Banner image

Technology and Innovation

All articles

How Centralised is DNS Traffic Becoming?

How Centralised is DNS Traffic Becoming?

Author image
Giovane Moura

14 min read

There have been growing concerns over the last few years about the excessive concentration of control over the Internet's markets and infrastructure — what is commonly referred to as Internet centralisation. In this article, Giovane Moura talks about how he and his colleagues have been measuring ce…

Article tags:

15 Likes are disabled for this article.
0
Inferring the Deployment of Inbound Source Address Validation Using DNS Resolvers

Inferring the Deployment of Inbound Source Address Validation Using DNS Resolvers

Author image
Yevheniya Nosyk

6 min read

Source Address Validation (SAV) is the best current practice (BCP 38/RFC 2827) aimed at filtering packets based on source IP addresses at the network edge. In this article, we show how to identify networks that do not deploy SAV for incoming traffic.

Article tags:

0 Likes are disabled for this article.
1
xdp_s.png

Journeying into XDP Part 1: Augmenting DNS

Author image
Tom Carpay

16 min read

In this post, we at NLnet Labs look at how eXpress Data Path (XDP) can augment existing DNS software. We share our experiences of implementing Response Rate Limiting in XDP.

Article tags:

2 Likes are disabled for this article.
0
The Lockdown Effect - Implications of the COVID-19 Pandemic on Internet Traffic

The Lockdown Effect - Implications of the COVID-19 Pandemic on Internet Traffic

Author image
Oliver Gasser

10 min read

Oliver Gasser and his colleagues have been investigating the impact of COVID-19 on Internet traffic as seen from a variety of vantage points. Here's an overview of their findings.

Article tags:

0 Likes are disabled for this article.
0
RIPE NCC Internet Country Report: Central Asia

RIPE NCC Internet Country Report: Central Asia

Author image
Suzanne Taylor

3 min read

We examine the Internet landscape in five different countries in Central Asia as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

0 Likes are disabled for this article.
0
Overcoming the Limitations of UDP Options

Overcoming the Limitations of UDP Options

Author image
Raffaele Zullo

6 min read

A recent extension that aims to add support for transport options to the User Datagram Protocol (UDP) is already showing promise. Unfortunately, its deployment may be undermined by the way existing network devices process UDP length and checksum. In this post we at the Electronics Research Group,…

Article tags:

0 Likes are disabled for this article.
0
Picture 1.png

Measuring QoE by Measuring TCP Connection Establishment Delay in a Service Provider Network

Author image
Ali Norouzi

6 min read

I’ve created a traffic analyser to help network engineers detect issues related to quality of experience.

Article tags:

7 Likes are disabled for this article.
0
Distributed_RPKI.jpg

Limiting the Power of RPKI Authorities

Author image
Kris Shrishak

5 min read

In the beginning, Internet infrastructure was not originally designed with security in mind. Luckily, this mindset has changed over the years, mainly due to the growing number of attacks, and has prompted the design of security measures such as Domain Name System Security Extensions (DNSSEC) and Re…

Article tags:

0 Likes are disabled for this article.
0
DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown

DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown

Author image
Daniel Kopp

9 min read

In this article, we investigated booter-based DDoS attacks in the wild and the impact of an FBI takedown targeting fifteen booter websites in December 2018. We investigated and compared attack properties of multiple booter services by launching DDoS attacks against our own infrastructure. To unders…

Article tags:

2 Likes are disabled for this article.
0
transfermarket_fig6.png

IPv4 Transfer Markets Misuse: A First Look

Author image
Vasileios Giotsas

7 min read

The secondary IP address market has become a viable source of IPv4 address space, but it may also present opportunities to malicious networks to bypass reputation-based security mechanisms. In this article we summarise the results of our first detailed study of how transferred IPv4 prefixes are mis…

Article tags:

11 Likes are disabled for this article.
1

Showing 218 article(s)