The protocol connecting networks to make up the collective Internet is called the Border Gateway Protocol or BGP. With this protocol, comes some well known, but unsolved security vulnerabilities. BGPs are made up of individual networks called autonomous systems and security vulnerabilities lie in the fact that each individual system is trusted to release accurate routing information. "These networks can operate independently, under no authority, inciting self interest and competition. The current success of the Internet and widespread adoption of BGP are evidence that this level of trust is not entirely unwarranted."
Originally, Autonomous Systems were controlled by a single entity - typically an ISP or very large organization that had a large number of private connections to outside networks. The introduction of the BGP changed this, and allowed smaller organizations to use autonomous system numbers (ASNs) in coordination with an ISP to form larger and more unified network systems, both at the local and global levels. These ASNs were originally 16-bit integers, which, using the BGP system, allowed for over sixty-five thousand addresses. More recently, 32-bit ASNs have been introduced to accommodate the increasing number of high traffic, high capacity network organizations - local and regional ISPs and data centers being some of the most common entities. These ASNs are important because each one uniquely identifies each network on the internet. The number of unique autonomous networks in the routing system of the Internet exceeded 5000 in 1999, 30,000 in 2008, and 47,000 in 2014. 
Autonomous Systems can fall into one of three categories, depending on their confuguration.
- Multi-homed autonomous systems connect to two or more systems. This means that if even if one point goes down, others will continue to function.
- Stub autonomous systems are only connected to one other autonomous system. They may have private connections, but only have one publicly available connection on the Internet.
- Transit autonomous systems link autonomous systems to each other. Internet Service Providers, for example, provide access to the Internet for their customers and their customers' networks.
Because each individual system is responsible for releasing accurate information, little mistakes that are made can have large consequences. Making a typing error when configuring a router can monopolize traffic intended for other networks. People can also hijack maliciously as well. A documented example is when an autonomous system might display that it is the origin for IP addresses that it does not own, and this could spread to other networks.
Additionally, another feature of the Border Gateway Protocol is the autonomous system path. The Autonomous System path is a list of autonomous systems that an update message is signified to have traveled through. It is used for detecting loops and selection routes. Autonomous systems that travel along a given route add their own number to the path but leave it in place. Some routers, however, can be made to maliciously manipulate and change the path, making it invalid. Invalid paths can steal multitudes of internet traffic.
Solutions to Ethical Problems
"Cryptographic approaches involve an authenticated registry that maps IP prefixes to their proper origin autonomous systems." Global cooperation between the autonomous systems is required so that registries can be actively built and maintained, requiring the use of a public key infrastructure that secures and distributes the registry. Because parts of the operational community cannot be trusted and due to some inaccuracies, the creation of registries suffer. Cryptographic solutions, however, are hard to deploy because of the need to change the Border Gateway Protocol system.
Systems have been developed that include anomaly detection algorithms. These algorithms discover origin autonomous system attacks and invalid paths by looking at the past history of valid routes. Another mechanism, called the soft-response mechanism, combines with the algorithm to slow the spread of anomalous routes so that humans can have enough time repair the invalid routes before traffic increases and is spread unnecessarily. Additionally, in combination with the algorithm and mechanism, an alert system has been designed which spreads the alert notifications to multiple operators not including the local operator, because other operators are the ones who have the ability to repair an invalid route.