Serial BGP hijackers: A reproducibility study and assessment of current dynamics
Guest Post: Profiling serial hijackers with less data than previous efforts while achieving similar accuracy.
Guest Post: Profiling serial hijackers with less data than previous efforts while achieving similar accuracy.
Guest Post: Investigating the least likely suspect in router configuration.
Guest Post: Is RPKI stable enough to meet the recent White House roadmap expectations?
Guest Post: Combining BGP confederations and AS override can potentially create a BGP routing loop, resulting in an indefinitely expanding AS-PATH.
View and track your networks’ MANRS readiness scores in APNIC’s DASH.
Guest Post: How to conserve IPv4 addresses with IGP Babel.
BGP over QUIC, a BCP for publication servers, and AS Path protection at IETF 120.
How can a CDN steer users to optimize content delivery, and how does this affect user privacy?
Guest Post: A case study of critical Dutch infrastructures.
Bgpipe, reclaiming class E space, reconsidering RPKI validation, low-latency RPKI validation, and revisiting BCP 194.