A first look at the PROXY protocol and its security implications
Guest Post: Studying PROXY protocol usage at Internet scale and the security impact of its misconfigurations.
Guest Post: Studying PROXY protocol usage at Internet scale and the security impact of its misconfigurations.
Geoff Huston discusses the DNS root zone and how query load at the root could be reduced by using trusted local copies of the zone.
Guest Post: Many AS-SETs have grown so large they effectively whitelist most of the routing table, defeating their purpose. How are AS-SETs actually used for filtering, and what can be done when they get too big?
Reviewing QUIC’s design motivations, protocol innovations, and current adoption across the public Internet.
Leslie Daigle discusses AIDE and GCA’s work to analyse malicious traffic collected via honeynets.
Guest Post: Developing FastFlow — a time-series method that efficiently classifies network flows using the fewest packets needed for accurate results.
What an ordinary Thursday reveals about Internet routing from the edge.
Professor Cristel Pelsser discusses GILL, a new model for BGP data collection, and the application of Machine Learning to BGP analysis.
Guest Post: IXPs’ unique vantage points can provide local and regional level availability and performance insights that public international measurement projects cannot measure as accurately.
Guest Post: A large-scale DNS study reveals the impact of common measurement limitations on research findings.