Network Operations

All articles

IXP-from-Scratch: The Peering LAN

IXP-from-Scratch: The Peering LAN

Thomas Liske

13 min read

In the third of our “IXP from Scratch” series, we discuss our setup of the peering switches and route servers at DD-IX, an Internet Exchange located in Dresden, Germany. We explain how we connect our two PoPs and which security and safety mechanisms (L2 and L3) we configured to ensure reliable oper…

Article tags:

84 You have liked this article 0 times.
2
ccTLD Phishing Characterisation

ccTLD Phishing Characterisation

Giovane Moura

10 min read

Phishing attacks are, to this day, one of the most widespread and effective means of getting access to sensitive and financial data. A new study from the team from SIDN Labs combines more than 28,000 phishing domain names in a bid to improve detection and mitigation policies.

Article tags:

31 You have liked this article 0 times.
0
Securing Internet Infrastructure in Central Asia

Securing Internet Infrastructure in Central Asia

Anastasiya Pak

16 min read

The third Central Asia Peering and Interconnection Forum (CAPIF 3) takes place next week in Bishkek, Kyrgyzstan. Experts from Central Asia and neighbouring regions will come together to strengthen regional Internet connectivity and promote digital growth. Ahead of the event, we examine the adoption…

Article tags:

15 You have liked this article 0 times.
0
An Introspective Analysis: RPKI Deployment Under Scrutiny

An Introspective Analysis: RPKI Deployment Under Scrutiny

Donika Mirdita

8 min read

When it comes to protecting the Achilles' heel of the Internet, the effectiveness of RPKI hinges on the vigilance and cooperation of the entire Internet community.

Article tags:

5 You have liked this article 0 times.
0
A Dive Into TLD Performance

A Dive Into TLD Performance

Arnold Dechamps

8 min read

DNS is a complex set of protocols with a long history. Some TLD's go as far back as 1985 - but not all of them are built equal. And not all of them have the same performance depending on where the end user is situated in the world. So just how different are they?

Article tags:

113 You have liked this article 0 times.
5
Mikhail Anisimov: Developing the DNS Under Pressure

Mikhail Anisimov: Developing the DNS Under Pressure

Anastasiya Pak

3 min read

Being at the core of the Internet places the DNS under a lot of pressure. New forms of DNS abuse emerge each year, disputes over domain names persist, and all the while, the Internet just keeps getting bigger. Mikhail Anisimov from ICANN talks about the coordinated effort involved in meeting these …

Article tags:

9 You have liked this article 0 times.
0
Roughtime: Securing Time for IoT Devices

Roughtime: Securing Time for IoT Devices

Robert Allen

4 min read

Roughtime is a draft protocol aimed at providing a secure way for IoT devices to obtain time. In this Q&A from Netnod, Marcus Dansarie, Technical Consultant at Netnod and co-author of the IETF draft on Roughtime, answers questions on why secure time is essential, the challenges for IoT devices, and…

Article tags:

19 You have liked this article 0 times.
0
Are Differences in RIR RPKI Implementations Hindering RPKI Adoption?

Are Differences in RIR RPKI Implementations Hindering RPKI Adoption?

Sofía Silva Berenguer

2 min read

The NRO RPKI Program Team is calling on network operators to share what stage of the RPKI adoption journey they are at and what barriers they might have encountered along the way.

Article tags:

6 You have liked this article 0 times.
0
IXP-from-Scratch: Network and Security Design

IXP-from-Scratch: Network and Security Design

Thomas Liske

11 min read

In the second of our “IXP from Scratch” series, we introduce network and security design decisions as well as implementations we made at DD-IX, an Internet Exchange in Dresden, Germany. In principle, an IX consists of a single broadcast domain, but in practice it has to operate several services sec…

Article tags:

120 You have liked this article 0 times.
5
Innovative Approaches to Combating SPAM: Lessons from IP Leasing

Innovative Approaches to Combating SPAM: Lessons from IP Leasing

Jolita Puzakova

4 min read

SPAM and abuse remain persistent challenges across various digital platforms, threatening user trust and operational integrity. Jolita Puzakova and colleagues explore how they tackle this persistent threat with a three-fold approach.

Article tags:

36 You have liked this article 0 times.
0

Showing 868 article(s)