Banner image

Measurements and Statistics

All articles

Researchers' first Encounter with the IETF Community: Measuring TCP, HTTP/2 and QUIC

Researchers' first Encounter with the IETF Community: Measuring TCP, HTTP/2 and QUIC

Author image
Torsten Zimmermann

6 min read

As Ph.D. students, our typical encounter with the IETF community and their work is by stumbling over RFCs and Internet-Drafts that either relate to or are a fundamental basis for our research. Beyond that, for us, the Internet Engineering Task Force (IETF) has been a vague entity focused on standar…

Article tags:

0 Likes are disabled for this article.
0
Let's Connect! Easy to Install and Secure VPN Software that Respects your Privacy

Let's Connect! Easy to Install and Secure VPN Software that Respects your Privacy

Author image
Rogier Spoor

3 min read

Going online on unknown Internet hotspots - whether at a restaurant, an airport or in a restaurant - isn't actually very safe or secure for users. This is due to the open character of hotspots which makes it easy to impersonate legitimate hotspots and eavesdrop on traffic - or even serve malware. T…

Article tags:

0 Likes are disabled for this article.
0
Passive Observations of Large DNS Service

Passive Observations of Large DNS Service

Author image
Wouter de Vries

5 min read

In 2009, Google launched its Public DNS service, with its characteristic IP address 8.8.8.8. Since then, this service has grown to be the largest and most well-known DNS service in existence. Due to the centralisation that is caused by public DNS services, large content delivery networks (CDNs), su…

Article tags:

2 Likes are disabled for this article.
1
DNS1-GIH.png

The Uncertainty of Measuring the DNS

Author image
Geoff Huston

22 min read

The period around the end of the nineteenth century and the start of the twentieth century saw a number of phenomenal advances in the physical sciences.

Article tags:

4 Likes are disabled for this article.
0
ping-multi-timeseries-medians.png

Comparing Virtual and Metal RIPE Atlas Anchors

Author image
Stephen Strowes

10 min read

Our VM pilot allows us an opportunity to run a like-for-like comparison between two RIPE Atlas anchors. We're grateful for the support from DigitalOcean, who are running two machines (one metal, one virtual) from the same geographical location.

Article tags:

0 Likes are disabled for this article.
0
Outcome of the RIPE Atlas Anchor VMs Pilot

Outcome of the RIPE Atlas Anchor VMs Pilot

Author image
Robert Kisteleki

7 min read

The pilot we ran to assess the feasibility of involving virtual machines in the pool of RIPE Atlas anchors is complete and the results are good.

Article tags:

0 Likes are disabled for this article.
6
Lightweight 4over6: One-step Further Than Dual-stack Networks

Lightweight 4over6: One-step Further Than Dual-stack Networks

Author image
Diego Pino Garcia

5 min read

Dual-stack has been one of the most popular transition technologies used to deploy IPv6. This is largely because it allows for routing of IPv4 and IPv6 traffic in parallel.

Article tags:

0 Likes are disabled for this article.
1
Real-Time Monitoring and Troubleshooting of Web Browsing Sessions

Real-Time Monitoring and Troubleshooting of Web Browsing Sessions

Author image
Antoine Saverimoutou

7 min read

This post introduces the MORIS (Measuring and Observing Representative Information of webSites) probe, a tool for measuring automated web browsing sessions, which allows to estimate end-users’ QoE (Quality of Experience) in various situations and to perform troubleshooting when it is degraded.

Article tags:

0 Likes are disabled for this article.
1
BGP Large Communities - Uptake by the Community at Large?

BGP Large Communities - Uptake by the Community at Large?

Author image
Emile Aben

9 min read

In this article we look into the uptake of BGP Large Communities using the RIPE Routing Information Service (RIS).

Article tags:

0 Likes are disabled for this article.
0
Honeypot-based Monitoring of Amplification DDoS Attacks

Honeypot-based Monitoring of Amplification DDoS Attacks

Author image
Johannes Krupp

5 min read

Amplification DDoS attacks are one of the most prevalent forms of denial-of-service attacks. The SISSDEN project (sissden.eu) operates a network of honeypots designed to detect these attacks, observing 10,000 per day.

Article tags:

0 Likes are disabled for this article.
5

Showing 883 article(s)