<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Geopolitical and Technical Dimensions of Internet Fragmentation⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vladimer Svanadze</string-name>
          <email>vsvanadze@cu.edu.ge</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maksim Iavich</string-name>
          <email>miavich@cu.edu.ge</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viktoriia Lukashenko</string-name>
          <email>viktoriia.lukashenko@kai.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Caucasus University</institution>
          ,
          <addr-line>1 Paata Saakadze str., 0102 Tbilisi</addr-line>
          ,
          <country country="GE">Georgia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1 Liubomyra Huzara ave, 03058 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>578</fpage>
      <lpage>586</lpage>
      <abstract>
        <p>Internet fragmentation, driven by both technical and geopolitical factors, threatens the unity, security, and stability of global cyberspace. This paper examines the key dimensions of fragmentation, focusing on technical parameters such as network congestion, routing inefficiencies, security measures, and geographical disparities in infrastructure. These factors, combined with the challenges arising from the slow adoption of IPv6 and the geopolitical implications of cyber warfare, contribute to the division of the global Internet. In particular, regional conflicts, such as the Russia-Ukraine war, highlight how military tensions can disrupt critical infrastructure, further isolating networks and exacerbating fragmentation. The paper also discusses potential mitigation strategies, including the adoption of improved routing protocols, acceleration of IPv6 deployment, and increased international cooperation to enhance network infrastructure. The analysis concludes by emphasizing the need for coordinated international efforts to address both the technical and geopolitical dimensions of Internet fragmentation to preserve a secure, open, and interconnected global digital ecosystem.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Internet fragmentation</kwd>
        <kwd>unity</kwd>
        <kwd>sustainability</kwd>
        <kwd>security</kwd>
        <kwd>stability</kwd>
        <kwd>development</kwd>
        <kwd>political</kwd>
        <kwd>technical</kwd>
        <kwd>commercial</kwd>
        <kwd>governmental</kwd>
        <kwd>policy</kwd>
        <kwd>Internet Governance Forum</kwd>
        <kwd>IGF</kwd>
        <kwd>World Economic Forum</kwd>
        <kwd>WEF</kwd>
        <kwd>International Security</kwd>
        <kwd>NATO</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The Internet is a symbol of global stability, security, openness, and unity, facilitating the free flow
of information across borders. However, the phenomenon of Internet fragmentation is emerging as
a significant and alarming concern, potentially undermining these fundamental principles. While
there remains some skepticism about the extent and inevitability of this fragmentation, discussions
around the issue have gained prominence at various international forums, including high-level
meetings.</p>
      <p>
        One such event, the keynote session on the “Policy Network on Internet Fragmentation” held at
the 2024 Internet Governance Forum (IGF) in Riyadh, Saudi Arabia, focused on addressing the
fragmentation of the Internet. This session was dedicated to the implementation of Article 29C of
the Global Digital Compact (GDC), which emphasizes the importance of international cooperation
in preventing the fragmentation of the Internet. Specifically, Article 29C states: “Promote
international cooperation among all stakeholders to prevent, identify and address risks of
fragmentation of the Internet in a timely manner (SDG 16)” [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>The panel discussion brought together a wide array of stakeholders, including government
officials, technical experts, civil society
members, and
academic representatives. Their
conversations underscored the multifaceted nature of Internet fragmentation, highlighting both its
technical and geopolitical dimensions. As Anriette Esterhuysen aptly put it, “Addressing Internet
fragmentation requires a concerted effort to view the digital landscape through diverse lenses”. The
session reinforced that preventing fragmentation is not merely a technical challenge but a deeply
human one, necessitating collaboration, research, and ongoing dialogue.</p>
      <p>Moreover, Amitabh Singhal highlighted the IGF’s unique role in bridging the technical and
policy divides, stressing that the renewal of the IGF’s mandate would be pivotal in continuing these
critical discussions. Given this context, the fragmentation of the Internet demands urgent attention
and a multi-dimensional approach to ensure its stability, openness, and global interconnectedness.</p>
      <p>This paper aims to examine the causes and consequences of Internet fragmentation, particularly
through a dual lens of technical and geopolitical perspectives. The main objectives of this study
are:



</p>
      <p>To analyze the technical, political, and commercial factors that contribute to the
fragmentation of the global Internet.</p>
      <p>To explore the geopolitical implications of Internet fragmentation, particularly the role of
regional conflicts and national policies.</p>
      <p>To frame Internet fragmentation within the context of international security and emphasize
the need for collaborative, research-driven efforts to mitigate the risks involved.
To propose practical strategies to preserve the unity of the Internet, including improving
infrastructure, enhancing international cooperation, and addressing security challenges.</p>
      <p>By addressing these goals, this paper seeks to offer a comprehensive understanding of Internet
fragmentation and contribute to the ongoing global discourse on maintaining the Internet as a
unified, open, and secure platform.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Definition of internet fragmentation and existing challenges</title>
      <p>What is Internet fragmentation and how can it be defined? A question that is the subject of
discussion among experts is the difference of opinion regarding the division of the Internet into
fragments. However, it should be noted that from the rostrum of high-level meetings, we
increasingly hear about the threats that are caused precisely by the process of Internet
fragmentation and which directly threaten the unity of the global Internet, its stable and secure
development, as well as the openness, transparency, and accessibility of the Internet.</p>
      <p>An interesting definition of Internet fragmentation is offered by the Internet Society (ISOC), a
fairly authoritative Internet organization. Specifically, on the organization’s website, we read that
“Internet fragmentation is the division or splintering of the unified, open, global Internet into
smaller, isolated networks subject to different rules, regulations, and technical standards—which
may not be able to interconnect or interoperate seamlessly”.</p>
      <p>There is also an interesting note there, which leads us to a better understanding of the
definition of Internet fragmentation, namely: “The Internet works well because no single person or
entity controls it. Anyone can choose to connect to it, and the network grows and adapts to fit our
needs. When all this works correctly, our experience of the Internet should be the same no matter
who or where we are, because we are all connecting to the same unified, global, seamless Internet”.
Otherwise, we will be limiting free access to the Internet, violating its unity, which in turn
threatens its openness and transparency. All of this will contribute to the process of the Internet
breaking up into fragmented parts.</p>
      <p>And yet, to better understand the fragmentation of the Internet, the Internet Society (ISOC)
provides the following explanation:

</p>
      <p>Internet fragmentation is not an event, it is not something that will happen overnight.
Instead, it is a process that is in motion in different regions of the world, and being brought
about by a variety of policy and business decisions.</p>
      <p>Multiple types of fragmentation will break the Internet. From a user’s perspective, people
will experience the Internet very differently depending on who and where they are.</p>
      <p>Fragmentation will change the way we experience the Internet. It will disrupt international
trade and business, as well as global supply chains. It will disproportionately impact smaller
businesses. It will limit people’s ability to communicate with friends and family.
Some policies that may sound reasonable, such as regional DNS resolvers or cost-sharing,
actually threaten to fragment the Internet, and it is important to analyze the impact they
might have on the Internet and people.</p>
      <p>
        When discussing the definition of Internet fragmentation and its impact on the integrity,
stability, and security of the global Internet, we cannot ignore a report commissioned by the World
Economic Forum (WEF) in 2016, which identifies the scope of fragmentation according to three
categories, reflecting our broad understanding of the global Internet, namely [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]:
Technical fragmentation—“The conditions in the underlying infrastructure that impede the
ability of systems to fully interoperate and exchange data packets and of the Internet to
function consistently at all end points”.
      </p>
      <p>Governmental fragmentation—“Policies and actions that constrain or prevent certain uses
of the Internet to create, distribute or access information resources”.</p>
      <p>Commercial fragmentation—“Business practices that constrain or prevent certain uses of
the Internet to create, distribute or access information resources”.</p>
    </sec>
    <sec id="sec-3">
      <title>3. The geopolitical dimension of Internet fragmentation</title>
      <p>In general, it can be said that the Internet has its characteristics, which are used to measure the
performance of the Internet, its quality, security, stability, etc. Any interference or encroachment
on the dimensions of the Internet that make the Internet global, accessible, open, and unified will
lead to the fragmentation of the Internet. In particular, we are talking about the technical
characteristics of the global Internet and the threats that can lead to the fragmentation of the global
Internet.</p>
      <p>
        This process is well described by Konstantinos Komaitis in his focused study “Internet
Fragmentation: Why It Matters for Europe”. Here I would like to mention just a few of the
technical dimensions proposed by Konstantinos Komaitis and the dangers that accompany them.
Specifically, according to the author [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]:






      </p>
      <p>The threat to the Domain Name System (DNS)
The DNS is the glue that holds the global internet together and is responsible for
translating internet protocol (IP) addresses to user-friendly alphanumeric domain names.
Management and coordination functions of the DNS are performed by the Internet
Corporation for Assigned Names and Numbers (ICANN). Any attempt by any actor to set
up alternative root serves apart from ICANN will cause fragmentation; users, where such
alternative root servers exist, will be severed from the global internet.</p>
      <p>The slow transition from IPv4 to IPv6 addresses
The IPv4 address space has been exhausted for quite some time now. If countries do not
promote, and businesses do not proceed to, IPv6 deployment, there is a chance that users
will not be able to access some new services and apps. We could have an ‘IPv6 internet’ that
is fragmented from the legacy ‘IPv4 internet’.</p>
      <p>Internet content blocking and/or filtering
In the simplest case, some amount of internet fragmentation results from countries’
inconsistent filtering of content based on their definition of what constitutes permissible
speech. Governments are deploying a variety of technical and legal tools to block websites
and platforms and to remove online content. Using tools such as DNS filtering, IP blocking,
distributed denial of service (DDoS) attacks, and search result removals, governments are
changing the way users connect to and participate in the global internet.
In general, it is difficult to show the exact dimensions and threats of Internet fragmentation. It can
be said that this is directly related to the active steps taken by some states that lead to a shift
towards globalization, which is directly related to the unity, openness, security, and stability of the
global Internet. All this contributes to the development of an ecosystem of Internet fragmentation.</p>
      <p>And yet, the question arises whether the fragmentation of the Internet described above, in
parallel with its technical dimensions, can also be considered in a geopolitical context as a subject
of international security research.</p>
      <p>This is a hypothetical question and requires in-depth research. However, it can also be said that
the Internet, considered in a national, regional, and global context, is one of the components of
international security and this is related to the processes existing in the Internet space, which
directly threaten the unity and sustainability of the global Internet space, its security and stability,
openness and transparency, as well as the cyber resilience of individual countries and regions.
Therefore, when we talk about the threats existing in the Internet space, the process must also be
considered in the context of international security. Especially considering that the Internet space
has become a serious tool for some states to achieve their goals.</p>
      <p>
        It is also worth noting the recognition made by the North Atlantic Alliance regarding
cyberspace, according to which international law also applies to cyberspace and that cyber defense
is part of the Alliance’s core collective defense task, i.e. the Alliance considers cyberspace as a
“domain of operations”. In particular, according to paragraph 72 of the Wales Summit Declaration
[
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ]:


      </p>
      <p>As the Alliance looks to the future, cyber threats and attacks will continue to become more
common, sophisticated, and potentially damaging. To face this evolving challenge, we have
endorsed an Enhanced Cyber Defence Policy, contributing to the fulfillment of the
Alliance’s core tasks. The policy reaffirms the principles of the indivisibility of Allied
security and prevention, detection, resilience, recovery, and defense. It recalls that the
fundamental cyber defense responsibility of NATO is to defend its networks, and that
assistance to Allies should be addressed by the spirit of solidarity, emphasizing the
responsibility of Allies to develop the relevant capabilities for the protection of national
networks.</p>
      <p>Our policy also recognizes that international law, including international humanitarian law
and the UN Charter, applies in cyberspace. Cyber attacks can reach a threshold that
threatens national and Euro-Atlantic prosperity, security, and stability. Their impact could
be as harmful to modern societies as a conventional attack. We affirm therefore that cyber
defense is part of NATO’s core task of collective defense. A decision as to when a cyber
attack would lead to the invocation of Article 5 would be taken by the North Atlantic
Council on a case-by-case basis.</p>
      <p>The threats and protection of cyberspace, the Internet, are recognized by the Alliance, which
includes 32 member states (30 from Europe, most of which are also EU member states, and two
from North America). These are the countries that also play a major role in the development and
implementation of global Internet policies. In fact, by including this provision in the Alliance’s
declaration, cyberspace, the Internet, has been recognized as a component of international,
regional, and national security.</p>
      <p>Here we hear a second hypothetical question, namely, if the global Internet, cyberspace, is one
of the components of international security, then the fragmentation of the Internet and the threats
that accompany this process should also be considered in the context of international security, and
in parallel with the technical dimensions, the geopolitical dimension of fragmentation should be
recognized and studied.</p>
      <p>
        When we talk about the geopolitical dimension of Internet fragmentation and consider it in the
context of international security, along with other influencing factors, it is necessary to mention
the ongoing military conflicts in the world, which cause great damage, first of all, to the national
Internet, and then, consequently, to the unity, security, and stability of the regional and global
Internet, which in turn depends on the full functioning of the national Internet [
        <xref ref-type="bibr" rid="ref6 ref7 ref8 ref9">6–9</xref>
        ].
      </p>
      <p>
        Among the ongoing military conflicts, the Russia-Ukraine war should be highlighted, which
also covers the Black Sea region and poses a threat to the cyber resilience of the countries of the
region. This conflict also causes great damage to the routes of optical fiber cables in the Black Sea,
to the domain name systems, and to the full functioning of IP addresses. In addition, there are
threats resulting from the Internet policies of individual country governments, such as
geographical restrictions on data transfer and access, user blocking, hybrid challenges, and an
increasing number of cyberattacks [
        <xref ref-type="bibr" rid="ref10 ref11 ref9">9–11</xref>
        ].
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Technical dimensions of Internet fragmentation</title>
      <p>
        In addition to the political, commercial, and governmental dimensions of Internet fragmentation,
several technical parameters contribute to the division and segmentation of the global Internet.
These technical factors encompass network performance, data routing inefficiencies, infrastructure
limitations, and security measures, all of which impact the seamless flow of data across global
networks and thus contribute to fragmentation. This section outlines the key technical parameters
that influence Internet fragmentation [
        <xref ref-type="bibr" rid="ref12 ref13 ref14 ref15">12–15</xref>
        ].
      </p>
      <sec id="sec-4-1">
        <title>4.1. Bottlenecks and congestion in network infrastructure</title>
        <p>
          Bottlenecks occur when data flows exceed the capacity of a network segment, leading to delays,
packet loss, and inefficient routing. Such congestion points are often found at key transit points,
such as international exchange points, undersea cables, and cross-border routing [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. The
following factors contribute to bottlenecks:



        </p>
        <p>Bandwidth limitations: Limited bandwidth at key network nodes can cause congestion,
leading to slower data transmission speeds and packet loss, which results in fragmentation.
Overloaded peering points: At network interconnection points, where large-scale traffic is
exchanged between networks, congestion can result from unbalanced data flows.
Capacity mismatches: Disparities in network infrastructure capabilities between regions or
service providers can lead to asymmetric data flows and interruptions.</p>
        <p>Identifying and managing these bottlenecks is crucial for preventing fragmentation, and this
often involves the use of technologies such as traffic engineering, load balancing, and traffic
prioritization.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Routing inefficiencies and path divergence</title>
        <p>
          The current global Internet routing model, primarily based on the Border Gateway Protocol (BGP),
is susceptible to inefficiencies and inconsistencies in routing tables [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. This results in data being
sent through suboptimal or longer paths, exacerbating fragmentation. The following issues
contribute to routing inefficiencies:



        </p>
        <p>BGP route hijacking and misconfiguration: Malicious actors or misconfigured routers can
cause data to be routed through unintended paths, potentially isolating regions or
countries.</p>
        <p>AS path fragmentation: The global Internet relies on Autonomous Systems (AS) to manage
routing. Over time, the proliferation of AS numbers and the complexity of inter-AS
agreements can cause fragmentation in the routing space.</p>
        <p>IPv4 and IPv6 transition challenges: The ongoing transition from IPv4 to IPv6 can cause
compatibility issues, especially in regions where IPv6 adoption is slow. As a result, some
areas may be isolated from parts of the global Internet.
These routing inefficiencies not only slow down data transfer but can lead to entire regions being
isolated from the global network, contributing to the overall fragmentation of the Internet.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Impact of network security measures on fragmentation</title>
        <p>Security measures, while essential for protecting the Internet, can also inadvertently contribute to
fragmentation. Various security-related practices can impose restrictions on data flow, leading to
segmented networks:</p>
        <p>Firewall policies: Firewalls designed to block malicious traffic can sometimes inadvertently
block legitimate cross-border data traffic, creating isolated network segments.</p>
        <p>DNS filtering and IP blocking: Governments and corporations often use DNS filtering and
IP blocking to limit access to certain websites and services, which can fragment the Internet
by restricting connectivity between regions.</p>
        <p>Content filtering and censorship: Countries with strict censorship policies often employ
mechanisms like DNS poisoning or Deep Packet Inspection (DPI), which can prevent users
in certain regions from accessing global content. This leads to the creation of walled-off
segments of the Internet.</p>
        <p>While these security measures are essential to protect national interests, they can also lead to a
breakdown in the interoperability of networks, thereby contributing to fragmentation.</p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. Infrastructure and geographical disparities</title>
        <p>The global Internet’s infrastructure is unevenly distributed, with certain regions having more
advanced networks and better connectivity than others. These geographical disparities can create
isolated networks:</p>
        <p>Undersea cable routes: Damage to or interference with undersea cables can disrupt global
connectivity, isolating regions and countries from one another. The Russia-Ukraine war, for
example, has threatened key fiber-optic cable routes in the Black Sea, leading to potential
fragmentation of regional Internet traffic.</p>
        <p>Peering agreements: Regional ISPs (Internet Service Providers) and national governments
may choose to establish peering agreements that prioritize local or regional data exchanges,
limiting the international flow of data.</p>
        <p>Access to modern infrastructure: In many developing countries, access to modern Internet
infrastructure, including high-speed fiber-optic networks, is limited. This creates a situation
where these countries may have slower or isolated connections to the global Internet,
exacerbating fragmentation.</p>
      </sec>
      <sec id="sec-4-5">
        <title>4.5. Latency and throughput constraints</title>
        <p>
          High latency and low throughput can lead to inconsistent access to the Internet, especially across
different regions or during peak usage periods [
          <xref ref-type="bibr" rid="ref18 ref19 ref20 ref21">18–21</xref>
          ]. These performance issues create the
potential for data to be delayed or dropped, further contributing to the fragmentation process.


        </p>
        <p>Latency: Long delay times between sending and receiving data (often due to long-distance
routing or bottlenecks) can degrade the user experience, especially in real-time
communications like video calls, gaming, or financial transactions.</p>
        <p>Throughput issues: Areas with limited bandwidth or higher congestion levels often
experience lower throughput, which can prevent effective cross-border communication and
information exchange.</p>
      </sec>
      <sec id="sec-4-6">
        <title>4.6. Mitigation strategies and future developments</title>
        <p>
          To prevent the technical fragmentation of the Internet, several strategies can be implemented [
          <xref ref-type="bibr" rid="ref22 ref23 ref24 ref25">22–
25</xref>
          ]:



        </p>
        <p>Improved routing protocols: Developing and implementing more robust routing protocols,
such as Segment Routing (SR) or Multiprotocol Label Switching (MPLS), could help mitigate
path divergence and improve network performance.</p>
        <p>IPv6 adoption: Accelerating the global transition to IPv6 would help ensure compatibility
across all regions and prevent the creation of isolated “IPv4 islands”.</p>
        <p>Cross-border collaboration: Encouraging international cooperation between governments
and private entities to upgrade network infrastructure and resolve routing inefficiencies is
critical to avoiding fragmentation.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>
        In conclusion, the process of Internet fragmentation poses a significant threat to the unity of the
global Internet, its safe and stable development, openness, transparency, and free access. As
highlighted in the paper, the declaration adopted by the North Atlantic Alliance at the Wales
Summit, particularly paragraph 72, underscores the recognition of cyberspace as an “operational
domain”. This acknowledgment not only reflects the increasing frequency and sophistication of
cyberattacks but also emphasizes the critical importance of safeguarding cyberspace to ensure
international security. Cyberattacks, alongside other technical dimensions of fragmentation,
contribute to the broader trend of dividing the Internet into isolated fragments, with serious
consequences for global connectivity [
        <xref ref-type="bibr" rid="ref26 ref27 ref28">26–28</xref>
        ].
      </p>
      <p>The paper raises two important hypothetical questions that warrant further investigation:

</p>
      <p>Can the fragmentation of the Internet, alongside its technical dimensions, be considered a
subject of international security research within a geopolitical context?
If cyberspace, as part of the global Internet, is integral to international security, should the
fragmentation of the Internet and its associated risks be framed within this context,
recognizing and studying both the technical and geopolitical dimensions of this
fragmentation?</p>
      <p>Furthermore, when evaluating the threats in the Internet space that amplify the fragmentation
process, it is crucial to address the issue within both technical and geopolitical frameworks,
particularly at the regional level. Military conflicts and political tensions continue to inflict
significant damage on the Internet infrastructure, which, in turn, undermines the security and
stability of global and regional networks.</p>
      <p>
        In this context, the Black Sea region serves as a notable example, where the ongoing
RussiaUkraine conflict exacerbates the cyber resilience of the surrounding nations. This conflict not only
disrupts critical infrastructure such as fiber-optic cables, DNS routes, and IP address allocation but
also poses significant challenges to the seamless global operation of the Internet. The technical
fragmentation arising from the blocking or filtering of content, variations in network standards
(e.g., the slow adoption of IPv6), and localized DNS management are contributing to a fragmented
cyberspace that risks isolating regions and further destabilizing global connectivity [
        <xref ref-type="bibr" rid="ref29 ref30">29, 30</xref>
        ].
Additionally, government policies that enforce geographical restrictions on data transmission,
implement user blocking, and increase cyberattacks create further vulnerabilities.
As such, the dual threat of geopolitical instability and technical fragmentation warrants urgent
attention. Efforts to mitigate these threats must address not only the underlying geopolitical
tensions but also the technical barriers that hinder the global Internet’s operation. Without
coordinated international action, these issues will continue to erode the security, stability, and
openness of the global digital ecosystem.
      </p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgment</title>
      <p>This work was supported by the Shota Rustaveli National Foundation of Georgia (SRNSFG)
(NFR-22-14060).</p>
      <p>Declaration on Generative AI
While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>UNGA</surname>
          </string-name>
          ,
          <article-title>The pact for the future</article-title>
          A/79/L.2 (
          <string-name>
            <surname>Annex</surname>
            <given-names>I. Global</given-names>
          </string-name>
          <source>digital compact)</source>
          ,
          <year>2024</year>
          . URL: https://documents.un.org/doc/undoc/ltd/n24/252/89/pdf/n2425289.pdf
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>W.</given-names>
             J. 
            <surname>Drake</surname>
          </string-name>
          , V. G. 
          <string-name>
            <surname>Cerf</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
           Kleinwächter,
          <article-title>Internet fragmentation: An overview</article-title>
          , in: World Economic Forum,
          <year>2016</year>
          . URL: https://www3.weforum.org/docs/WEF_FII_Internet_ Fragmentation_An_Overview_
          <year>2016</year>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>K.</surname>
          </string-name>
           Komaitis, Research in focus Internet fragmentation: Why it matters for Europe,
          <year>2023</year>
          . URL: file:///C:/Users/lsvan/Desktop/%
          <source>E1%83%A1%E1%83%A2%E1%83%90%E1%83%A2%E1%83%98%E</source>
          <volume>1</volume>
          %83%
          <issue>90</issue>
          _
          <article-title>1/internet-fragmentation-why-it-matters-for-europe</article-title>
          .pdf/
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>T.</surname>
          </string-name>
           
          <article-title>Minárik, NATO recognises cyberspace as a “Domain of operations” at Warsaw summit</article-title>
          . URL: https://ccdcoe.org/incyder-articles/
          <article-title>nato-recognises-cyberspace-as-a-domain-ofoperations-</article-title>
          <string-name>
            <surname>at-</surname>
          </string-name>
          warsaw-summit/
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>[5] Wales summit declaration, Paragraph 72</article-title>
          . URL: http://www.nato.int/cps/en/natohq/ official_texts_112964.htm
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>V.</surname>
          </string-name>
           
          <article-title>Svanadze, Internet fragmentation as a new challenge for the unified, security and stability of Internet, Sci. Practical Cyber Secur</article-title>
          .
          <source>J. (SPCSJ) 8</source>
          (
          <issue>4</issue>
          ) (
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Svanadze</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Iavich</surname>
          </string-name>
          ,
          <article-title>Impact of Internet fragmentation on the unity, security, and stability of global Internet</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3654</volume>
          ,
          <year>2024</year>
          ,
          <fpage>520</fpage>
          -
          <lpage>525</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>V.</surname>
          </string-name>
           
          <article-title>Svanadze, Challenges of Internet fragmentation and global cyberspace</article-title>
          ,
          <source>Sci. Practical Cyber Secur. J</source>
          .
          <volume>4</volume>
          (
          <issue>07</issue>
          ) (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>[9] The Internet way of networking: Defining the critical properties of the Internet</article-title>
          ,
          <source>Internet Society</source>
          ,
          <year>2020</year>
          . URL: https://www.internetsociety.org/resources/doc/2020/internet
          <article-title>-impactassessment-toolkit/critical-properties-of-the-internet/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>M. </surname>
          </string-name>
          <article-title>Mueller, Will the Internet fragment? Sovereignty, globalization</article-title>
          and cyberspace, Cambridge: Polity Press,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <article-title>ICANN org comments on the Proposal for a Directive of the European Parliament and of the Council on Measures for a High Common Level of Cybersecurity Across the EU, repealing Directive (EU) 2016/1148 (NIS 2 Directive)</article-title>
          . URL: https://www.icann.org/en/system/files/ files/icann-org
          <article-title>-comments-proposed-</article-title>
          <string-name>
            <surname>nis2-</surname>
          </string-name>
          directive
          <string-name>
            <surname>-</surname>
          </string-name>
          19mar21-en.pdf
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12] APNIC, “
          <article-title>IPv4 exhaustion details”</article-title>
          . URL: https://www.apnic.net/community/ ipv4-exhaustion/ipv4-exhaustion-details/
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>RIPE</surname>
            <given-names>NCC</given-names>
          </string-name>
          ,
          <article-title>The RIPE NCC has run out of IPv4 addresses</article-title>
          . URL: https://www.ripe.net/publications/news/about-ripe
          <article-title>-nccand-ripe/the-ripe-ncc-has-run-out-ofipv4-addresses</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>European</surname>
            <given-names>Commission</given-names>
          </string-name>
          ,
          <article-title>Europe's digital decade: Digital targets for 2030</article-title>
          . URL: https://ec.europa.eu/info/strategy/priorities-2019
          <article-title>-2024/europe-fit-digital-age/europes-digitaldecade-digital-targets2030_en</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Regulation</surname>
          </string-name>
          (EU)
          <year>2015</year>
          /
          <article-title>2120 of the European Parliament and of the Council of 25 November 2015 laying down measures concerning open internet access and amending Directive 2002/22/EC on universal service and users' rights relating to electronic communications networks and services and Regulation (EU) No 531/2012 on roaming on public mobile communications networks within the Union (Text with EEA relevance)</article-title>
          . URL: https://eurlex.europa.eu/legalcontent/EN/TXT/?toc=
          <source>OJ%3AL%3A2015%3A310%3ATOC&amp;uri= uriserv%3AOJ.L_</source>
          .
          <year>2015</year>
          .
          <volume>310</volume>
          .01.0001.01.ENG
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>D.</given-names>
             
            <surname>Lei</surname>
          </string-name>
          , et al.,
          <article-title>Identifying service bottlenecks in public bikesharing flow networks</article-title>
          ,
          <source>J. Trans. Geogr</source>
          .
          <volume>116</volume>
          (
          <year>2024</year>
          )
          <article-title>103830</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.jtrangeo.
          <year>2024</year>
          .103830
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>B. A.</given-names>
             
            <surname>Scott</surname>
          </string-name>
          , M. N. 
          <string-name>
            <surname>Johnstone</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
           
          <string-name>
            <surname>Szewczyk</surname>
          </string-name>
          .
          <article-title>A survey of advanced border gateway protocol attack detection techniques</article-title>
          ,
          <source>Sensors</source>
          <volume>24</volume>
          (
          <issue>19</issue>
          ) (
          <year>2024</year>
          )
          <fpage>6414</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Iorio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
             
            <surname>Risso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
             
            <surname>Casetti</surname>
          </string-name>
          ,
          <article-title>When latency matters: measurements and lessons learned</article-title>
          ,
          <source>ACM SIGCOMM Comput. Commun. Rev</source>
          .
          <volume>51</volume>
          (
          <issue>4</issue>
          ) (
          <year>2021</year>
          )
          <fpage>2</fpage>
          -
          <lpage>13</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19] F. 
          <string-name>
            <surname>Han</surname>
          </string-name>
          , et al.,
          <article-title>Future data center networking: From low latency to deterministic latency</article-title>
          ,
          <source>in: IEEE Network 36(1)</source>
          (
          <year>2022</year>
          )
          <fpage>52</fpage>
          -
          <lpage>58</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>L.</given-names>
             М. 
            <surname>Akimova</surname>
          </string-name>
          , et al.,
          <article-title>The negative impact of corruption on the economic security of state</article-title>
          ,
          <source>Int. J. Manag</source>
          .
          <volume>11</volume>
          (
          <issue>5</issue>
          ) (
          <year>2020</year>
          )
          <fpage>1058</fpage>
          -
          <lpage>1071</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>R. </given-names>
            <surname>Kostyrko</surname>
          </string-name>
          , et al.,
          <article-title>Ukrainian market of electrical energy: Reforming, financing, innovative investment, efficiency analysis, and audit</article-title>
          , Energies,
          <volume>14</volume>
          (
          <issue>16</issue>
          ) (
          <year>2021</year>
          )
          <fpage>5080</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>O.</given-names>
             
            <surname>Solomentsev</surname>
          </string-name>
          , et al.,
          <article-title>Efficiency of operational data processing for radio electronic equipment</article-title>
          ,
          <source>Aviation</source>
          ,
          <volume>23</volume>
          (
          <issue>3</issue>
          ) (
          <year>2020</year>
          )
          <fpage>71</fpage>
          -
          <lpage>77</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>J. S.</given-names>
             
            <surname>Al-Azzeh</surname>
          </string-name>
          , et al.,
          <article-title>Analysis of self-similar traffic models in computer networks</article-title>
          ,
          <source>Int. Rev. Modelling Simul</source>
          .
          <volume>10</volume>
          (
          <issue>5</issue>
          ) (
          <year>2017</year>
          )
          <fpage>328</fpage>
          -
          <lpage>336</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <source>[24] I. </source>
          <string-name>
            <surname>Ostroumov</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
           
          <string-name>
            <surname>Kuzmenko</surname>
          </string-name>
          ,
          <article-title>Configuration analysis of European navigational aids network</article-title>
          ,
          <source>in: 2021 Integrated Communications Navigation and Surveillance Conference (ICNS)</source>
          ,
          <year>2021</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICNS52807.
          <year>2021</year>
          .9441576
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Averyanova</surname>
          </string-name>
          , et al.,
          <article-title>Turbulence detection and classification algorithm using data from AWR</article-title>
          ,
          <source>in: 2022 IEEE 2nd Ukrainian Microwave Week (UkrMW)</source>
          ,
          <year>2022</year>
          ,
          <fpage>518</fpage>
          -
          <lpage>522</lpage>
          . doi:
          <volume>10</volume>
          .1109/UkrMW58013.
          <year>2022</year>
          .10037172
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Sydorenko</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Experimental</surname>
            <given-names>FMECA</given-names>
          </string-name>
          <article-title>-based assessing of the critical information infrastructure importance in aviation</article-title>
          , in: ICT in Education, Research and
          <string-name>
            <given-names>Industrial</given-names>
            <surname>Applications</surname>
          </string-name>
          . Integration,
          <source>Harmonization and Knowledge Transfer</source>
          , vol.
          <volume>2732</volume>
          ,
          <year>2020</year>
          ,
          <fpage>136</fpage>
          -
          <lpage>156</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Imanbayev</surname>
          </string-name>
          , et al.,
          <article-title>Research of machine learning algorithms for the development of intrusion detection systems in 5G mobile networks and beyond</article-title>
          , Sensors,
          <volume>22</volume>
          (
          <issue>24</issue>
          ) (
          <year>2022</year>
          )
          <fpage>9957</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>Z.</given-names>
             
            <surname>Avkurova</surname>
          </string-name>
          , et al.,
          <article-title>Targeted attacks detection and security intruders identification in the cyber space</article-title>
          ,
          <source>Int. J. Comput. Netw. Inf. Secur</source>
          .
          <volume>16</volume>
          (
          <issue>4</issue>
          ) (
          <year>2024</year>
          )
          <fpage>144</fpage>
          -
          <lpage>153</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>A system for assessing the interdependencies of information system agents in information security risk management using cognitive maps</article-title>
          ,
          <source>in: 3rd International Conference on Cyber Hygiene &amp; Conflict Management in Global Information Networks (CH&amp;CMiGIN)</source>
          , Kyiv, Ukraine, vol.
          <volume>3925</volume>
          ,
          <year>2025</year>
          ,
          <fpage>249</fpage>
          -
          <lpage>264</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>Models and Algorithms for analyzing information risks during the security audit of personal data information system</article-title>
          ,
          <source>in: 3rd International Conference on Cyber Hygiene &amp; Conflict Management in Global Information Networks (CH&amp;CMiGIN)</source>
          , Kyiv, Ukraine, vol.
          <volume>3925</volume>
          ,
          <year>2025</year>
          ,
          <fpage>155</fpage>
          -
          <lpage>171</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>