Technology and Innovation

Latest articles

Assessing the Security of Internet Paths

Assessing the Security of Internet Paths

Shyam Krishna Khadka

9 min read

Although many critical infrastructures (CIs) rely on cloud services (e.g., email) for their daily operations, they typically have limited insight into the security status of the paths their traffic might follow across the Internet to reach their cloud provider’s infrastructures. Can a CI know all t…

Article tags:

16 You have liked this article 0 times.
0
A Multifaceted Look at Starlink Performance - The Good, the Bad and the Ugly

A Multifaceted Look at Starlink Performance - The Good, the Bad and the Ugly

Nitinder Mohan

9 min read

How does Starlink stack up against terrestrial ISPs as a global service? And exactly what factors impact its operations? A new multifaceted active and passive measurement study uncovers the good, the bad and the ugly when it comes to Starlink performance.

Article tags:

22 You have liked this article 0 times.
0
Paola Grosso: Defining a Responsible Internet

Paola Grosso: Defining a Responsible Internet

Alun Davies

2 min read

For many, the Internet is essentially a black box. We connect with other endpoints to send and receive data, but we have little insight into what happens in between. Dr Paola Grosso talks about how CATRIN seeks to provide more visibility and control so we can make more responsible decisions on how …

Article tags:

53 You have liked this article 0 times.
0
20 Years of Inferring Interdomain Routing Policies

20 Years of Inferring Interdomain Routing Policies

Savvas Kastanakis

9 min read

As the structure of the Internet has become ever flatter over time, what effect has this had on the dynamics of inter-domain routing? A new study examines whether 20-year-old insights into the characteristics of routing policies still hold.

Article tags:

54 You have liked this article 0 times.
0

All articles

BEREC Report on the IP Interconnection Ecosystem

BEREC Report on the IP Interconnection Ecosystem

Christoph Mertens

4 min read

Following on from their earlier call for input, BEREC have now released a draft report on the IP interconnection ecosystem. Take a look at their findings and contribute by sending your feedback.

Article tags:

10 You have liked this article 0 times.
0
Whose CIDR Is It Anyway?

Whose CIDR Is It Anyway?

Jan Schaumann

22 min read

IP address space wasn't divided evenly, and after years of re-allocation and re-assigment, the question that comes to mind is: who owns what parts of it? In the latest in a series of articles on the centralisation of the Internet, Jan Schaumann digs into the data to try to get a clearer view.

Article tags:

66 You have liked this article 0 times.
3
Authenticated DNSSEC Bootstrapping: From Hackathon Project to Useful Software

Authenticated DNSSEC Bootstrapping: From Hackathon Project to Useful Software

Peter Thomassen

7 min read

At the RIPE DNS Hackathon 2023, a group of DNS enthusiasts started writing implementations of the Authenticated DNSSEC Bootstrapping protocol. After the event, the work continued, culminating in the completion of a module for Knot DNS. So what problem does the new feature address, and how can you u…

Article tags:

18 You have liked this article 0 times.
0
Collaborative DDoS Mitigation: From Research to Operational Practice

Collaborative DDoS Mitigation: From Research to Operational Practice

Thijs van den Hout

11 min read

Distributed denial-of-service (DDoS) attacks continue to plague the Internet and pose a risk to the availability of critical digital systems that we increasingly depend on in our daily lives. Thijs van den Hout and his colleagues outline their contributions and lessons learned from 5 years of resea…

Article tags:

51 You have liked this article 0 times.
0
Bert Hubert: Internet Privacy and the Cost of Losing Control

Bert Hubert: Internet Privacy and the Cost of Losing Control

Alun Davies

2 min read

Internet users, the companies who sell us our devices, and governments are all caught up in the struggle for online privacy. In this episode, Bert Hubert explains how outsourcing and other market forces determine the flow of control over personal data and why we need to understand the consequences.

Article tags:

251 You have liked this article 0 times.
0
Cloudy with a Chance of Cyberattacks - Dangling Resource Abuse on Cloud Platforms

Cloudy with a Chance of Cyberattacks - Dangling Resource Abuse on Cloud Platforms

Haya Schulmann

7 min read

Dangling DNS records are a target for bad actors, but distinguishing malicious from legitimate changes in resources isn't always easy. The team from ATHENE report on the main findings of their research into the abuse of dangling resources in the cloud.

Article tags:

48 You have liked this article 0 times.
0

Showing 196 article(s)

Previous
1 2 3 ... 20
Next