Banner image

Network Operations

All articles

Passive Observations of Large DNS Service

Passive Observations of Large DNS Service

Author image
Wouter de Vries

5 min read

In 2009, Google launched its Public DNS service, with its characteristic IP address 8.8.8.8. Since then, this service has grown to be the largest and most well-known DNS service in existence. Due to the centralisation that is caused by public DNS services, large content delivery networks (CDNs), su…

Article tags:

2 Likes are disabled for this article.
1
Sunrise DNS-over-TLS! Sunset DNSSEC?

Sunrise DNS-over-TLS! Sunset DNSSEC?

Author image
Willem Toorop

11 min read

Is DNSSEC still needed when you get your DNS over TLS? DNSSEC's original design goals could also be met in a future DoT-only world. However, DNSSEC's aspirations have moved on with DANE. Unfortunately DNSSEC and DANE are hardly ever available at end-user devices. DoT brings liable delivery of DNS, …

Article tags:

0 Likes are disabled for this article.
0
CrypTech – Next Steps Towards a Safer Internet

CrypTech – Next Steps Towards a Safer Internet

Author image
Phil Roberts

4 min read

The main goal of CrypTech is to create an open-source design for a hardware cryptographic engine for Hardware Security Modules (HSMs). At the same time it also provides a associated reference implementation that allows anyone to develop, deploy and audit a secure, low-cost cryptographic engine in t…

Article tags:

0 Likes are disabled for this article.
0
HE_BGP_1.png

Monitoring BGP Anomalies on the Internet

Author image
Martin Winter

5 min read

There are many flavours of BGP hijacks, misconfigurations or outdated implementations. Here are some examples and tips how to verify your announcements.

Article tags:

0 Likes are disabled for this article.
0
An Update on Securing BGP

An Update on Securing BGP

Author image
Geoff Huston

22 min read

One way or another we’ve been working on various aspects of securing the Internet’s inter-domain routing system for many years.

Article tags:

0 Likes are disabled for this article.
1
Detection of Peering Infrastructure Outages Based on BGP Communities

Detection of Peering Infrastructure Outages Based on BGP Communities

Author image
Vasileios Giotsas

8 min read

Networks rely increasingly on Internet Exchange Points (IXPs) and carrier-neutral interconnection facilities that enable dense localised peering connectivity to handle the massive traffic exchange between clients and servers.

Article tags:

0 Likes are disabled for this article.
0
ARTEMIS: Neutralising BGP Hijacking Within a Minute

ARTEMIS: Neutralising BGP Hijacking Within a Minute

Author image
Vasileios Kotronis

9 min read

BGP prefix hijacking is a persistent threat against Internet organisations, attributed to a lack of authorisation and authentication mechanisms in the inter-domain routing system. ARTEMIS (Automatic and Real-Time dEtection and MItigation System) is a defence system against BGP prefix hijacking, whi…

Article tags:

0 Likes are disabled for this article.
11
DNS1-GIH.png

The Uncertainty of Measuring the DNS

Author image
Geoff Huston

22 min read

The period around the end of the nineteenth century and the start of the twentieth century saw a number of phenomenal advances in the physical sciences.

Article tags:

4 Likes are disabled for this article.
0
BGP Flexibility and its Consequences

BGP Flexibility and its Consequences

Author image
Alexander Azimov

5 min read

Border Gateway Protocol (BGP) is the only exterior gateway protocol created to control traffic between Internet Service Providers (ISPs) all over the world. The initial protocol design was so flexible that after 20 years, it has become a de facto standard mechanism for MPLS/VPN and even Interior Ga…

Article tags:

0 Likes are disabled for this article.
0

Showing 889 article(s)