Shutting down the BGP Hijack Factory
Guest Post: Read how one email to a NOG mailing list led to a concerted effort to kick a notorious BGP hijacker off the Internet.
Guest Post: Read how one email to a NOG mailing list led to a concerted effort to kick a notorious BGP hijacker off the Internet.
Guest Post: Learn how SADR can be simply configured to assist with multihoming.
Guest Post: Study seeks to determine the scale of BGP hijacking threats by measuring the number of ingress filters bypassed by routing anomalies.
The recent hackathon at iNOG provided a great environment to develop a prototype AS interdependence visualization (and eat stroopwaffles).
The designers of RTBADT (Real Time BGP Anomaly Detection Tool) used a new technique to detect BGP anomalies in a matter of seconds.
What’s new, what’s old and what’s been forgotten in the past ten years of the Internet’s evolution?
A recent survey set out to discover exactly what network operators are doing about prefix hijacks by questioning 75 network operators from across the globe.
Guest Post: Kepler is a new method to automate the localization and monitoring of outages at IXPs and interconnection facilities by using publicly available data.
Guest Post: The RIPE Labs team takes a look at a recent outage at one of the largest IXPs in Europe to see how well the Internet was able to route around it.
Guest post: BGP gets a bad rap from some but maybe the problem is with people not the protocol.