Detecting and characterizing DDoS scrubbing from global BGP routing
Guest Post: Analysing public BGP data to characterize the real‑world behaviour of five major scrubbing services.
By Shyam Krishna Khadka on 23 Apr 2026
Guest Post: Analysing public BGP data to characterize the real‑world behaviour of five major scrubbing services.
Guest Post: Analysing public BGP data to characterize the real‑world behaviour of five major scrubbing services.
APNIC is pleased to welcome the successful applicants to its 2026 general and Policy Fellowship programs. This year’s Fellows reflect the diversity and talent of network practitioners and community contributors from across the Asia Pacific region.
Guest Post: What can we learn about QUIC deployments just by listening to unsolicited QUIC traffic? As it turns out, quite a lot.
Strengthening routing security is increasingly critical, and APNIC’s tools are helping operators protect their networks with clearer, more reliable validation and visibility.
Guest Post: An analysis of more than 80 billion updates reveals how ‘noisy’ BGP updates inflate MRT archives, bias measurements, and highlights the need for more careful interpretation of BGP data.
Marc Blanchet discusses modelling the delay of a deep space IP stack using Linux virtual network methods, and the suitability of QUIC as a transport for applications in space.
Got a compelling story or insight on Internet operations? Submit your presentation for APNIC 62 today!
Guest Post: IRR-based filtering at IXPs often breaks the link between prefixes and their legitimate AS, allowing invalid announcements to slip through. This study measures the issue across many IXPs and offers actionable fixes.
An article in The Conversation argues that governments should ensure data centre developments serve the public interest.
NIST’s updated DNS deployment guide treats DNS as a core security control, offering practical guidance on protective DNS, encryption, DNSSEC, and both authoritative and recursive operations to help operators strengthen resilience, visibility, and policy enforcement.