Network Operations

All articles

Stalloris: RPKI Downgrade Attack

Haya Shulman

Our research considers the impact of malicious publication points on the resilience of RPKI. We explored attacks that target the functionality of the relying party implementations and evaluated the resulting impact on the RPKI validation. We found all the relying party implementations to be vulnera…

Article tags:

21 You have liked this article 0 times.
0

Dealing with the Undercurrent of Unwanted Traffic

Leslie Daigle

It’s common knowledge that there are “bad actors” on the Internet, poking and prodding open ports as they find them. But just how much of this “unwanted traffic” is out there, and how much is “too much” to allow out of a source network?

Article tags:

21 You have liked this article 0 times.
0

Unpacking RFC 9199: Considerations for Large Authoritative Server Operators

Giovane Moura

RFC 9199 puts forward six considerations for large authoritative DNS server operators each derived from peer-reviewed research. Giovane Moura from SIDN Labs walks us through the list of considerations and the experience he and his co-authors had with the RFC process.

Article tags:

19 You have liked this article 0 times.
0

IPv6 10 Years Out: An Analysis in Users, Tables, and Traffic

Rene Wilhelm

On 6 June 2012, the Internet Society organised the World IPv6 Launch. On that day, participants switched on IPv6 not just for testing, but to use permanently in production services. As ten years have passed since, we look at how IPv6 adoption and deployment has progressed, in terms of routing, end-…

Article tags:

46 You have liked this article 0 times.
1

Making Security Simple for Organisations Big and Small

Kathleen Moriarty

Calls for security to be built-in and managed over time are growing. Kathleen Moriarty takes a looks back at a recent panel discussion on “Making Security Simpler” and the hopeful messages that came out of it for the transformation of Internet security for organisations in the coming years.

Article tags:

12 You have liked this article 0 times.
0

WTDC-22 - The Crossroad

Chafic Chaya

We stand at a crossroads between a fragmented geopolitical world and a digital one that is more inclusive and sustainable. A common agenda with agreed priorities on public policy issues for the use of technology and connectivity will help take us in the right direction.

Article tags:

25 You have liked this article 0 times.
0

What is Anycast DNS and Why is It Important?

Robert Allen

Anycast DNS is used by the leading DNS providers to ensure DNS queries can always be answered as quickly as possible. But how does Anycast DNS actually work and why is it important for your domain?

Article tags:

17 You have liked this article 0 times.
0

Security by Diversity: Designing Secure, Reliable and Robust Systems

Fredrik Lindeberg

A chain is not as strong as its weakest link, it can be much much stronger. In cybersecurity, the art of building secure systems from insecure but diverse components is an important but often neglected topic. Instead, processes, rigidity and structure are generally seen as the only way to attain se…

Article tags:

141 You have liked this article 0 times.
0

RPKI Training for Ukrainian Network Operators

The RIPE NCC held online BGP Security training for Ukrainian telecom operators on 6 April. The training was delivered in English with translation into Ukrainian. In this article, we talk about the motivation for providing this particular kind of training and share the full recording.

Article tags:

56 You have liked this article 0 times.
0

Yugoslavia and the Internet That Never Was

Jelena Cosic

At the SEE 10 meeting, a panel of Internet pioneers came together to share their experiences as some of the people responsible for the development of the Internet in Yugoslavia. In order to properly record this event, we bring you the full video of that session.

Article tags:

31 You have liked this article 0 times.
1

Showing 739 article(s)