Banner image

Technology and Innovation

Latest articles

ADoX Deployment in the Wild cover

ADoX Deployment in the Wild

Author image
Yevheniya Nosyk

11 min read

Encryption between DNS resolvers and users is growing - but what about the next hop? We measure the real-world deployment of encrypted resolver-to-authoritative DNS (ADoX), finding limited, highly concentrated adoption and little support among resolvers.

Article tags:

29 Please read the article before liking.
0
quic_cover

Using QUIC Backscatter to Infer Hypergiant Deployment Configurations

Author image
Jonas Mücke

10 min read

QUIC enhances privacy, but passive measurements still reveal deployment details. Using network telescope data, we analyse QUIC behaviour across major content providers and validate our findings with flow data and active measurements.

Article tags:

29 Please read the article before liking.
0
noise

Noisy Routers: Investigating the Make-Up of Route Collector Data

Author image
Ebrima Jaw

11 min read

Analysis of 80B+ BGP updates shows repeated "noise" is highly concentrated in a small set of peers, sessions, and prefixes, inflating datasets. Researchers from Twente, CAIDA, SIDN Labs, and IIJ examine impacts on measurement and operations.

Article tags:

37 Please read the article before liking.
0
ott-apps

Beyond the Network View: DNS-Driven Application Visibility

Author image
Danny Lachos

6 min read

Network operators often lack visibility into which applications drive their traffic. We present an open-source DNS-based correlation method that enriches NetFlow and BGP data with application and CDN information. This enables a shift from a network-centric to an application-oriented view of traffic.

Article tags:

45 Please read the article before liking.
0

All articles

break_loop_cover

Make This One Change to Prevent Routing Loops in Your Network

Author image
Maynard Koch

5 min read

Routing loops can trap packets between routers, preventing them from reaching their destination. In some cases, routers even duplicate looping packets, amplifying traffic and threatening Internet stability. We look at how this happens and how operators can prevent it.

Article tags:

138 Please read the article before liking.
0
forward_hell_cover

Forward to Hell? On Misusing Transparent DNS Forwarders For Amplification Attacks

Author image
Maynard Koch

10 min read

DNS infrastructure is infamous for facilitating reflective amplification attacks. Countermeasures such as server shielding, access control, rate limiting and protocol restrictions have improved the situation, but DNS-based reflective amplification attacks persist. Focusing on the threat vector intr…

Article tags:

163 Please read the article before liking.
0
ixp_growth_global

Peering Market at a Glance: Trends, Transformations, and the Regional Dynamics of Internet Interconnection

Author image
Flavio Luciani

3 min read

Recent claims that IXPs "aren’t showing significant growth", that more interconnection is happening outside exchanges, and that peering can be more expensive than transit challenge long-standing assumptions about the role of IXPs. But do these claims hold up? A new paper from NAMEX explores the dat…

Article tags:

76 Please read the article before liking.
0
quantum_increase

DNSSEC and PQC: Practical Impact of Increased TCP in DNS

Author image
Eline Stehouwer

17 min read

Post-quantum cryptography could make DNSSEC responses bigger, pushing more DNS traffic from UDP to TCP. In this guest post, Eline Stehouwer (SIDN Labs) explores what that means for authoritative name servers, replaying real .nl traffic across NSD, Knot, BIND and PowerDNS.

Article tags:

28 Please read the article before liking.
0
podcast_cover

Raffaele Sommese - The Technical Impact of Rapid-Response Blocking: Italy’s Piracy Shield

Author image
Alun Davies

2 min read

In our latest episode, Raffaele Sommese of the University of Twente shares insights from him and his colleagues on Italy’s Piracy Shield and how rapid-response blocking works in practice. We get into the technical impact, how it can be measured, and the consequences for connectivity.

Article tags:

80 Please read the article before liking.
0
irr2

The IRR Landscape: Data Quality - the Good, the Bad, and the Outdated

Author image
Tobias Striffler

21 min read

In the second of our IRR landscape series, we focus squarely on data quality: how accurate, current, and usable IRR routing data really is. Using freshness, DFZ alignment and RPKI conflicts, we spotlight where third-party IRRs drift and why cleanup matters.

Article tags:

101 Please read the article before liking.
0

Showing 244 article(s)

Previous
1 2 3 ... 25
Next