Whac-A-Mole: Six years of DNS spoofing
Guest post: Where does DNS spoofing occur? How often? Is it increasing? Researchers examined six years of data to find out.
Guest post: Where does DNS spoofing occur? How often? Is it increasing? Researchers examined six years of data to find out.
Guest Post: Mongolia is the second economy in the world to achieve 100% Route Origin Validation (ROV) coverage.
Guest post: There is a tradeoff between achievable throughput and coverage of wireless signals — using multiple channels can deliver better results.
Guest Post: New tool KADABRA can help monitor Internet resources growth, check for incidents, and analyze RPKI data for Indonesia.
Guest Post: Most WiFi devices are designed to acknowledge all packets received — this poses security risks.
Guest Post: How do cloud networks affect the services that RIRs provide?
Guest Post: A common assumption is that popular resources tend to be hosted locally, and submarine cables are for backend traffic. Is this accurate?
A recent study examines new metrics that could passively track traffic to ICANN managed root servers.
Guest post: A new tool that uses DNS cache snooping on public DNS resolvers to measure the prevalence of rare applications and domains on the Internet.
Guest Post: Running multiple heterogeneous network monitoring queries at line rate is challenging, but it can be achieved with ‘coupon collectors’.