You are here: Home > Publications > RIPE Labs > Security

Security

Adam Castle — 24 Feb 2014
ECDSA and DNSSEC
ECDSA and DNSSEC
Geoff Huston — 11 Nov 2014

Yes, that's a cryptic topic, even for an article that addresses matters of the use of cryptographic algorithms, so congratulations for getting even this far! This is a report of an experiment conducted in September and October 2014 by the authors to measure the extent to which deployed DNSSEC-validating resolvers fully support the use of the Elliptic Curve Digital Signature Algorithm (ECDSA) with curve P-256.… Read more

Privacy and Security - Five Objectives
Geoff Huston — 06 Nov 2014

It has been a very busy period in the domain of computer security. With "shellshock", "heartbleed" and NTP monlink adding to the background of open DNS resolvers, port 445 viral nasties, SYN attacks and other forms of vulnerability exploits, it's getting very hard to see the forest for the trees. We are spending large amounts of resources in reacting to various vulnerabilities and attempting to mitigate individual network attacks, but are we making overall progress? What activities would constitute "progress" anyway?… Read more

Tags: security
Secure Internet Routing with RPKI
Secure Internet Routing with RPKI
Remy de Boer — 30 Oct 2014

Last week we improved the security of our routing infrastructure by implementing RPKI (Resource Public Key Infrastructure), a technology that can be used to secure the Internet routing infrastructure. RPKI was the topic of my Master's thesis and in this article I am trying to convince you to use this important technology for a more secure Internet.… Read more

SSHCure: SSH Intrusion Detection Using NetFlow and IPFIX
SSHCure: SSH Intrusion Detection Using NetFlow and IPFIX
Luuk Hendriks — 05 Jun 2014

SSHCure is an Intrusion Detection System for SSH, developed at the University of Twente. It allows analysing large amounts of flow data and is the first IDS capable of identifying actual compromises. Being deployed in various networks, ranging from small Web-hosting companies to nation-wide backbone networks, SSHCure has proven to be a stable system in high-speed networks.… Read more

Tags: security tools
Survey on Mitigation and Response of Network Attacks
Survey on Mitigation and Response of Network Attacks
Jessica Steinberger — 21 May 2014

Network-based attacks pose a strong threat to the Internet landscape. In my PhD I am investigating different approaches on attack mitigation and response. Yet, a clear understanding of how mitigation and response is performed in commercial networks is missing. Hence, this survey aims at gaining insight in real-world processes, structures and capabilities of IT companies and the computer networks they run.… Read more

Tags: security
NTP Reflections
Mirjam Kühne — 22 Jan 2014

After the recent amplification attacks involving NTP servers, John Kristoff, a researcher with Team Cymru, kindly agreed to publish an analysis of the history and timeline leading up to the attacks. Please find his contribution below.… Read more

Tags: security
A Question of DNS Protocols
A Question of DNS Protocols
Geoff Huston — 28 Aug 2013

In this article we are looking at possible ways to prevent denial of service attacks. One solution could be to use TCP instead of UDP for large DNS responses. We conducted an experiment to find out what the resolution failure rate would be.… Read more

Tags: security dns
Here’s looking at you …
Here’s looking at you …
Geoff Huston — 04 Jul 2013

Much has been said in recent weeks about various forms of cyber spying. The United States has accused the Chinese of cyber espionage and stealing industrial secrets. A former contractor to the United States’ NSA, Edward Snowden, has accused various US intelligence agencies of systematic examination of activity on various popular social network services, through a program called “PRISM”. These days cloud services may be all the vogue, but there is also an emerging understanding that once your data heads into one of these clouds, then it’s no longer necessarily entirely your data; it may have become somebody else’s data too.… Read more

Tags: ases security
IPv6 Security - An Overview
IPv6 Security - An Overview
Johannes Weber — 18 Jun 2013

The advent of IPv6 changes not only the network components, but also the security field shifts. We see new types of attacks or at least variations of the attacks we know from IPv4. This article provides an overview of the IPv6 security vulnerabilities that arise with the launch of IPv6.… Read more

Survey on Network Attack Detection and Mitigation
Sebastian Abt — 29 Nov 2012

The Biometrics and Internet Security Research Group at the University Darmstadt is conducting a survey on network attack detection and mitigation in order to gain a deeper insight in processes, procedures and settings typically found in ISP networks.… Read more

Tags: security
Re-Counting DNSSEC
Re-Counting DNSSEC
Geoff Huston — 23 Oct 2012

This is a followup article to "Counting DNSSEC" that reflects some further examination of the collected data. This time I'd like to describe some additional thoughts about the experiment, and some revised results in our efforts to count just how much DNSSEC is being used out there.… Read more

Document Actions