Guest Post: Researchers have been able to identify underlying HTTP features by observing HTTPS connections.
The APNIC Community Honeynet Project seeks to help network engineers and network security personnel understand their online adversaries.
Guest Post: Researchers are using DNS backscatter to detect large-scale scans of IPv6 address space.
Learn how to get started using RPKI for Route Origin Validation by creating a Route Origin Authorization in MyAPNIC.
An update on trends in resource delegation in APNIC’s South East Asia sub-region.
Guest Post: NLNet Labs’ new tool, Ziggy, enables the validation of historical RPKI data.
Guest Post: Emir Beganović investigates commercial CDN performance using RIPE Atlas.
While encryption may help protect user privacy, for the measurement community it creates significant challenges.
Guest Post: Researchers examine whether an adversary can deduce websites visited using a set of IP addresses originating from a user’s device.
Learn how to create an IPv6 address plan for a service provider network.