Network Operations

All articles

Louis Pétiniaud: Mapping the Geopolitical Internet

Louis Pétiniaud: Mapping the Geopolitical Internet

Alun Davies

2 min read

Mapping the dialectical relationship between the Internet and rivalries of power and influence across territories calls on expertise from a variety of disciplines. On the RIPE Labs Podcast, Louis Pétiniaud discusses how he and colleagues at GEODE are investigating the geopolitical Internet.

Article tags:

66 You have liked this article 0 times.
0
RIS Beaconing - Shining a Light on BGP Dynamics

RIS Beaconing - Shining a Light on BGP Dynamics

Emile Aben

21 min read

RIS is a widely used public route collector project that provides a better view of Internet routing. One thing that makes RIS unique is that it inserts observable patterns of activity into BGP through a process called beaconing. We take a look at RIS beacons and ask how to make space for more.

Article tags:

25 You have liked this article 0 times.
0
Connected to Port 53 - A Report from the DNS Hackathon 2023

Connected to Port 53 - A Report from the DNS Hackathon 2023

Vesna Manojlovic

4 min read

DNS Hackathon took place during the weekend before RIPE 86 in Rotterdam. Co-hosted by DNS-OARC, Netnod and the RIPE NCC, it included 46 "hackers" who worked on 6 projects, had a lot of fun and many stroopwafels. Read about the results, and join us next time!

Article tags:

11 You have liked this article 0 times.
0
BGP Path Attribute Filtering - A Powerful Tool to Mitigate Alien Attributes

BGP Path Attribute Filtering - A Powerful Tool to Mitigate Alien Attributes

Berislav Todorovic

11 min read

On 2 June 2023, there was a disruption in the global Internet routing, caused by the inability of BGP border routers to process an "alien" BGP Attribute. A nice RIPE Labs article about this event was published back then. Well, the alien turned out to be a "legal alien" - a known attribute, introduc…

Article tags:

76 You have liked this article 0 times.
1
Embedded IoT Security: Helping Vendors in the Design Process

Embedded IoT Security: Helping Vendors in the Design Process

Kathleen Moriarty

5 min read

With the number of IoT devices on track to exceed 30 billion within the next couple of years, CIS has created a resource that will help IoT vendors ease the process of building in security by design and by default.

Article tags:

18 You have liked this article 0 times.
0
Insights from the World’s Largest Cyber Defence Exercise

Insights from the World’s Largest Cyber Defence Exercise

Robert Allen

6 min read

On 22 April 2023, the Sweden-Iceland team led by Patrik Fältström, together with Brynja Huld Óskarsdóttir from Iceland, emerged victorious ahead of 23 other national teams in the prestigious cyber defence exercise Locked Shields (18-21 April 2023).

Article tags:

16 You have liked this article 0 times.
0
E-gov DNS: Are They Redundant Enough?

E-gov DNS: Are They Redundant Enough?

Giovane Moura

7 min read

Electronic government (e-gov) lets citizens interact with their government via the Internet. The DNS, which maps e-gov domain names to Internet addresses, underpins e-gov. Working with the University of Twente and NCSC-NL, SIDN Labs compare the resiliency and redundancy of e-gov domains for the Net…

Article tags:

15 You have liked this article 0 times.
0
RIPE NCC Internet Country Report: Central Europe

RIPE NCC Internet Country Report: Central Europe

Suzanne Taylor

3 min read

We take a comprehensive look at four countries in Central Europe as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

51 You have liked this article 0 times.
0
Separating FUD from Practical for Post-Quantum Cryptography

Separating FUD from Practical for Post-Quantum Cryptography

Kathleen Moriarty

6 min read

A practical approach to avoid falling into fear, uncertainty, and doubt (FUD) around post-quantum cryptography breaks down into three steps. Find out more in this guest post from Kathleen Moriarty, CTO of the Center for Internet Security.

Article tags:

10 You have liked this article 0 times.
0
Unknown Attribute 28 - A Source Of Entropy in Interdomain Routing?

Unknown Attribute 28 - A Source Of Entropy in Interdomain Routing?

Emile Aben

13 min read

On 2 June 2023, there was a disruption in Internet interdomain routing. We got notified of recurring resets of some routers that take care of routing between networks, due to malformed BGP packets with BGP attribute 28. Here we take a first look at the event through RIS and offer some initial ideas…

Article tags:

70 You have liked this article 0 times.
6

Showing 835 article(s)

Previous
1 ... 4 5 6 7 8 ... 84
Next