You are here: Home > Publications > RIPE Labs > Security

Security

Adam Castle — 24 Feb 2014
A Software-based Approach to Identify Heavy Hitters in DNS Traffic
A Software-based Approach to Identify Heavy Hitters in DNS Traffic
Santiago Ruano Rincón — 25 Oct 2017

This article presents a software-based prototype able to estimate the most queried domain names in a stream of DNS traffic at 12Mpps (wire-rate 10GbE). The goal is to identify domains involved in random qname attacks. This prototype is a proof-of-concept of our research on software and commodity-hardware approaches to analyse high-speed network streams.… Read more

IoT Turning Evil
IoT Turning Evil
Ivana Tomic — 06 Sep 2017

Internet of Things (IoT) emerged as a complex cyber-physical system that allows smart devices to sense the environment and modify it accordingly to enhance the way we work and live. The existence of such a large network of interconnected entities poses major security and privacy issues that prevent its wide adoption. This article discusses how to establish operating system level support for a wireless sensor network that requires run-time security in a way that doesn't impair the performance and behaviour of the network.… Read more

Tags: iot security
A Virtual Canary-in-the-Coalmine for the DNSSEC Root Key Rollover
A Virtual Canary-in-the-Coalmine for the DNSSEC Root Key Rollover
Roland van Rijswijk — 27 Jun 2017

As many in the tech community will know, the DNS is a core part of the Internet’s infrastructure. It provides the vital function of mapping human-readable names (such as www.surf.nl) to machine readable information (such as 2001:610:188:410:145:100:190:243). When the DNS was designed in the 1980s, security was not a prime concern. … Read more

Routing Detours: Can We Avoid Nation-State Surveillance?
Routing Detours: Can We Avoid Nation-State Surveillance?
Annie Edmundson — 09 Nov 2016

An increasing number of countries are passing laws that facilitate the mass surveillance of their citizens. In response, governments and citizens are increasingly paying attention to the countries that their Internet traffic traverses. In some cases, countries are taking extreme steps, such as building new IXPs and encouraging local interconnection to keep local traffic local. We find that although many of these efforts are extensive, they are often futile, due to the inherent lack of hosting and route diversity for many popular sites. We investigate how the use of overlay network relays and the DNS open resolver infrastructure can prevent traffic from traversing certain jurisdictions.… Read more

Speculating on DNS DDoS
Speculating on DNS DDoS
Geoff Huston — 28 Oct 2016

The recent attacks on the DNS infrastructure operated by Dyn have generated a lot of comment in recent days. Indeed, it’s not often that the DNS itself has been prominent in the mainstream of news commentary and, in some ways, this DNS DDoS prominence is for all the wrong reasons! I’d like to speculate a bit on what this attack means for the DNS and what we could do to mitigate the recurrence of such attacks.… Read more

Tags: security dns

Document Actions