A new DDoS attack vector: TCP Middlebox Reflection
Guest Post: Learn how TCP Middlebox Reflection attacks work and what are the best current practices for defending against it.
Guest Post: Learn how TCP Middlebox Reflection attacks work and what are the best current practices for defending against it.
Guest Post: How can we solve the diminishing feedback problem for Internet congestion control?
Guest Post: Almost non-existent until October 2021, MPTCP deployment now spans more than 80 economies.
How extensively is QUIC being used on today’s Internet?
Guest Post: TCPLS takes advantage of decades of performance optimizations made to TCP and has also a few other tricks up its sleeves.
Let’s talk about the ‘Unfortunate History of Transient Numeric Identifiers’.
Guest Post: What are the fundamental limits of end-to-end congestion control in 5G networks?
Guest Post: CDN shares how it detects cases where BBR provides improved performance enabling them to provide more custom congestion control.
Geoff Huston on currently active IETF routing security, IPv6, and transport discussions.
Guest Post: There are several ways attackers can force TCP to fragment for inclusion in IP fragmentation attacks.