The use of UTRS in combating DDoS attacks
Guest Post: New study shows that UTRS can be a useful tool in mitigating DDoS attacks, but it is not widely used.
Guest Post: New study shows that UTRS can be a useful tool in mitigating DDoS attacks, but it is not widely used.
Guest Post: Exploring the intricacies of intra and inter-GPU server traffic patterns, network topologies for large clusters, the latest methods for handling network congestion, and more.
Guest Post: Researchers used real-time data to annotate network connections with carbon intensity, allowing digital infrastructure providers to relocate their compute workloads to more environmentally sustainable regions.
Guest Post: We’re running out of /24. Is now is the time to change this norm?
Guest Post: A trick to help reduce bandwidth and CPU cycles for both RPKI Publication Point servers and RPKI validators when switching between RRDP and RSYNC transports.
Guest Post: Making the case for sensible defaults.
Guest Post: Measuring DNS abuse is difficult. What are the obstacles?
Guest Post: Powerful human and machine-readable network fingerprints for multiple protocols that improve threat-hunting and analysis.
Guest Post: BGP false alarm — what happened, and what can we learn from it?
Guest Post: Quantifying the problem of ‘echoing resolvers’ in the wild.