Network Operations

All articles

Looking Back at the Internet’s Past Decade

Looking Back at the Internet’s Past Decade

Geoff Huston

32 min read

In this article I am looking a some fundamental developments on the Internet over the last decade. Nothing much has changed - or has it?

Article tags:

0 You have liked this article 0 times.
0
BGP Large Communities - Uptake by the Community at Large?

BGP Large Communities - Uptake by the Community at Large?

Emile Aben

9 min read

In this article we look into the uptake of BGP Large Communities using the RIPE Routing Information Service (RIS).

Article tags:

0 You have liked this article 0 times.
0
Honeypot-based Monitoring of Amplification DDoS Attacks

Honeypot-based Monitoring of Amplification DDoS Attacks

Johannes Krupp

5 min read

Amplification DDoS attacks are one of the most prevalent forms of denial-of-service attacks. The SISSDEN project (sissden.eu) operates a network of honeypots designed to detect these attacks, observing 10,000 per day.

Article tags:

0 You have liked this article 0 times.
5
Measuring the Adoption of RPKI Route Origin Validation

Measuring the Adoption of RPKI Route Origin Validation

Andreas Reuter

10 min read

The number of Resource Certificates and ROAs is steadily growing, especially in the RIPE NCC service region. However, it remains unclear how widely BGP speakers on the Internet are actually using route origin validation (ROV) to drop or de-preference invalid announcements.

Article tags:

4 You have liked this article 0 times.
0
Spam Over IPv6 - Eight Years Later

Spam Over IPv6 - Eight Years Later

Ivo Dijkhuis

3 min read

A long time ago we published an article on the amount of spam we receive over IPv6. Now, eight years later, we were curious to see if the spam landscape has changed.

Article tags:

0 You have liked this article 0 times.
2
What Are My Options? Session Encryption Protocols Looking Forward

What Are My Options? Session Encryption Protocols Looking Forward

Kathleen Moriarty

8 min read

This is the third and last piece in our mini series on network and security management. With TLSv1.3 approved and in the Internet Engineering Task Force (IETF) publication queue it’s time to think about deployment options and obstacles, and planning for changes inherent in this revision. Regardles…

Article tags:

0 You have liked this article 0 times.
0
They Are Looking At WHAT? Service Provider Monitoring

They Are Looking At WHAT? Service Provider Monitoring

Kathleen Moriarty

5 min read

This is the second in a series of articles related to network and security management. This post digs deeper into the types of monitoring performed on internal and external networks to better understand considerations for your deployment plans.

Article tags:

0 You have liked this article 0 times.
0
IPv6 Adoption Statistics: How do APNIC and Facebook Compare?

IPv6 Adoption Statistics: How do APNIC and Facebook Compare?

Rene Wilhelm

4 min read

Both APNIC and Facebook publish statistics on IPv6 adoption per country. Next to the visualisations, these organisations also provide the numerical data. We take a look at these to see how the two methodologies compare.

Article tags:

0 You have liked this article 0 times.
1
Network Monitoring is Dead… What Now? TLS, QUIC and Beyond

Network Monitoring is Dead… What Now? TLS, QUIC and Beyond

Kathleen Moriarty

9 min read

This is the first in a series of articles related to network and security management and monitoring changes as the Internet moves toward session encryption protocols with forward secrecy that are more difficult to intercept.

Article tags:

0 You have liked this article 0 times.
0

Showing 868 article(s)