Banner image

Technology and Innovation

All articles

Results of the Network Operators Tools Hackathon

Results of the Network Operators Tools Hackathon

Author image
Vesna Manojlovic

7 min read

The RIPE NCC and iNOG organised a hackathon in June 2018, in Dublin. This review celebrates the achievements of the hackathon, invites you to use our results, and welcomes your contributions for future hackathons!

Article tags:

0 Likes are disabled for this article.
0
Big Data and Network Measurements at TMA 2018

Big Data and Network Measurements at TMA 2018

Author image
Massimo Candela

7 min read

The Network Traffic Measurement and Analysis Conference (TMA) took place in June in Vienna, Austria. A full week of events was scheduled - including a PhD school about Big Data on Monday and Tuesday, the TMA Experts Summit on Tuesday, and the main conference from Wednesday to Friday. Here's my summ…

Article tags:

0 Likes are disabled for this article.
0
Lightweight 4over6: One-step Further Than Dual-stack Networks

Lightweight 4over6: One-step Further Than Dual-stack Networks

Author image
Diego Pino Garcia

5 min read

Dual-stack has been one of the most popular transition technologies used to deploy IPv6. This is largely because it allows for routing of IPv4 and IPv6 traffic in parallel.

Article tags:

0 Likes are disabled for this article.
1
Real-Time Monitoring and Troubleshooting of Web Browsing Sessions

Real-Time Monitoring and Troubleshooting of Web Browsing Sessions

Author image
Antoine Saverimoutou

7 min read

This post introduces the MORIS (Measuring and Observing Representative Information of webSites) probe, a tool for measuring automated web browsing sessions, which allows to estimate end-users’ QoE (Quality of Experience) in various situations and to perform troubleshooting when it is degraded.

Article tags:

0 Likes are disabled for this article.
1
Honeypot-based Monitoring of Amplification DDoS Attacks

Honeypot-based Monitoring of Amplification DDoS Attacks

Author image
Johannes Krupp

5 min read

Amplification DDoS attacks are one of the most prevalent forms of denial-of-service attacks. The SISSDEN project (sissden.eu) operates a network of honeypots designed to detect these attacks, observing 10,000 per day.

Article tags:

0 Likes are disabled for this article.
5
Measuring the Adoption of RPKI Route Origin Validation

Measuring the Adoption of RPKI Route Origin Validation

Author image
Andreas Reuter

10 min read

The number of Resource Certificates and ROAs is steadily growing, especially in the RIPE NCC service region. However, it remains unclear how widely BGP speakers on the Internet are actually using route origin validation (ROV) to drop or de-preference invalid announcements.

Article tags:

4 Likes are disabled for this article.
0
Opportunities and Challenges of Ad-based Measurements from the Edge of the Network

Opportunities and Challenges of Ad-based Measurements from the Edge of the Network

Author image
Patricia Callejo

7 min read

Read how we're using AdTag, a new methodology to perform network measurements that leverage the nature of ad networks.

Article tags:

0 Likes are disabled for this article.
0
Sketching Connectivity Between Users

Sketching Connectivity Between Users

Author image
Emile Aben

5 min read

We're looking at user-to-user connections, based on RIPE Atlas measurements and ISP's end-user market share estimates provided by the APNIC.

Article tags:

0 Likes are disabled for this article.
0
Dissecting DNS Defenses During  DDoS Attacks

Dissecting DNS Defenses During DDoS Attacks

Author image
Giovane Moura

3 min read

New technical report evaluates DNS defenses in the wild against DDoS attacks and shows some interesting results.

Article tags:

0 Likes are disabled for this article.
0
example-arch.png

Could Blockchain Help in Interdomain Routing Security?

Author image
Jordi Paillissé Vilanova

9 min read

Blockchain technology is attracting a lot of attention among the security community since it provides a way to exchange information among a set of distrusting entities without the use of digital certificates and centralised control. Blockchain provides means for distrusting parties to reach consens…

Article tags:

0 Likes are disabled for this article.
0

Showing 229 article(s)