Network Operations

Latest articles

CAPIF 3 Report: Strengthening Peering and Internet Growth in Central Asia

CAPIF 3 Report: Strengthening Peering and Internet Growth in Central Asia

Anastasiya Pak

5 min read

The Central Asian Internet community met on 24-25 September at CAPIF 3 in Bishkek, Kyrgyzstan, to discuss peering, interconnectivity, Internet traffic exchange, IPv6 adoption, and challenges for digital transformation. The event brought together over 200 people from 18 countries - proving the need …

Article tags:

27 You have liked this article 0 times.
0
Tim Bruijnzeels: Patching Internet Vulnerabilities with RPKI

Tim Bruijnzeels: Patching Internet Vulnerabilities with RPKI

Alun Davies

3 min read

The White House recently announced plans to boost Internet routing security in the US through improved RPKI coverage. So how does RPKI help secure BGP? How easy is it to boost coverage on a national level? And what's the future potential of the infrastructure? Our guest Tim Bruijnzeels shares his v…

Article tags:

24 You have liked this article 0 times.
0
The Next Generation of BGP Data Collection Platforms

The Next Generation of BGP Data Collection Platforms

Thomas Holterbach

12 min read

Existing BGP data collection platforms face challenges that threaten their long-term sustainability: their data comes with enormous redundancy and significant visibility gaps. We explore a new BGP data collection paradigm, already implemented in a prototype called GILL, that could stir change for o…

Article tags:

44 You have liked this article 0 times.
0
IXP-from-Scratch: The Peering LAN

IXP-from-Scratch: The Peering LAN

Thomas Liske

13 min read

In the third of our “IXP from Scratch” series, we discuss our setup of the peering switches and route servers at DD-IX, an Internet Exchange located in Dresden, Germany. We explain how we connect our two PoPs and which security and safety mechanisms (L2 and L3) we configured to ensure reliable oper…

Article tags:

75 You have liked this article 0 times.
0

All articles

ccTLD Phishing Characterisation

ccTLD Phishing Characterisation

Giovane Moura

10 min read

Phishing attacks are, to this day, one of the most widespread and effective means of getting access to sensitive and financial data. A new study from the team from SIDN Labs combines more than 28,000 phishing domain names in a bid to improve detection and mitigation policies.

Article tags:

31 You have liked this article 0 times.
0
Securing Internet Infrastructure in Central Asia

Securing Internet Infrastructure in Central Asia

Anastasiya Pak

16 min read

The third Central Asia Peering and Interconnection Forum (CAPIF 3) takes place next week in Bishkek, Kyrgyzstan. Experts from Central Asia and neighbouring regions will come together to strengthen regional Internet connectivity and promote digital growth. Ahead of the event, we examine the adoption…

Article tags:

14 You have liked this article 0 times.
0
An Introspective Analysis: RPKI Deployment Under Scrutiny

An Introspective Analysis: RPKI Deployment Under Scrutiny

Donika Mirdita

8 min read

When it comes to protecting the Achilles' heel of the Internet, the effectiveness of RPKI hinges on the vigilance and cooperation of the entire Internet community.

Article tags:

5 You have liked this article 0 times.
0
A Dive Into TLD Performance

A Dive Into TLD Performance

Arnold Dechamps

8 min read

DNS is a complex set of protocols with a long history. Some TLD's go as far back as 1985 - but not all of them are built equal. And not all of them have the same performance depending on where the end user is situated in the world. So just how different are they?

Article tags:

113 You have liked this article 0 times.
5
Mikhail Anisimov: Developing the DNS Under Pressure

Mikhail Anisimov: Developing the DNS Under Pressure

Anastasiya Pak

3 min read

Being at the core of the Internet places the DNS under a lot of pressure. New forms of DNS abuse emerge each year, disputes over domain names persist, and all the while, the Internet just keeps getting bigger. Mikhail Anisimov from ICANN talks about the coordinated effort involved in meeting these …

Article tags:

9 You have liked this article 0 times.
0
Roughtime: Securing Time for IoT Devices

Roughtime: Securing Time for IoT Devices

Robert Allen

4 min read

Roughtime is a draft protocol aimed at providing a secure way for IoT devices to obtain time. In this Q&A from Netnod, Marcus Dansarie, Technical Consultant at Netnod and co-author of the IETF draft on Roughtime, answers questions on why secure time is essential, the challenges for IoT devices, and…

Article tags:

19 You have liked this article 0 times.
0

Showing 861 article(s)

Previous
1 2 3 ... 87
Next