Technology and Innovation

All articles

Detection of Peering Infrastructure Outages Based on BGP Communities

Detection of Peering Infrastructure Outages Based on BGP Communities

Vasileios Giotsas

8 min read

Networks rely increasingly on Internet Exchange Points (IXPs) and carrier-neutral interconnection facilities that enable dense localised peering connectivity to handle the massive traffic exchange between clients and servers.

Article tags:

0 You have liked this article 0 times.
0
ARTEMIS: Neutralising BGP Hijacking Within a Minute

ARTEMIS: Neutralising BGP Hijacking Within a Minute

Vasileios Kotronis

9 min read

BGP prefix hijacking is a persistent threat against Internet organisations, attributed to a lack of authorisation and authentication mechanisms in the inter-domain routing system. ARTEMIS (Automatic and Real-Time dEtection and MItigation System) is a defence system against BGP prefix hijacking, whi…

Article tags:

0 You have liked this article 0 times.
11
Join the Quantum Internet Hackathon 2018

Join the Quantum Internet Hackathon 2018

Vesna Manojlovic

11 min read

The eighth RIPE NCC hackathon takes on the Quantum Internet! The hackathon will be held during the weekend before RIPE 77 in Amsterdam, and is co-organised by QuTech and TU Delft, along with the RIPE NCC. We're bringing together network operators, quantum networking researchers, students, hackers, …

Article tags:

8 You have liked this article 0 times.
0
Results of the Network Operators Tools Hackathon

Results of the Network Operators Tools Hackathon

Vesna Manojlovic

7 min read

The RIPE NCC and iNOG organised a hackathon in June 2018, in Dublin. This review celebrates the achievements of the hackathon, invites you to use our results, and welcomes your contributions for future hackathons!

Article tags:

0 You have liked this article 0 times.
0
Big Data and Network Measurements at TMA 2018

Big Data and Network Measurements at TMA 2018

Massimo Candela

7 min read

The Network Traffic Measurement and Analysis Conference (TMA) took place in June in Vienna, Austria. A full week of events was scheduled - including a PhD school about Big Data on Monday and Tuesday, the TMA Experts Summit on Tuesday, and the main conference from Wednesday to Friday. Here's my summ…

Article tags:

0 You have liked this article 0 times.
0
Lightweight 4over6: One-step Further Than Dual-stack Networks

Lightweight 4over6: One-step Further Than Dual-stack Networks

Diego Pino Garcia

5 min read

Dual-stack has been one of the most popular transition technologies used to deploy IPv6. This is largely because it allows for routing of IPv4 and IPv6 traffic in parallel.

Article tags:

0 You have liked this article 0 times.
1
Real-Time Monitoring and Troubleshooting of Web Browsing Sessions

Real-Time Monitoring and Troubleshooting of Web Browsing Sessions

Antoine Saverimoutou

7 min read

This post introduces the MORIS (Measuring and Observing Representative Information of webSites) probe, a tool for measuring automated web browsing sessions, which allows to estimate end-users’ QoE (Quality of Experience) in various situations and to perform troubleshooting when it is degraded.

Article tags:

0 You have liked this article 0 times.
1
Honeypot-based Monitoring of Amplification DDoS Attacks

Honeypot-based Monitoring of Amplification DDoS Attacks

Johannes Krupp

5 min read

Amplification DDoS attacks are one of the most prevalent forms of denial-of-service attacks. The SISSDEN project (sissden.eu) operates a network of honeypots designed to detect these attacks, observing 10,000 per day.

Article tags:

0 You have liked this article 0 times.
5
Measuring the Adoption of RPKI Route Origin Validation

Measuring the Adoption of RPKI Route Origin Validation

Andreas Reuter

10 min read

The number of Resource Certificates and ROAs is steadily growing, especially in the RIPE NCC service region. However, it remains unclear how widely BGP speakers on the Internet are actually using route origin validation (ROV) to drop or de-preference invalid announcements.

Article tags:

4 You have liked this article 0 times.
0
Opportunities and Challenges of Ad-based Measurements from the Edge of the Network

Opportunities and Challenges of Ad-based Measurements from the Edge of the Network

Patricia Callejo

7 min read

Read how we're using AdTag, a new methodology to perform network measurements that leverage the nature of ad networks.

Article tags:

0 You have liked this article 0 times.
0

Showing 202 article(s)