Banner image

Network Operations

All articles

A Look Into the Tor Network Work on Supporting IPv6

A Look Into the Tor Network Work on Supporting IPv6

Author image
Gaba Rodriguez

5 min read

The Tor project received support from the RIPE NCC Community Projects Fund 2019. In this article we summarise the work that the Tor project did this year to implement IPv6 support across the network.

Article tags:

4 Likes are disabled for this article.
0
RIPE NCC Internet Country Report: Central Asia

RIPE NCC Internet Country Report: Central Asia

Author image
Suzanne Taylor

3 min read

We examine the Internet landscape in five different countries in Central Asia as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

0 Likes are disabled for this article.
0
Cyber crime

Who Protects You from Cyber Villains?

Author image
Youth IGF

6 min read

This is the first in a small series of articles published in collaboration with the Youth IGF and CyberVictim.help. In this article Joanna Kulesza, a former RACI fellow, talks about DNS abuse victims, shows us a definition of DNS Abuse and explains why this type of online threat cannot be solved so…

Article tags:

0 Likes are disabled for this article.
2
Distributed_RPKI.jpg

Limiting the Power of RPKI Authorities

Author image
Kris Shrishak

5 min read

In the beginning, Internet infrastructure was not originally designed with security in mind. Luckily, this mindset has changed over the years, mainly due to the growing number of attacks, and has prompted the design of security measures such as Domain Name System Security Extensions (DNSSEC) and Re…

Article tags:

0 Likes are disabled for this article.
0
DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown

DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown

Author image
Daniel Kopp

9 min read

In this article, we investigated booter-based DDoS attacks in the wild and the impact of an FBI takedown targeting fifteen booter websites in December 2018. We investigated and compared attack properties of multiple booter services by launching DDoS attacks against our own infrastructure. To unders…

Article tags:

2 Likes are disabled for this article.
0
transfermarket_fig6.png

IPv4 Transfer Markets Misuse: A First Look

Author image
Vasileios Giotsas

7 min read

The secondary IP address market has become a viable source of IPv4 address space, but it may also present opportunities to malicious networks to bypass reputation-based security mechanisms. In this article we summarise the results of our first detailed study of how transferred IPv4 prefixes are mis…

Article tags:

11 Likes are disabled for this article.
1
Our First Glance at the Belarus Outages

Our First Glance at the Belarus Outages

Author image
Alun Davies

6 min read

On 9 August, Belarus experienced country-wide Internet outages. Here's a first glance at what our tools and datasets have to tell us about the scale of these outages and their impact.

Article tags:

10 Likes are disabled for this article.
12
Reporting Live From the HOPE2020 Online Conference

Reporting Live From the HOPE2020 Online Conference

Author image
Vesna Manojlovic

21 min read

The thirteenth Hackers On Planet Earth (HOPE.net) conference is being held entirely online from 25 July to 2 August 2020.  We are following talks relevant to the RIPE community and reporting back. Join us in participating in real time, or watch archived presentations. 

Article tags:

0 Likes are disabled for this article.
0
Krill Gains Powerful ROA Management Based on BGP Routing

Krill Gains Powerful ROA Management Based on BGP Routing

Author image
Alex Band

5 min read

Over the last two years NLnet Labs has been working on free, open source RPKI software and research for the community, supported by the RIPE NCC Community Projects Fund. We are incredibly excited that six months after the first release of Krill it already powers delegated RPKI for over 150 organisa…

Article tags:

0 Likes are disabled for this article.
0
xdp_s.png

Journeying into XDP: Part 0

Author image
Luuk Hendriks

13 min read

Network programming using XDP has been on our radar (and if you are reading this, possibly on yours too!) for a while now. As tooling around this technology has vastly improved, we decided that it was time to finally get our hands dirty and see what this technology is all about.

Article tags:

15 Likes are disabled for this article.
0

Showing 889 article(s)