Banner image

Network Operations

All articles

IPv6 to Secure Business Continuity

IPv6 to Secure Business Continuity

Author image
Marco Hogewoning

9 min read

Every few months somewhere somebody will tell you that the sky is falling and the end of the Internet is close. The reasons brought up vary through a broad spectrum from superior technology to the lack of capacity. To a large extent people in the industry have become immune to these messages, for t…

Article tags:

0 Likes are disabled for this article.
0
IPv6 Analyser Main Overview

The IPv6 Analyser

Author image
Alex Band

4 min read

The IPv6 Analyser is a toolset that offers our members a visual insight into all the allocations, aggregations and assignments they have made. It was announced a few weeks ago and we're seeing LIRs starting to use it. Please find below some more details about this tool.

Article tags:

0 Likes are disabled for this article.
0
SSHCure: SSH Intrusion Detection Using NetFlow and IPFIX

SSHCure: SSH Intrusion Detection Using NetFlow and IPFIX

Author image
Luuk Hendriks

4 min read

SSHCure is an Intrusion Detection System for SSH, developed at the University of Twente. It allows analysing large amounts of flow data and is the first IDS capable of identifying actual compromises. Being deployed in various networks, ranging from small Web-hosting companies to nation-wide backb…

Article tags:

4 Likes are disabled for this article.
2
Better Crypto - Applied Cryptography Hardening

Better Crypto - Applied Cryptography Hardening

5 min read

This project aims at creating a simple, copy & paste-able HOWTO for secure crypto settings of the most common services (webservers, mail, ssh, etc.). It was presented at the recent RIPE 68 Meeting in Warsaw. For those of you who couldn't attend the meeting, here is summary of the talk.

Article tags:

4 Likes are disabled for this article.
2
Survey on Mitigation and Response of Network Attacks

Survey on Mitigation and Response of Network Attacks

2 min read

Network-based attacks pose a strong threat to the Internet landscape. In my PhD I am investigating different approaches on attack mitigation and response. Yet, a clear understanding of how mitigation and response is performed in commercial networks is missing. Hence, this survey aims at gaining ins…

Article tags:

0 Likes are disabled for this article.
0
Sending and Receiving Emails over IPv6

Sending and Receiving Emails over IPv6

Author image
Mirjam Kühne

16 min read

The change to IPv6 creates new challenges to keep spam out of email. Because of the sheer size of the IPv6 space, it seems more efficient to build a domain-blocking and reputation system rather than an IP-blocking system. But how do we ensure emails over IPv6 have an authenticated domain?

Article tags:

3 Likes are disabled for this article.
2
Modifications to the IP Analyser to Reflect New Policy

Modifications to the IP Analyser to Reflect New Policy

Author image
Alex Band

5 min read

We are in the process of implementing the policy regarding Post Depletion Adjustment of Procedures (2013-03). In this article we will give an overview of the changes we are making to the IP Analyser web interface and API, so you can accommodate your scripts and workflow. We intend to implement thes…

Article tags:

0 Likes are disabled for this article.
0
BGP Leaks in Indonesia

BGP Leaks in Indonesia

Author image
Rene Wilhelm

5 min read

In this article we are looking in some more detail at BGP leak in Indonesia and illustrate how RIPEstat visualisations can help to assess the impact.

Article tags:

0 Likes are disabled for this article.
0

Showing 889 article(s)