Banner image

Network Operations

All articles

Honeypot-based Monitoring of Amplification DDoS Attacks

Honeypot-based Monitoring of Amplification DDoS Attacks

Author image
Johannes Krupp

5 min read

Amplification DDoS attacks are one of the most prevalent forms of denial-of-service attacks. The SISSDEN project (sissden.eu) operates a network of honeypots designed to detect these attacks, observing 10,000 per day.

Article tags:

0 Likes are disabled for this article.
5
Measuring the Adoption of RPKI Route Origin Validation

Measuring the Adoption of RPKI Route Origin Validation

Author image
Andreas Reuter

10 min read

The number of Resource Certificates and ROAs is steadily growing, especially in the RIPE NCC service region. However, it remains unclear how widely BGP speakers on the Internet are actually using route origin validation (ROV) to drop or de-preference invalid announcements.

Article tags:

4 Likes are disabled for this article.
0
Spam Over IPv6 - Eight Years Later

Spam Over IPv6 - Eight Years Later

Author image
Ivo Dijkhuis

3 min read

A long time ago we published an article on the amount of spam we receive over IPv6. Now, eight years later, we were curious to see if the spam landscape has changed.

Article tags:

0 Likes are disabled for this article.
2
What Are My Options? Session Encryption Protocols Looking Forward

What Are My Options? Session Encryption Protocols Looking Forward

Author image
Kathleen Moriarty

8 min read

This is the third and last piece in our mini series on network and security management. With TLSv1.3 approved and in the Internet Engineering Task Force (IETF) publication queue it’s time to think about deployment options and obstacles, and planning for changes inherent in this revision. Regardles…

Article tags:

0 Likes are disabled for this article.
0
TLS2-Fig1.png

They Are Looking At WHAT? Service Provider Monitoring

Author image
Kathleen Moriarty

5 min read

This is the second in a series of articles related to network and security management. This post digs deeper into the types of monitoring performed on internal and external networks to better understand considerations for your deployment plans.

Article tags:

0 Likes are disabled for this article.
0
IPv6 Adoption Statistics: How do APNIC and Facebook Compare?

IPv6 Adoption Statistics: How do APNIC and Facebook Compare?

Author image
Rene Wilhelm

4 min read

Both APNIC and Facebook publish statistics on IPv6 adoption per country. Next to the visualisations, these organisations also provide the numerical data. We take a look at these to see how the two methodologies compare.

Article tags:

0 Likes are disabled for this article.
1
TLS-Fig1.png

Network Monitoring is Dead… What Now? TLS, QUIC and Beyond

Author image
Kathleen Moriarty

9 min read

This is the first in a series of articles related to network and security management and monitoring changes as the Internet moves toward session encryption protocols with forward secrecy that are more difficult to intercept.

Article tags:

0 Likes are disabled for this article.
0
Blockers to IPv6 Adoption

Blockers to IPv6 Adoption

Author image
David Holder

11 min read

On a recent flight from the UK to the USA I sat next to the IT director for a global corporation. He asked me why I was travelling, to which I answered that I was giving the keynote presentation at an IPv6 conference held by the US Federal government. Without hesitation, his response was “IPv6 is n…

Article tags:

0 Likes are disabled for this article.
15
IPv6 Launchiversary: the View from RIPE Atlas and K-root

IPv6 Launchiversary: the View from RIPE Atlas and K-root

Author image
Stephen Strowes

10 min read

IPv6 growth continues apace; content networks regularly measure more than 20% of their requests as taking place over IPv6 today. However, deployment has not been uniform. In this article, we review growth from the perspective of RIPE Atlas data since the launch event.

Article tags:

0 Likes are disabled for this article.
0

Showing 936 article(s)