Banner image

Technology and Innovation

All articles

Detection of Peering Infrastructure Outages Based on BGP Communities

Detection of Peering Infrastructure Outages Based on BGP Communities

Author image
Vasileios Giotsas

8 min read

Networks rely increasingly on Internet Exchange Points (IXPs) and carrier-neutral interconnection facilities that enable dense localised peering connectivity to handle the massive traffic exchange between clients and servers.

Article tags:

0 Likes are disabled for this article.
0
ARTEMIS: Neutralising BGP Hijacking Within a Minute

ARTEMIS: Neutralising BGP Hijacking Within a Minute

Author image
Vasileios Kotronis

9 min read

BGP prefix hijacking is a persistent threat against Internet organisations, attributed to a lack of authorisation and authentication mechanisms in the inter-domain routing system. ARTEMIS (Automatic and Real-Time dEtection and MItigation System) is a defence system against BGP prefix hijacking, whi…

Article tags:

0 Likes are disabled for this article.
11
Join the Quantum Internet Hackathon 2018

Join the Quantum Internet Hackathon 2018

Author image
Vesna Manojlovic

11 min read

The eighth RIPE NCC hackathon takes on the Quantum Internet! The hackathon will be held during the weekend before RIPE 77 in Amsterdam, and is co-organised by QuTech and TU Delft, along with the RIPE NCC. We're bringing together network operators, quantum networking researchers, students, hackers, …

Article tags:

8 Likes are disabled for this article.
0
Results of the Network Operators Tools Hackathon

Results of the Network Operators Tools Hackathon

Author image
Vesna Manojlovic

7 min read

The RIPE NCC and iNOG organised a hackathon in June 2018, in Dublin. This review celebrates the achievements of the hackathon, invites you to use our results, and welcomes your contributions for future hackathons!

Article tags:

0 Likes are disabled for this article.
0
Big Data and Network Measurements at TMA 2018

Big Data and Network Measurements at TMA 2018

Author image
Massimo Candela

7 min read

The Network Traffic Measurement and Analysis Conference (TMA) took place in June in Vienna, Austria. A full week of events was scheduled - including a PhD school about Big Data on Monday and Tuesday, the TMA Experts Summit on Tuesday, and the main conference from Wednesday to Friday. Here's my summ…

Article tags:

0 Likes are disabled for this article.
0
Lightweight 4over6: One-step Further Than Dual-stack Networks

Lightweight 4over6: One-step Further Than Dual-stack Networks

Author image
Diego Pino Garcia

5 min read

Dual-stack has been one of the most popular transition technologies used to deploy IPv6. This is largely because it allows for routing of IPv4 and IPv6 traffic in parallel.

Article tags:

0 Likes are disabled for this article.
1
Real-Time Monitoring and Troubleshooting of Web Browsing Sessions

Real-Time Monitoring and Troubleshooting of Web Browsing Sessions

Author image
Antoine Saverimoutou

7 min read

This post introduces the MORIS (Measuring and Observing Representative Information of webSites) probe, a tool for measuring automated web browsing sessions, which allows to estimate end-users’ QoE (Quality of Experience) in various situations and to perform troubleshooting when it is degraded.

Article tags:

0 Likes are disabled for this article.
1
Honeypot-based Monitoring of Amplification DDoS Attacks

Honeypot-based Monitoring of Amplification DDoS Attacks

Author image
Johannes Krupp

5 min read

Amplification DDoS attacks are one of the most prevalent forms of denial-of-service attacks. The SISSDEN project (sissden.eu) operates a network of honeypots designed to detect these attacks, observing 10,000 per day.

Article tags:

0 Likes are disabled for this article.
5
Measuring the Adoption of RPKI Route Origin Validation

Measuring the Adoption of RPKI Route Origin Validation

Author image
Andreas Reuter

10 min read

The number of Resource Certificates and ROAs is steadily growing, especially in the RIPE NCC service region. However, it remains unclear how widely BGP speakers on the Internet are actually using route origin validation (ROV) to drop or de-preference invalid announcements.

Article tags:

4 Likes are disabled for this article.
0
Opportunities and Challenges of Ad-based Measurements from the Edge of the Network

Opportunities and Challenges of Ad-based Measurements from the Edge of the Network

Author image
Patricia Callejo

7 min read

Read how we're using AdTag, a new methodology to perform network measurements that leverage the nature of ad networks.

Article tags:

0 Likes are disabled for this article.
0

Showing 222 article(s)