Network Operations

All articles

Serial BGP Hijackers: A Reproducibility Study and Assessment of Current Dynamics

Serial BGP Hijackers: A Reproducibility Study and Assessment of Current Dynamics

Ebrima Jaw

9 min read

Serial hijackers are malicious actors that repeatedly carry out prefix hijacks on various networks, some lasting for months or years. A new study assesses the evolution of serial hijacking events since 2019 and determines what actions the technical community is taking to protect the Internet agains…

Article tags:

52 You have liked this article 0 times.
1
The Internet Exchange Point: A Window Onto a Changing Internet

The Internet Exchange Point: A Window Onto a Changing Internet

Flavio Luciani

6 min read

IXPs are the airports of the Internet, busy hubs connecting traffic from a multitude of networks. The Namex observatory provides a unique view of the health and stability of the Internet as it continues to grow and evolve.

Article tags:

37 You have liked this article 0 times.
0
How to Get IP Addresses for Your Network

How to Get IP Addresses for Your Network

Anastasiya Pak

5 min read

Our new report provides network operators and businesses with an overview of the various options available for acquiring IP addresses today.

Article tags:

27 You have liked this article 0 times.
7
CAPIF 3 Report: Strengthening Peering and Internet Growth in Central Asia

CAPIF 3 Report: Strengthening Peering and Internet Growth in Central Asia

Anastasiya Pak

5 min read

The Central Asian Internet community met on 24-25 September at CAPIF 3 in Bishkek, Kyrgyzstan, to discuss peering, interconnectivity, Internet traffic exchange, IPv6 adoption, and challenges for digital transformation. The event brought together over 200 people from 18 countries - proving the need …

Article tags:

30 You have liked this article 0 times.
0
Tim Bruijnzeels: Patching Internet Vulnerabilities with RPKI

Tim Bruijnzeels: Patching Internet Vulnerabilities with RPKI

Alun Davies

3 min read

The White House recently announced plans to boost Internet routing security in the US through improved RPKI coverage. So how does RPKI help secure BGP? How easy is it to boost coverage on a national level? And what's the future potential of the infrastructure? Our guest Tim Bruijnzeels shares his v…

Article tags:

34 You have liked this article 0 times.
0
The Next Generation of BGP Data Collection Platforms

The Next Generation of BGP Data Collection Platforms

Thomas Holterbach

12 min read

Existing BGP data collection platforms face challenges that threaten their long-term sustainability: their data comes with enormous redundancy and significant visibility gaps. We explore a new BGP data collection paradigm, already implemented in a prototype called GILL, that could stir change for o…

Article tags:

47 You have liked this article 0 times.
0
IXP-from-Scratch: The Peering LAN

IXP-from-Scratch: The Peering LAN

Thomas Liske

13 min read

In the third of our “IXP from Scratch” series, we discuss our setup of the peering switches and route servers at DD-IX, an Internet Exchange located in Dresden, Germany. We explain how we connect our two PoPs and which security and safety mechanisms (L2 and L3) we configured to ensure reliable oper…

Article tags:

91 You have liked this article 0 times.
2
ccTLD Phishing Characterisation

ccTLD Phishing Characterisation

Giovane Moura

10 min read

Phishing attacks are, to this day, one of the most widespread and effective means of getting access to sensitive and financial data. A new study from the team from SIDN Labs combines more than 28,000 phishing domain names in a bid to improve detection and mitigation policies.

Article tags:

31 You have liked this article 0 times.
0
Securing Internet Infrastructure in Central Asia

Securing Internet Infrastructure in Central Asia

Anastasiya Pak

16 min read

The third Central Asia Peering and Interconnection Forum (CAPIF 3) takes place next week in Bishkek, Kyrgyzstan. Experts from Central Asia and neighbouring regions will come together to strengthen regional Internet connectivity and promote digital growth. Ahead of the event, we examine the adoption…

Article tags:

15 You have liked this article 0 times.
0
An Introspective Analysis: RPKI Deployment Under Scrutiny

An Introspective Analysis: RPKI Deployment Under Scrutiny

Donika Mirdita

8 min read

When it comes to protecting the Achilles' heel of the Internet, the effectiveness of RPKI hinges on the vigilance and cooperation of the entire Internet community.

Article tags:

5 You have liked this article 0 times.
0

Showing 882 article(s)