Banner image

Network Operations

All articles

SSHCure: SSH Intrusion Detection Using NetFlow and IPFIX

SSHCure: SSH Intrusion Detection Using NetFlow and IPFIX

Author image
Luuk Hendriks

4 min read

SSHCure is an Intrusion Detection System for SSH, developed at the University of Twente. It allows analysing large amounts of flow data and is the first IDS capable of identifying actual compromises. Being deployed in various networks, ranging from small Web-hosting companies to nation-wide backb…

Article tags:

4 Likes are disabled for this article.
2
Better Crypto - Applied Cryptography Hardening

Better Crypto - Applied Cryptography Hardening

5 min read

This project aims at creating a simple, copy & paste-able HOWTO for secure crypto settings of the most common services (webservers, mail, ssh, etc.). It was presented at the recent RIPE 68 Meeting in Warsaw. For those of you who couldn't attend the meeting, here is summary of the talk.

Article tags:

4 Likes are disabled for this article.
2
Survey on Mitigation and Response of Network Attacks

Survey on Mitigation and Response of Network Attacks

2 min read

Network-based attacks pose a strong threat to the Internet landscape. In my PhD I am investigating different approaches on attack mitigation and response. Yet, a clear understanding of how mitigation and response is performed in commercial networks is missing. Hence, this survey aims at gaining ins…

Article tags:

0 Likes are disabled for this article.
0
Sending and Receiving Emails over IPv6

Sending and Receiving Emails over IPv6

Author image
Mirjam Kühne

16 min read

The change to IPv6 creates new challenges to keep spam out of email. Because of the sheer size of the IPv6 space, it seems more efficient to build a domain-blocking and reputation system rather than an IP-blocking system. But how do we ensure emails over IPv6 have an authenticated domain?

Article tags:

3 Likes are disabled for this article.
2
Modifications to the IP Analyser to Reflect New Policy

Modifications to the IP Analyser to Reflect New Policy

Author image
Alex Band

5 min read

We are in the process of implementing the policy regarding Post Depletion Adjustment of Procedures (2013-03). In this article we will give an overview of the changes we are making to the IP Analyser web interface and API, so you can accommodate your scripts and workflow. We intend to implement thes…

Article tags:

0 Likes are disabled for this article.
0
BGP Leaks in Indonesia

BGP Leaks in Indonesia

Author image
Rene Wilhelm

5 min read

In this article we are looking in some more detail at BGP leak in Indonesia and illustrate how RIPEstat visualisations can help to assess the impact.

Article tags:

0 Likes are disabled for this article.
0
Timeline for Phasing Out the Old TTM-based DNSMON

Timeline for Phasing Out the Old TTM-based DNSMON

Author image
Romeo Zwart

3 min read

The RIPE NCC announced a new version of DNSMON, available for testing by the public, in March 2014. We are now planning the removal of the old DNSMON.

Article tags:

0 Likes are disabled for this article.
0
NTP for Evil

NTP for Evil

Author image
Geoff Huston

23 min read

In this article Geoff Huston describes attacks that involve the Network Time Protocol (NTP) and what can be done to defend against them.

Article tags:

0 Likes are disabled for this article.
3

Showing 897 article(s)