Banner image

Technology and Innovation

All articles

RIPE NCC Internet Country Report: Central Asia

RIPE NCC Internet Country Report: Central Asia

Author image
Suzanne Taylor

3 min read

We examine the Internet landscape in five different countries in Central Asia as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

0 Likes are disabled for this article.
0
Overcoming the Limitations of UDP Options

Overcoming the Limitations of UDP Options

Author image
Raffaele Zullo

6 min read

A recent extension that aims to add support for transport options to the User Datagram Protocol (UDP) is already showing promise. Unfortunately, its deployment may be undermined by the way existing network devices process UDP length and checksum. In this post we at the Electronics Research Group,…

Article tags:

0 Likes are disabled for this article.
0
Picture 1.png

Measuring QoE by Measuring TCP Connection Establishment Delay in a Service Provider Network

Author image
Ali Norouzi

6 min read

I’ve created a traffic analyser to help network engineers detect issues related to quality of experience.

Article tags:

7 Likes are disabled for this article.
0
Distributed_RPKI.jpg

Limiting the Power of RPKI Authorities

Author image
Kris Shrishak

5 min read

In the beginning, Internet infrastructure was not originally designed with security in mind. Luckily, this mindset has changed over the years, mainly due to the growing number of attacks, and has prompted the design of security measures such as Domain Name System Security Extensions (DNSSEC) and Re…

Article tags:

0 Likes are disabled for this article.
0
DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown

DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown

Author image
Daniel Kopp

9 min read

In this article, we investigated booter-based DDoS attacks in the wild and the impact of an FBI takedown targeting fifteen booter websites in December 2018. We investigated and compared attack properties of multiple booter services by launching DDoS attacks against our own infrastructure. To unders…

Article tags:

2 Likes are disabled for this article.
0
transfermarket_fig6.png

IPv4 Transfer Markets Misuse: A First Look

Author image
Vasileios Giotsas

7 min read

The secondary IP address market has become a viable source of IPv4 address space, but it may also present opportunities to malicious networks to bypass reputation-based security mechanisms. In this article we summarise the results of our first detailed study of how transferred IPv4 prefixes are mis…

Article tags:

11 Likes are disabled for this article.
1
xdp_s.png

Journeying into XDP: Part 0

Author image
Luuk Hendriks

13 min read

Network programming using XDP has been on our radar (and if you are reading this, possibly on yours too!) for a while now. As tooling around this technology has vastly improved, we decided that it was time to finally get our hands dirty and see what this technology is all about.

Article tags:

15 Likes are disabled for this article.
0
Typewriter.png

Help to Understand Secure Email Around the Globe

Author image
Mirjam Kühne

3 min read

Olamide Omolola and Tobias Fiebig are studying the degree to which email systems are configured securely. And they need your help: they want to receive emails from as many different mail providers around the world as possible.

Article tags:

0 Likes are disabled for this article.
0
Route Flap Damping in the Wild?!

Route Flap Damping in the Wild?!

Author image
Clemens Mosig

9 min read

BGP Route Flap Damping (RFD) and its use has been a controversial topic in the past. Recommendations have been revised multiple times over the past two decades and still differ from vendor default values. In this article we dive into how we measured Route Flap Damping in the real-world, uncover whi…

Article tags:

24 Likes are disabled for this article.
0
Connecting the Quantum Internet

Connecting the Quantum Internet

Author image
Vesna Manojlovic

2 min read

As a part of our efforts to increase collaboration between the "classical" Internet and quantum networking research, we are republishing the summary of a research paper on "heterogeneous quantum networks".

Article tags:

0 Likes are disabled for this article.
0

Showing 214 article(s)