Network Operations

All articles

Measuring the Impact of DNS Flag Day

Measuring the Impact of DNS Flag Day

Willem Toorop

10 min read

DNS Flag Day was the result of a collaborative effort and agreement of DNS implementers and DNS resolver operators to commit to no longer providing workarounds for non-standards-compliant authoritative nameservers as of 1 February 2019. In the lead up to DNS Flag Day, and as part of the outreach…

Article tags:

0 You have liked this article 0 times.
0
ARTEMIS: an Open-source Tool for Detecting BGP Prefix Hijacking in Real Time

ARTEMIS: an Open-source Tool for Detecting BGP Prefix Hijacking in Real Time

Vasileios Kotronis

15 min read

ARTEMIS is a defense approach against BGP prefix hijacking attacks. It is (a) based on accurate and fast detection operated by the AS itself, by leveraging the pervasiveness of publicly available BGP monitoring services, and it (b) enables flexible and fast mitigation of hijacking events. In this a…

Article tags:

6 You have liked this article 0 times.
2
Routing to and from the Netherlands

Routing to and from the Netherlands

Marco Hogewoning

5 min read

Following earlier publications, Radiocommunications Agency Netherlands asked if we could perform an analysis of the Dutch market – in particular, the routing arrangements between networks.

Article tags:

4 You have liked this article 0 times.
3
Shaping the Internet: History and Impact of IXP Growth

Shaping the Internet: History and Impact of IXP Growth

Ignacio Castro

5 min read

It’s 1990: the Internet has a few million users and the first commercial companies have recently embraced this new distributed infrastructure.

Article tags:

2 You have liked this article 0 times.
0
Five Years at the Edge: Recording the Evolution of Web Usage from an ISP

Five Years at the Edge: Recording the Evolution of Web Usage from an ISP

Danilo Giordano

7 min read

While 2018 has no doubt been another big year in the world of the Internet, it often pays to look at how it compares to previous years to understand and forecast growth or decline trends.

Article tags:

4 You have liked this article 0 times.
2
Geopolitics of Routing

Geopolitics of Routing

LOUIS PETINIAUD

8 min read

The goal of this article is to introduce a methodological basis for a geopolitical analysis of the Internet and to illustrate the geopolitics of cyberspace. For this purpose, we used the BGP feeds provided by the RIPE Routing Information Service to regularly infer AS-level connectivity graphs. We h…

Article tags:

1 You have liked this article 0 times.
0
A Glimpse into New Internet Research at IEEE ISCC

A Glimpse into New Internet Research at IEEE ISCC

Gergana Petrova

10 min read

This year’s Symposium on Computers and Communications (ISCC) touched on many topics such as edge and fog, new challenges related to smart computing and networking, big data computing and communications performance. Read on to see a few highlights.

Article tags:

0 You have liked this article 0 times.
0
Long Chopsticks in Heaven: the Importance of Cooperating when it comes to ROA

Long Chopsticks in Heaven: the Importance of Cooperating when it comes to ROA

5 min read

Route Origin Validation (ROV), based on Route Origination Authorization (ROA), is increasingly being deployed by registries, organisations and users worldwide in an effort to reduce the risk of problems associated with network misconfigurations and mistakes.

Article tags:

6 You have liked this article 0 times.
0
Hackathon @ Africa Internet Summit 2019

Hackathon @ Africa Internet Summit 2019

Willem Toorop

8 min read

The ISOC African regional bureau has been organising hackathons at the last three editions of the Africa Internet Summit. This year we were given the opportunity to lead a track there at: "Measuring DNS and DoH". This is a report on the event and it's valuable and contributory outcome.

Article tags:

5 You have liked this article 0 times.
0
Thinking on the Edge Key to Future Incident Response

Thinking on the Edge Key to Future Incident Response

Kathleen Moriarty

4 min read

The second Coordinating Attack Response at Internet Scale workshop (CARIS2) met earlier this year to discuss changes to infrastructure and monitoring as on-the-wire or transport encryption becomes stronger (for example, TLS 1.3 and QUIC) and ubiquitous.

Article tags:

0 You have liked this article 0 times.
0

Showing 868 article(s)