Network Operations

All articles

RIPE NCC Internet Country Report: Central Asia

RIPE NCC Internet Country Report: Central Asia

Suzanne Taylor

3 min read

We examine the Internet landscape in five different countries in Central Asia as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

0 You have liked this article 0 times.
0
Who Protects You from Cyber Villains?

Who Protects You from Cyber Villains?

Youth IGF

6 min read

This is the first in a small series of articles published in collaboration with the Youth IGF and CyberVictim.help. In this article Joanna Kulesza, a former RACI fellow, talks about DNS abuse victims, shows us a definition of DNS Abuse and explains why this type of online threat cannot be solved so…

Article tags:

0 You have liked this article 0 times.
2
Limiting the Power of RPKI Authorities

Limiting the Power of RPKI Authorities

Kris Shrishak

5 min read

In the beginning, Internet infrastructure was not originally designed with security in mind. Luckily, this mindset has changed over the years, mainly due to the growing number of attacks, and has prompted the design of security measures such as Domain Name System Security Extensions (DNSSEC) and Re…

Article tags:

0 You have liked this article 0 times.
0
DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown

DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown

Daniel Kopp

9 min read

In this article, we investigated booter-based DDoS attacks in the wild and the impact of an FBI takedown targeting fifteen booter websites in December 2018. We investigated and compared attack properties of multiple booter services by launching DDoS attacks against our own infrastructure. To unders…

Article tags:

2 You have liked this article 0 times.
0
IPv4 Transfer Markets Misuse: A First Look

IPv4 Transfer Markets Misuse: A First Look

Vasileios Giotsas

7 min read

The secondary IP address market has become a viable source of IPv4 address space, but it may also present opportunities to malicious networks to bypass reputation-based security mechanisms. In this article we summarise the results of our first detailed study of how transferred IPv4 prefixes are mis…

Article tags:

11 You have liked this article 0 times.
1
Our First Glance at the Belarus Outages

Our First Glance at the Belarus Outages

Alun Davies

6 min read

On 9 August, Belarus experienced country-wide Internet outages. Here's a first glance at what our tools and datasets have to tell us about the scale of these outages and their impact.

Article tags:

10 You have liked this article 0 times.
12
Reporting Live From the HOPE2020 Online Conference

Reporting Live From the HOPE2020 Online Conference

Vesna Manojlovic

21 min read

The thirteenth Hackers On Planet Earth (HOPE.net) conference is being held entirely online from 25 July to 2 August 2020.  We are following talks relevant to the RIPE community and reporting back. Join us in participating in real time, or watch archived presentations. 

Article tags:

0 You have liked this article 0 times.
0
Krill Gains Powerful ROA Management Based on BGP Routing

Krill Gains Powerful ROA Management Based on BGP Routing

Alex Band

5 min read

Over the last two years NLnet Labs has been working on free, open source RPKI software and research for the community, supported by the RIPE NCC Community Projects Fund. We are incredibly excited that six months after the first release of Krill it already powers delegated RPKI for over 150 organisa…

Article tags:

0 You have liked this article 0 times.
0
Journeying into XDP: Part 0

Journeying into XDP: Part 0

Luuk Hendriks

13 min read

Network programming using XDP has been on our radar (and if you are reading this, possibly on yours too!) for a while now. As tooling around this technology has vastly improved, we decided that it was time to finally get our hands dirty and see what this technology is all about.

Article tags:

15 You have liked this article 0 times.
0

Showing 868 article(s)