Network Operations

All articles

The IPv6 Analyser

The IPv6 Analyser

Alex Band

4 min read

The IPv6 Analyser is a toolset that offers our members a visual insight into all the allocations, aggregations and assignments they have made. It was announced a few weeks ago and we're seeing LIRs starting to use it. Please find below some more details about this tool.

Article tags:

0 You have liked this article 0 times.
0
SSHCure: SSH Intrusion Detection Using NetFlow and IPFIX

SSHCure: SSH Intrusion Detection Using NetFlow and IPFIX

Luuk Hendriks

4 min read

SSHCure is an Intrusion Detection System for SSH, developed at the University of Twente. It allows analysing large amounts of flow data and is the first IDS capable of identifying actual compromises. Being deployed in various networks, ranging from small Web-hosting companies to nation-wide backb…

Article tags:

4 You have liked this article 0 times.
2
Better Crypto - Applied Cryptography Hardening

Better Crypto - Applied Cryptography Hardening

5 min read

This project aims at creating a simple, copy & paste-able HOWTO for secure crypto settings of the most common services (webservers, mail, ssh, etc.). It was presented at the recent RIPE 68 Meeting in Warsaw. For those of you who couldn't attend the meeting, here is summary of the talk.

Article tags:

4 You have liked this article 0 times.
2
Survey on Mitigation and Response of Network Attacks

Survey on Mitigation and Response of Network Attacks

2 min read

Network-based attacks pose a strong threat to the Internet landscape. In my PhD I am investigating different approaches on attack mitigation and response. Yet, a clear understanding of how mitigation and response is performed in commercial networks is missing. Hence, this survey aims at gaining ins…

Article tags:

0 You have liked this article 0 times.
0
Sending and Receiving Emails over IPv6

Sending and Receiving Emails over IPv6

Mirjam Kühne

16 min read

The change to IPv6 creates new challenges to keep spam out of email. Because of the sheer size of the IPv6 space, it seems more efficient to build a domain-blocking and reputation system rather than an IP-blocking system. But how do we ensure emails over IPv6 have an authenticated domain?

Article tags:

3 You have liked this article 0 times.
2
Modifications to the IP Analyser to Reflect New Policy

Modifications to the IP Analyser to Reflect New Policy

Alex Band

5 min read

We are in the process of implementing the policy regarding Post Depletion Adjustment of Procedures (2013-03). In this article we will give an overview of the changes we are making to the IP Analyser web interface and API, so you can accommodate your scripts and workflow. We intend to implement thes…

Article tags:

0 You have liked this article 0 times.
0
BGP Leaks in Indonesia

BGP Leaks in Indonesia

Rene Wilhelm

5 min read

In this article we are looking in some more detail at BGP leak in Indonesia and illustrate how RIPEstat visualisations can help to assess the impact.

Article tags:

0 You have liked this article 0 times.
0
Timeline for Phasing Out the Old TTM-based DNSMON

Timeline for Phasing Out the Old TTM-based DNSMON

Romeo Zwart

3 min read

The RIPE NCC announced a new version of DNSMON, available for testing by the public, in March 2014. We are now planning the removal of the old DNSMON.

Article tags:

0 You have liked this article 0 times.
0

Showing 868 article(s)