Banner image

Technology and Innovation

Latest articles

iStock-1733553958

A Day in the Life of RIPE Atlas

Author image
Yevheniya Nosyk

10 min read

On any given day, RIPE Atlas generates billions of measurement results, offering a comprehensive view of connectivity and reachability worldwide. This data, collected for over a decade, forms a unique historical record of the Internet. Here, we focus on a single day to show how RIPE Atlas operates …

Article tags:

57 Please read the article before liking.
0
forward_hell_cover

Forward to Hell? On Misusing Transparent DNS Forwarders For Amplification Attacks

Author image
Maynard Koch

10 min read

DNS infrastructure is infamous for facilitating reflective amplification attacks. Countermeasures such as server shielding, access control, rate limiting and protocol restrictions have improved the situation, but DNS-based reflective amplification attacks persist. Focusing on the threat vector intr…

Article tags:

53 Please read the article before liking.
0
ixp_growth_global

Peering Market at a Glance: Trends, Transformations, and the Regional Dynamics of Internet Interconnection

Author image
Flavio Luciani

3 min read

Recent claims that IXPs "aren’t showing significant growth", that more interconnection is happening outside exchanges, and that peering can be more expensive than transit challenge long-standing assumptions about the role of IXPs. But do these claims hold up? A new paper from NAMEX explores the dat…

Article tags:

70 Please read the article before liking.
0
quantum_increase

DNSSEC and PQC: Practical Impact of Increased TCP in DNS

Author image
Eline Stehouwer

17 min read

Post-quantum cryptography could make DNSSEC responses bigger, pushing more DNS traffic from UDP to TCP. In this guest post, Eline Stehouwer (SIDN Labs) explores what that means for authoritative name servers, replaying real .nl traffic across NSD, Knot, BIND and PowerDNS.

Article tags:

25 Please read the article before liking.
0

All articles

podcast_cover

Raffaele Sommese - The Technical Impact of Rapid-Response Blocking: Italy’s Piracy Shield

Author image
Alun Davies

2 min read

In our latest episode, Raffaele Sommese of the University of Twente shares insights from him and his colleagues on Italy’s Piracy Shield and how rapid-response blocking works in practice. We get into the technical impact, how it can be measured, and the consequences for connectivity.

Article tags:

63 Please read the article before liking.
0
irr2

The IRR Landscape: Data Quality - the Good, the Bad, and the Outdated

Author image
Tobias Striffler

21 min read

In the second of our IRR landscape series, we focus squarely on data quality: how accurate, current, and usable IRR routing data really is. Using freshness, DFZ alignment and RPKI conflicts, we spotlight where third-party IRRs drift and why cleanup matters.

Article tags:

101 Please read the article before liking.
0
academic outreach

How Small Industry Labs Can Thrive Through Open Research

Author image
Giovane Moura

6 min read

Drawing on lessons from 13 years of collaboration with academia, this guest post from SIDN Labs shows how small registries can build and sustain impactful open research partnerships with universities, from shaping shared agendas to turning results into operational improvements.

Article tags:

21 Please read the article before liking.
0
quantum sec

Enterprise and SaaS Providers Prepare for Quantum Computing

Author image
Kathleen Moriarty

12 min read

Amidst all the noise around quantum computing, this article aims to help organisations move beyond the hype and focus on practical steps developers and teams can take to prepare for what’s ahead.

Article tags:

33 Please read the article before liking.
2
lighbulb

Still Smart, Still Insecure: Why Our IoT Devices Keep Failing Basic Security Tests

Author image
Anna Maria Mandalari

3 min read

When you plug in that shiny new smart bulb or connect your Chromecast to the network, you probably assume it’s secure. After all, these are well-known brands, some even boasting compliance labels or “secure by design” marketing claims. Yet, our latest assessment paints a more troubling picture, one…

Article tags:

57 Please read the article before liking.
0
ddos_scrubber

A First Look at the Adoption of BGP-based DDoS Scrubbing Services

Author image
Shyam Krishna Khadka

8 min read

We present a first look at the adoption of BGP-based DDoS scrubbing, developing a methodology that sheds light on use of the global top five scrubbers. By identifying protected ASes and prefixes via four BGP AS-path patterns in RIS/RouteViews, we provide an initial overview of adoption across the I…

Article tags:

35 Please read the article before liking.
0

Showing 240 article(s)

Previous
1 2 3 ... 24
Next