Measurements and Statistics

Latest articles

Log4Shell Through the Scope of a Reactive Network Telescope

Raphael Hiesgen

The omnipresence of software introduces a constant threat of new vulnerabilities that affect widely-deployed implementations. At the end of 2021, the Log4Shell vulnerability (CVE-2021-44228) made headlines. In this article, read more about Log4Shell as seen from a reactive network telescope.

Article tags:

19 You have liked this article 0 times.
0

A Brief History of Network Time

Robert Allen

In this post we will look at how network time works today and the technology that keeps it accurate and secure. Most of the digital tools that society relies on–across sectors such as finance, telecommunication, security and energy–only work with precise and reliable time synchronisation. But what …

Article tags:

19 You have liked this article 0 times.
0

Minimising RIS Live Delays

Oleg Muravskiy

It has been almost 3 years since we promoted RIS Live to a full production service. Its biggest advantage is that it delivers RIS data in real time, with minimal delays from the RIS collectors to our users. We had received a lot of positive feedback about the service, however, we were still wonderi…

Article tags:

8 You have liked this article 0 times.
0

Staying Alive - What Is TTL and Why Is It Important for Your DNS Setup?

Lars-Johan Liman

If you know about DNS, you've probably heard of the Time-to-Live (TTL) field. But mistakes with TTL are more common than you might think. Here we look at the quirks of DNS record sets, parent/child domains and how to avoid TTL problems.

Article tags:

20 You have liked this article 0 times.
0

All articles

Production Deployment of TCP Authentication Option

Andrew Gallo

The George Washington University recently deployed Transmission Control Protocol Authentication Option (TCP-AO) after a recent code upgrade on its border routers. This further enhances BGP security features already in place on our network.

Article tags:

21 You have liked this article 0 times.
0

Push the Button: SIDN Lab's DDoS Testbed in Action at CONCORDIA Open Door 2022

Thijs van den Hout

Over the past months, SIDN Labs have been improving the testbed they developed for the DDoS Clearing House. At the CONCORDIA Open Door event (COD2022) this October, they'll demonstrate how the testbed works as part of the CONCORDIA Threat Intelligence Platform. The team look at the latest changes t…

Article tags:

25 You have liked this article 0 times.
0

240/4 As Seen by RIPE Atlas

Qasim Lone

In this article we use data from RIPE Atlas probes to investigate the usage of 240/4, a block of IPv4 addresses 'reserved for future use', formally known as Class E in the wild.

Article tags:

115 You have liked this article 0 times.
2

Measuring Encrypted-DNS Censorship Using OONI Probe

Simone Basso

In this article we talk through the preliminary results of an encrypted-DNS censorship study currently being conducted by the Open Observatory Network Interference (OONI).

Article tags:

17 You have liked this article 0 times.
2

Journeying into XDP Part 2: XDPerimenting with DNS Telemetry

Luuk Hendriks

In this instalment of our Journeying into XDP series, we look into a passive BPF-program that enables us to plot graphs of DNS metrics without altering the DNS packets or touching the DNS software itself.

Article tags:

21 You have liked this article 0 times.
0

Where Did My Packet Go? Measuring the Impact of RPKI ROV

Koen van Hove

Merely doing RPKI ROV does not provide any guarantees where your packet ends up. We conducted an experiment where we look into the impact of RPKI ROV on whether the packet ends up in the intended location based on active beaconing with two servers.

Article tags:

74 You have liked this article 0 times.
1

Showing 750 article(s)

Previous
1 2 3 ... 75
Next