRS, now a GCA project, is globally recognized as a beacon for securing global routing.

Internet Integrity Publications

Blog
Blog

5 Reasons Regulating Border Gateway Protocol (BGP) Won’t Actually Help Improve Routing Security

Earlier this month, the United States Federal Communications Commission (FCC) released a draft
Read More
In The News
In The News

"At GCA, it feels like I'm playing a long game. We can solve problems facing the Internet that nobody else would solve."

Last week, Leslie Daigle, CTO at Global Cyber Alliance, was on the Imposter Syndrome Network
Read More
Blog
Blog

Tracing Volt Typhoon: Insights from GCA’s AIDE Honey Farm

As you may have seen in the news recently, the Volt Typhoon campaign is a cyber espionage group
Read More

Contact Us

If you are working on any project that fits into the objectives of either our Internet Integrity Program as a whole or of any of its open projects, Domain Trust and AIDE, please reach out to us. We will be delighted to talk with you and explore possibilities for collaboration.