Understanding stealthy BGP hijacking risk in the ROV era
Guest Post: Analysing the mechanics of stealthy BGP hijacking with a topology-aware risk assessment and long-term monitoring.
Guest Post: Analysing the mechanics of stealthy BGP hijacking with a topology-aware risk assessment and long-term monitoring.
Geoff Huston discusses the problem of Geolocation and Starlink, with mis-attribution of traffic to economies an increasing concern.
Guest Post: Flow control is a fundamental concept in the design of high-performance networks. In part one of this three-part deep dive series, we look at the principles of flow control.
Guest Post: How ccTLDs handle global traffic and DDoS risks.
Free-air laser communications could overcome path problems confronting network infrastructure and help address the ‘last mile’ delivery problem.
Guest Post: Automatically selecting the optimal anycast locations for fast .nl response times worldwide.
Guest Post: The Happy Eyeballs algorithm supports IPv6 deployment by giving clients the ability to prefer IPv6, quickly fall back to IPv4 when necessary, and protect the user experience in either case. But how widely is it implemented?
Guest Post: Cross-disciplinary efforts lead to sharper decisions and stronger outcomes during disruptions.
Guest Post: We stand at the brink of another revolution shaping itself in the form of the quantum Internet. This post shares highlights from a paper surveying the fundamental concepts of the quantum Internet.
If you have an interesting presentation to share on Internet operations, submit a paper for APRICOT 2026.