Technology and Innovation

Latest articles

Does the Internet Route Around Damage? - Baltic Sea Cable Cuts

Does the Internet Route Around Damage? - Baltic Sea Cable Cuts

Emile Aben

9 min read

This week's Internet cable cuts in the Baltic sea have been widely reported, even as attempts to understand their cause and impact are ongoing. We turn to RIPE Atlas to provide a preliminary analysis of these events and examine to what extent the Internet in the region is resilient to them.

Article tags:

44 You have liked this article 0 times.
0
Serial BGP Hijackers: A Reproducibility Study and Assessment of Current Dynamics

Serial BGP Hijackers: A Reproducibility Study and Assessment of Current Dynamics

Ebrima Jaw

9 min read

Serial hijackers are malicious actors that repeatedly carry out prefix hijacks on various networks, some lasting for months or years. A new study assesses the evolution of serial hijacking events since 2019 and determines what actions the technical community is taking to protect the Internet agains…

Article tags:

42 You have liked this article 0 times.
1
The Internet Exchange Point: A Window Onto a Changing Internet

The Internet Exchange Point: A Window Onto a Changing Internet

Flavio Luciani

6 min read

IXPs are the airports of the Internet, busy hubs connecting traffic from a multitude of networks. The Namex observatory provides a unique view of the health and stability of the Internet as it continues to grow and evolve.

Article tags:

37 You have liked this article 0 times.
0
The Next Generation of BGP Data Collection Platforms

The Next Generation of BGP Data Collection Platforms

Thomas Holterbach

12 min read

Existing BGP data collection platforms face challenges that threaten their long-term sustainability: their data comes with enormous redundancy and significant visibility gaps. We explore a new BGP data collection paradigm, already implemented in a prototype called GILL, that could stir change for o…

Article tags:

46 You have liked this article 0 times.
0

All articles

ccTLD Phishing Characterisation

ccTLD Phishing Characterisation

Giovane Moura

10 min read

Phishing attacks are, to this day, one of the most widespread and effective means of getting access to sensitive and financial data. A new study from the team from SIDN Labs combines more than 28,000 phishing domain names in a bid to improve detection and mitigation policies.

Article tags:

31 You have liked this article 0 times.
0
Roughtime: Securing Time for IoT Devices

Roughtime: Securing Time for IoT Devices

Robert Allen

4 min read

Roughtime is a draft protocol aimed at providing a secure way for IoT devices to obtain time. In this Q&A from Netnod, Marcus Dansarie, Technical Consultant at Netnod and co-author of the IETF draft on Roughtime, answers questions on why secure time is essential, the challenges for IoT devices, and…

Article tags:

19 You have liked this article 0 times.
0
Putting the MAU Into meowmeow: On Personal ASNs

Putting the MAU Into meowmeow: On Personal ASNs

Tobias Fiebig

14 min read

Is the use of personal ASNs to gain hands-on operational experience really such a bad idea, or is this one of the ways we make sure the Internet remains a place of equitable participation, expression and learning? In this guest article, Tobias Fiebig shares his views.

Article tags:

61 You have liked this article 0 times.
0
A Comprehensive Review of RIR Policies in the Domain of AS Number Management

A Comprehensive Review of RIR Policies in the Domain of AS Number Management

Nachiket Kondhalkar

4 min read

A research team at TU Delft is researching the management of AS Numbers across RIRs as well as the potential impact of the new annual maintenance fees for ASNs and we invite you to contribute.

Article tags:

22 You have liked this article 0 times.
0
A Multifaceted Look at Starlink Performance - The Good, the Bad and the Ugly

A Multifaceted Look at Starlink Performance - The Good, the Bad and the Ugly

Nitinder Mohan

9 min read

How does Starlink stack up against terrestrial ISPs as a global service? And exactly what factors impact its operations? A new multifaceted active and passive measurement study uncovers the good, the bad and the ugly when it comes to Starlink performance.

Article tags:

63 You have liked this article 0 times.
0
Paola Grosso: Defining a Responsible Internet

Paola Grosso: Defining a Responsible Internet

Alun Davies

2 min read

For many, the Internet is essentially a black box. We connect with other endpoints to send and receive data, but we have little insight into what happens in between. Dr Paola Grosso talks about how CATRIN seeks to provide more visibility and control so we can make more responsible decisions on how …

Article tags:

58 You have liked this article 0 times.
0

Showing 203 article(s)

Previous
1 2 3 ... 21
Next