[Podcast] Kentik’s view of secure BGP in 2025
Doug Madory shares insights from his 2025 analysis of secure BGP deployment around the world, based on Kentik’s internal measurements and global routing data.
Doug Madory shares insights from his 2025 analysis of secure BGP deployment around the world, based on Kentik’s internal measurements and global routing data.
Guest Post: Studying PROXY protocol usage at Internet scale and the security impact of its misconfigurations.
Geoff Huston discusses the DNS root zone and how query load at the root could be reduced by using trusted local copies of the zone.
Guest Post: Many AS-SETs have grown so large they effectively whitelist most of the routing table, defeating their purpose. How are AS-SETs actually used for filtering, and what can be done when they get too big?
Reviewing QUIC’s design motivations, protocol innovations, and current adoption across the public Internet.
Leslie Daigle discusses AIDE and GCA’s work to analyse malicious traffic collected via honeynets.
Guest Post: Developing FastFlow — a time-series method that efficiently classifies network flows using the fewest packets needed for accurate results.
What an ordinary Thursday reveals about Internet routing from the edge.
Professor Cristel Pelsser discusses GILL, a new model for BGP data collection, and the application of Machine Learning to BGP analysis.
Guest Post: IXPs’ unique vantage points can provide local and regional level availability and performance insights that public international measurement projects cannot measure as accurately.