Security

Adam Castle — Feb 24, 2014 05:02 PM
0
comments

Quality of ROAs in RPKI Repositories

Daniele Iamartino — Mar 10, 2015 03:25 PM

Quality of ROAs in RPKI Repositories RPKI.me is a website collecting statistics and information about objects in the RPKI repositories. The web page shows some of the most problematic ROAs present and suggests possible fixes.

Tags: security, tools, routing, certification » Read more

0
comments

Introducing ENISA: Securing European Networks

Rossella Mattioli — Mar 03, 2015 01:45 PM

ENISA, the European Union Agency for Network & Information Security, is an independent body of expertise, set up by the European Union, to secure Europe’s information society. It was founded in 2004 to facilitate the exchange of information between EU institutions, the public and the private sector. The goal is to work together with operational communities to identify pragmatic solutions to current security issues. In this first article, we have asked ENISA to introduce themselves and highlight some of their activities that could be of interest to the RIPE community.

Tags: policy, security » Read more

0
comments

Stopping Support for Internet Explorer 8 on Windows XP in RIPE Atlas and RIPEstat

Robert Kisteleki — Feb 24, 2015 10:55 AM

Microsoft ended support for Windows XP as of April 2014. We're about to change RIPE Atlas and RIPEstat to stop support for Internet Explorer 8 running on these systems.

Tags: atlas, security, ripestat » Read more

2
comments

Survey on Internet Routing Security

Sebastian Abt — Dec 17, 2014 02:20 PM

Survey on Internet Routing Security This is a call for participation in a survey on Internet Routing Security. The survey runs until 9 January 2015 and will only take a few minutes.

Tags: security, routing, certification » Read more

0
comments

Call for Input: RPKI Browser

Matthias Wählisch — Nov 27, 2014 05:00 PM

Call for Input: RPKI Browser The RPKI Browser is a graphical user interface to the objects of the distributed RPKI repository. The development is at very early stage. In this article, we ask for external input in terms of use cases, features etc.

Tags: security, tools, routing, certification » Read more

1
comment

Who's Watching

Geoff Huston — Nov 13, 2014 10:45 AM

Who's Watching Much has been said over the pasts year or so about various forms of cyber spying. The United States has accused the Chinese of cyber espionage and stealing industrial secrets. A former contractor to the United States' NSA, Edward Snowden, has accused various US intelligence agencies of systematic examination of activity on various popular social network services, through a program called “PRISM”. These days cloud services may be all the vogue, but there is also an emerging understanding that once your data heads off into one of these clouds, then it’s no longer necessarily entirely your data; it may have become somebody else's data too.

Tags: ases, security » Read more

0
comments

ECDSA and DNSSEC

Geoff Huston — Nov 11, 2014 09:35 AM

ECDSA and DNSSEC Yes, that's a cryptic topic, even for an article that addresses matters of the use of cryptographic algorithms, so congratulations for getting even this far! This is a report of an experiment conducted in September and October 2014 by the authors to measure the extent to which deployed DNSSEC-validating resolvers fully support the use of the Elliptic Curve Digital Signature Algorithm (ECDSA) with curve P-256.

Tags: security, dnssec » Read more

1
comment

Privacy and Security - Five Objectives

Geoff Huston — Nov 06, 2014 10:50 AM

It has been a very busy period in the domain of computer security. With "shellshock", "heartbleed" and NTP monlink adding to the background of open DNS resolvers, port 445 viral nasties, SYN attacks and other forms of vulnerability exploits, it's getting very hard to see the forest for the trees. We are spending large amounts of resources in reacting to various vulnerabilities and attempting to mitigate individual network attacks, but are we making overall progress? What activities would constitute "progress" anyway?

Tags: security » Read more

0
comments

Secure Internet Routing with RPKI

Remy de Boer — Oct 30, 2014 04:15 PM

Secure Internet Routing with RPKI Last week we improved the security of our routing infrastructure by implementing RPKI (Resource Public Key Infrastructure), a technology that can be used to secure the Internet routing infrastructure. RPKI was the topic of my Master's thesis and in this article I am trying to convince you to use this important technology for a more secure Internet.

Tags: security, routing » Read more

0
comments

SSHCure: SSH Intrusion Detection Using NetFlow and IPFIX

Luuk Hendriks — Jun 05, 2014 11:30 AM

SSHCure: SSH Intrusion Detection Using NetFlow and IPFIX SSHCure is an Intrusion Detection System for SSH, developed at the University of Twente. It allows analysing large amounts of flow data and is the first IDS capable of identifying actual compromises. Being deployed in various networks, ranging from small Web-hosting companies to nation-wide backbone networks, SSHCure has proven to be a stable system in high-speed networks.

Tags: security, tools » Read more

2
comments

Better Crypto - Applied Cryptography Hardening

Aaron Kaplan — May 22, 2014 11:35 AM

Better Crypto - Applied Cryptography Hardening This project aims at creating a simple, copy & paste-able HOWTO for secure crypto settings of the most common services (webservers, mail, ssh, etc.). It was presented at the recent RIPE 68 Meeting in Warsaw. For those of you who couldn't attend the meeting, here is summary of the talk.

Tags: security, tools » Read more

0
comments

Survey on Mitigation and Response of Network Attacks

Jessica Steinberger — May 21, 2014 11:40 AM

Survey on Mitigation and Response of Network Attacks Network-based attacks pose a strong threat to the Internet landscape. In my PhD I am investigating different approaches on attack mitigation and response. Yet, a clear understanding of how mitigation and response is performed in commercial networks is missing. Hence, this survey aims at gaining insight in real-world processes, structures and capabilities of IT companies and the computer networks they run.

Tags: ddos, security » Read more

0
comments

Report on IPv6 Security Test Methodology

Geert Jan de Groot — Apr 09, 2014 10:00 AM

The Dutch Institute for Applied Scientific Research (TNO) and a number of Dutch security companies have recently published a report on IPv6 security test methodologies.

Tags: security, ipv6 » Read more

3
comments

NTP for Evil

Geoff Huston — Apr 01, 2014 09:20 AM

NTP for Evil In this article Geoff Huston describes attacks that involve the Network Time Protocol (NTP) and what can be done to defend against them.

Tags: security » Read more

0
comments

Network Anomaly Detection – Survey Evaluation

Jan Rejchrt — Mar 03, 2014 12:05 PM

Network Anomaly Detection – Survey Evaluation We wanted to find out what network security experts think about network anomalies. We created a short web survey in order to map opinions of network professionals. In this article we describe the results.

Tags: security, statistics, tools » Read more

0
comments

RPKI Routing Policy Decision-Making - a SURFnet Perspective

Jac Kloots — Jan 28, 2014 10:30 AM

RPKI Routing Policy Decision-Making - a SURFnet Perspective Before we decide to implement a stricter operational practices, we needed to find out how many routes with invalid origins are actually being used and how much traffic is exchanged using those routes. Please find the results below.

Tags: security, routing, certification » Read more

0
comments

NTP Reflections

Mirjam Kühne — Jan 22, 2014 10:10 AM

After the recent amplification attacks involving NTP servers, John Kristoff, a researcher with Team Cymru, kindly agreed to publish an analysis of the history and timeline leading up to the attacks. Please find his contribution below.

Tags: security » Read more

0
comments

Network Anomaly Detection – Do We Know What to Detect?

Jan Rejchrt — Nov 20, 2013 10:55 AM

Network Anomaly Detection – Do We Know What to Detect? Network anomalies are not understood the same way among the network experts. However, establishing a unified view is important for the development of anomaly detection tools. The survey described below will help to develop such a unified view.

Tags: security, statistics, tools » Read more

0
comments

How “National” is the Dutch Critical IP Infrastructure?

Benno Overeinder — Oct 23, 2013 10:30 AM

How “National” is the Dutch Critical IP Infrastructure? After the publication of the Critical Infrastructure Protection report more than ten years ago, we asked ourselves how critical infrastructure companies are interconnected, how resilient these connections are, and to which extent they are dependent on foreign entities.

Tags: ases, security, statistics » Read more

1
comment

A Question of DNS Protocols

Geoff Huston — Aug 28, 2013 09:20 AM

A Question of DNS Protocols In this article we are looking at possible ways to prevent denial of service attacks. One solution could be to use TCP instead of UDP for large DNS responses. We conducted an experiment to find out what the resolution failure rate would be.

Tags: security, dns » Read more

Document Actions