Competitions
Article lead image

The RIPE Labs Article Competition - RIPE 88

Competition closed

Banner image

The RIPE Labs article RIPE 88 competition closed on 5 April 2024.

The winner was Elizabeth Boswell for her article entitled Measuring NAT64 Usage in the Wild. Elizabeth will join us at RIPE 89! The runner up was Moritz Müller for his article Internet Sanctions on Russian Media: Diverging Actions and Mixed Effects.

Everything you need to know about the competition, including a more specific list of what we look from the best RIPE Labs articles, is available on the RIPE Labs Competition Rules page.


iStock-1333374149

Automated Assurance on a Path to Becoming Practical

Author image
Kathleen Moriarty

7 min read

Cloud native architecture is a game changer for security at scale. Whether used on-premises or in the cloud, capabilities to ease the management of IT assets are improving. And while there’s a long way to go in simplifying interfaces and reducing skill-set barriers – this too will come in time.

Article tags:

82 You have liked this article 0 times.
0
iStock-1549941880

Cloudy with a Chance of Cyberattacks - Dangling Resource Abuse on Cloud Platforms

Author image
Haya Schulmann

7 min read

Dangling DNS records are a target for bad actors, but distinguishing malicious from legitimate changes in resources isn't always easy. The team from ATHENE report on the main findings of their research into the abuse of dangling resources in the cloud.

Article tags:

85 You have liked this article 0 times.
0
eu_russia

Internet Sanctions on Russian Media: Diverging Actions and Mixed Effects

Author image
Moritz Müller

10 min read

EU sanctions on Russian controlled content require ISPs in member states to block access to websites. But our research reveals that their implementation varies widely, both between and within individual EU member states, raising important questions about their effectiveness.

Article tags:

92 You have liked this article 0 times.
0
time_pool

NTP Pool - The Internet Timekeeper

Author image
Giovane Moura

12 min read

The NTP Pool is a network of volunteer-run servers providing time synchronisation services to millions of computers over the Internet using the Network Time Protocol (NTP). But how does it map clients to NTP servers? And why are some clients more equal than others? The team at SIDN Labs investigate…

Article tags:

93 You have liked this article 0 times.
2
iStock-643103188

Measuring NAT64 Usage in the Wild

Author image
Elizabeth Boswell

7 min read

With IPv4 address space depleted, it's increasingly important to transition to IPv6. IPv6 transition mechanisms, which allow the two protocols to interoperate, can help. One such mechanism is NAT64. We use RIPE Atlas to measure the usage of NAT64, and compare NAT64 paths to native IPv4 paths.

Article tags:

72 You have liked this article 0 times.
0
iStock-866994328

Crashing the Party – Vulnerabilities in RPKI Relying Party Software

Author image
Niklas Vogel

10 min read

RPKI adoption is on the rise. And that's a good thing. But as the number of networks deploying RPKI grows, so does the potential impact of vulnerabilities in its implementation. CURE is a novel fuzzing tool developed by ATHENE researchers to test vulnerabilities in RPKI Replying Party software.

Article tags:

94 You have liked this article 0 times.
0
keytrap

KeyTrap Algorithmic Complexity Attacks Exploit Fundamental Design Flaw in DNSSEC

Author image
Haya Schulmann

10 min read

KeyTrap - described by some as 'the worst attack on DNS ever discovered' - is capable of exhausting CPU resources and stalling widely used DNS implementations and public DNS providers, like Google Public DNS and Cloudflare. The research team from ATHENE explain how they discovered the attack.

Article tags:

90 You have liked this article 0 times.
1