What can be learned from BGP hijacks targeting cryptocurrency services?
Guest Post: These attacks hold lessons for securing the BGP routing of any organization that conducts business on the Internet.
Guest Post: These attacks hold lessons for securing the BGP routing of any organization that conducts business on the Internet.
Guest Post: Examining the reasons and techniques used when an operator does not want traffic via a specific AS.
Guest Post: Examine the various techniques used to control traffic entry points.
Guest Post: How to select which neighboring AS to send traffic through.
Guest Post: The success of open-source projects like FRR is determined by their community of contributors.
Guest Post: Exploiting routing decisions made in BGP when networks cannot retrieve RPKI information from publication points.
IPv6 extension headers, BGPsec crypto, RPKI beacons, and more.
Guest Post: First of its kind study shows relationship between ASN allocations and BGP announcements.
Guest Post: Study of Japanese event network shows 77% of prefixes have alternate paths of shorter latency than best paths.
Guest Post: Study finds tagging and forwarding behaviour is prevalent among large ISPs.