Triggering QUIC
How client applications are triggered to connect to servers using the QUIC transport protocol.
How client applications are triggered to connect to servers using the QUIC transport protocol.
Doug Madory shares insights from his 2025 analysis of secure BGP deployment around the world, based on Kentik’s internal measurements and global routing data.
Guest Post: Studying PROXY protocol usage at Internet scale and the security impact of its misconfigurations.
Geoff Huston discusses the DNS root zone and how query load at the root could be reduced by using trusted local copies of the zone.
Guest Post: Many AS-SETs have grown so large they effectively whitelist most of the routing table, defeating their purpose. How are AS-SETs actually used for filtering, and what can be done when they get too big?
Reviewing QUIC’s design motivations, protocol innovations, and current adoption across the public Internet.
Leslie Daigle discusses AIDE and GCA’s work to analyse malicious traffic collected via honeynets.
Guest Post: Developing FastFlow — a time-series method that efficiently classifies network flows using the fewest packets needed for accurate results.
What an ordinary Thursday reveals about Internet routing from the edge.
Professor Cristel Pelsser discusses GILL, a new model for BGP data collection, and the application of Machine Learning to BGP analysis.