Banner image

Network Operations

Latest articles

aspa_cover

ASPA in the RPKI Dashboard: A New Layer of Routing Security

Author image
Tim Bruijnzeels

10 min read

ASPA is now available in the RIPE NCC RPKI Dashboard, adding a way to express and validate your upstream relationships on top of ROA-based origin validation. Building on its introduction at RIPE 91, this article explains what ASPA does, why it matters, and how to start thinking about deployment.

Article tags:

50 Please read the article before liking.
0
nro_rirs

NRO RPKI Program - 2025 in Review

Author image
Sofía Silva Berenguer

2 min read

2025 is coming to an end, and we want to pause to reflect on our achievements this year as part of the NRO RPKI Program.

Article tags:

21 Please read the article before liking.
0
quantum sec

Enterprise and SaaS Providers Prepare for Quantum Computing

Author image
Kathleen Moriarty

12 min read

Amidst all the noise around quantum computing, this article aims to help organisations move beyond the hype and focus on practical steps developers and teams can take to prepare for what’s ahead.

Article tags:

32 Please read the article before liking.
2
IPv4-Lease-Price-Trends-Predictions-for-2025

IPv4 Transfer Policies and Market Dynamics: Observations Across the RIR System

Author image
Paulius Judickas

5 min read

The exhaustion of IPv4 address space continues to influence how Regional Internet Registries (RIRs) operate and how network operators plan their strategies. While IPv6 adoption advances, IPv4 remains essential for connectivity, particularly in commercial and large-scale deployments. As scarcity gro…

Article tags:

29 Please read the article before liking.
0

All articles

lighbulb

Still Smart, Still Insecure: Why Our IoT Devices Keep Failing Basic Security Tests

Author image
Anna Maria Mandalari

3 min read

When you plug in that shiny new smart bulb or connect your Chromecast to the network, you probably assume it’s secure. After all, these are well-known brands, some even boasting compliance labels or “secure by design” marketing claims. Yet, our latest assessment paints a more troubling picture, one…

Article tags:

57 Please read the article before liking.
0
ddos_scrubber

A First Look at the Adoption of BGP-based DDoS Scrubbing Services

Author image
Shyam Krishna Khadka

8 min read

We present a first look at the adoption of BGP-based DDoS scrubbing, developing a methodology that sheds light on use of the global top five scrubbers. By identifying protected ASes and prefixes via four BGP AS-path patterns in RIS/RouteViews, we provide an initial overview of adoption across the I…

Article tags:

37 Please read the article before liking.
0
nro_rirs

A Solution to Concerns on the Current RPKI Trust Anchor Configuration

Author image
Sofía Silva Berenguer

3 min read

Representatives of the five RIRs propose RPKI Trust Anchor constraints - a draft RPKI protocol that binds each trust anchor to its rightful resources, enabling safe inter-RIR transfers and so closing a long-standing validation gap.

Article tags:

23 Please read the article before liking.
0
see_ixp_cover

Unlocking Digital Growth: The Role of IXPs in South East Europe

Author image
Jelena Cosic

4 min read

How do we know when an IXP is working well? What goals should it achieve, and can success be measured in the same way everywhere? A new RIPE NCC report takes a closer look at these questions in the context of the SEE region.

Article tags:

1080 Please read the article before liking.
0
digital leaks

How IGP Leaks Put IXP Route Servers in the DDoS Shooting Range

Author image
Matthias Wichtlhuber

9 min read

Route server exposure at IXPs leaves peering LANs vulnerable to routing leaks and real-world DDoS attacks. In this article, we talk about how and why it matters.

Article tags:

46 Please read the article before liking.
0
irr cover

The IRR Landscape: Where Do ASes Keep Their Routes?

Author image
Stavros Konstantaras

18 min read

We map where networks actually publish routing data - across RIR-run and third-party IRRs - and how that data is used in practice. Connecting our findings with RPKI growth and exploring regional patterns, we examine legacy space and operational risks to suggest clear clean-up priorities.

Article tags:

116 Please read the article before liking.
0

Showing 928 article(s)

Previous
1 2 3 ... 93
Next