Detecting and characterizing DDoS scrubbing from global BGP routing
Guest Post: Analysing public BGP data to characterize the real‑world behaviour of five major scrubbing services.
Guest Post: Analysing public BGP data to characterize the real‑world behaviour of five major scrubbing services.
Guest Post: Routing loops cause packets to circulate between routers. This can congest links, enable DDoS attacks, and ultimately reduce the stability and reliability of the Internet. The good news is that IPv6 routing loops are easy to prevent.
Guest Post: Research shows the threat vector introduced by transparent DNS forwarders that enable access to shielded recursive resolvers, and scale better in terms of potential attack volume.
Guest Post: A first global look at how many networks use BGP-based DDoS scrubbing — revealing who’s protected, how adoption has grown, and what it means for Internet resilience.
Guest Post: How DDoS attacks have evolved over the last decade, and how the FastNetMon Community project has grown in response.
Guest Post: How honeypot data can reveal network risks through header-only analysis of TCP SYN segments.
Guest Post: An industry-academic analysis on trends in direct-path and reflection-amplification attacks to encourage greater common understanding of the DDoS landscape.
Here are APNIC Blog’s top three posts related to security for 2024.
‘How to’ posts are a great way to learn how to use a new tool, troubleshoot problems, or perform advanced tasks. Here are three of 2024’s best.
Guest Post: Fresh insights into the growing threat of high packet rate attacks.