Banner image

Network Operations

All articles

Survey on Internet Routing Security

Survey on Internet Routing Security

Author image
Sebastian Abt

2 min read

This is a call for participation in a survey on Internet Routing Security. The survey runs until 9 January 2015 and will only take a few minutes.

Article tags:

0 Likes are disabled for this article.
2
Call for Input: RPKI Browser

Call for Input: RPKI Browser

Author image
Matthias Wählisch

3 min read

The RPKI Browser is a graphical user interface to the objects of the distributed RPKI repository. The development is at very early stage. In this article, we ask for external input in terms of use cases, features etc.

Article tags:

1 Likes are disabled for this article.
0
Resolvers Fig.2

The Resolvers We Use

Author image
Geoff Huston

23 min read

The Internet’s Domain Name System is a modern day miracle. It may not represent the largest database that has ever been built, but nevertheless it’s truly massive. And even if it’s not the largest database that’s ever been built, it’s perhaps one of the more intensively used. The DNS is consulted e…

Article tags:

0 Likes are disabled for this article.
0
Who's Watching fig.2

Who's Watching

Author image
Geoff Huston

28 min read

Much has been said over the pasts year or so about various forms of cyber spying. The United States has accused the Chinese of cyber espionage and stealing industrial secrets. A former contractor to the United States' NSA, Edward Snowden, has accused various US intelligence agencies of systematic e…

Article tags:

0 Likes are disabled for this article.
1
ECDSA and DNSSEC

ECDSA and DNSSEC

Author image
Geoff Huston

23 min read

Yes, that's a cryptic topic, even for an article that addresses matters of the use of cryptographic algorithms, so congratulations for getting even this far! This is a report of an experiment conducted in September and October 2014 by the authors to measure the extent to which deployed DNSSEC-valid…

Article tags:

0 Likes are disabled for this article.
0
Privacy and Security - Five Objectives

Privacy and Security - Five Objectives

Author image
Geoff Huston

7 min read

It has been a very busy period in the domain of computer security. With "shellshock", "heartbleed" and NTP monlink adding to the background of open DNS resolvers, port 445 viral nasties, SYN attacks and other forms of vulnerability exploits, it's getting very hard to see the forest for the trees. W…

Article tags:

0 Likes are disabled for this article.
2
Secure Internet Routing with RPKI

Secure Internet Routing with RPKI

Author image
Remy de Boer

6 min read

Last week we improved the security of our routing infrastructure by implementing RPKI (Resource Public Key Infrastructure), a technology that can be used to secure the Internet routing infrastructure. RPKI was the topic of my Master's thesis and in this article I am trying to convince you to use th…

Article tags:

0 Likes are disabled for this article.
2
K-root map

Experiment Proposal to Improve K-root

Author image
Suzanne Taylor

4 min read

We used RIPE Atlas to measure latency times to K-root, and we believe we can improve those times by adding new nodes to K-root in strategic locations. Here, we propose the idea of developing an experiment that would let us measure this potential improvement.

Article tags:

0 Likes are disabled for this article.
0
LISPmob: a Flexible LISP Implementation

LISPmob: a Flexible LISP Implementation

Author image
Alberto Rodriguez-Natal

12 min read

The Locator/ID Separation Protocol (LISP) decouples identity from location on the current IP addresses by creating two separate namespaces. The LISPmob project aims to bring a full-featured LISP open-source implementation to Linux-flavoured systems.

Article tags:

0 Likes are disabled for this article.
4
Overview with ExaBGP

Building The Next Generation RIS Route Collectors

Author image
Wouter Miltenburg

7 min read

This is the second part of a research project investigating the possible replacement of the current Remote Route Collectors (RRC) used for the Routing Information Services (RIS). In the second phase we developed a prototype based on the requirements determined in the first phase. Both parts of …

Article tags:

0 Likes are disabled for this article.
2

Showing 924 article(s)