Network Operations

Latest articles

SCION - A Novel Internet Architecture

David Hausheer

At RIPE 81, a group of enthusiastic researchers and practitioners from industry and academia discussed with the RIPE community what role RIRs and LIRs could take on in the SCION next-generation Internet architecture. More than 80 BoF participants discussed this question, wanting to learn more about…

25 You have liked this article 0 times.
0

Remote Attestation Enabling Posture Assessment for Automated GRC

Kathleen Moriarty

Attestation…simplified! This post explains how attestation can provide system-level remediation and resiliency. It can be conducted remotely and at scale, ensuring transparency of compliance with industry security controls and benchmarks.

21 You have liked this article 0 times.
0

Understanding the European Resolver Policy

Andrew Campling

The European Resolver Policy is intended to provide reassurance to end-users and other stakeholders that personal data gained in the operation of DNS resolution services will not be misused. In this guest article, Andrew Campling talks about the aims and benefits of the policy.

29 You have liked this article 0 times.
6

Does The Internet Route Around Damage? - Edition 2021

Emile Aben

On 23 March 2021, LINX London experienced an outage. As this is one of the very large Internet Exchange Points, this is an interesting case to study in more depth in order to see what we can learn about Internet robustness.

41 You have liked this article 0 times.
0

All articles

RPKI and AS3333 or “How We Eat Our Own Dog Food”

Nathalie Trenaman

Route Origin Validation (ROV) is a mechanism by which route advertisements can be authenticated as originating from an expected autonomous system (AS). With the RIPE NCC all set to perform ROV on AS3333, Nathalie Trenaman talks about why we've held back so far, and why we're now ready to get on wit…

49 You have liked this article 0 times.
3

Trusted Assurance Simplified

Kathleen Moriarty

In the third of this series of guest posts, Kathleen Moriarty talks about the importance of posture assessment - the process of evaluating organisation or system security - and looks at solutions for simplifying that process that could help organisations achieve higher levels of trusted assurance.

13 You have liked this article 0 times.
0

Measuring DNS over TLS from the Edge: Adoption, Reliability and Response Times

Trinh Viet Doan

DNS over TLS (DoT) is an extension to the DNS over UDP/53 (Do53) protocol, which provides additional confidentiality to the DNS messages between client and server. Since its standardisation in RFC7858 in 2016, DoT has gained increasing support by various DNS services as well as operating systems. …

28 You have liked this article 0 times.
0

Trufflehunter: A New Tool to Sniff Out DNS Usage

Audrey Randall

Measuring domain usage on centralised public DNS resolvers can be very useful, but it's also pretty hard to do. Trufflehunter is a new open source tool that puts snooping techniques to good use in order to accurately estimate the popularity of domains.

15 You have liked this article 0 times.
0

The PeeringDB Survey 2020 - Results and Roadmap

Leo Vegoda

With the results of the PeeringDB survey 2020 gathered and analysed, Leo Vegoda takes a look at how your feedback has helped the team build their roadmap for 2021.

0 You have liked this article 0 times.
0

Where Does Zero Trust Begin and Why is it Important?

Kathleen Moriarty

In the second of a series of guests posts on information security, Kathleen Moriarty of the Center for Internet Security (CIS) takes a close look at the benefits of zero trust architectures and what their increased adoption means for the industry.

14 You have liked this article 0 times.
0

Showing 661 article(s)

Previous
1 2 3 ... 67
Next