ditto prevents traffic-analysis attacks in WANs
Guest Post: New system makes observed traffic metadata independent of the real traffic in Wide Area Networks.
Guest Post: New system makes observed traffic metadata independent of the real traffic in Wide Area Networks.
Guest Post: How to traverse Carrier-Grade NAT.
Guest Post: New method observes DDoS intensity by measuring infrastructure involved in attacks using IXPs.
Guest Post: Study shows that most consumer IoT devices rely on TLS 1.2; few have upgraded to TLS 1.3.
Guest Post: Is 100% NAT traversal success rate achievable?
Guest Post: Are current practices of managing IP addresses, domains, certificates, and virtual platforms insecure?
Guest Post: How to navigate a NATty network.
Guest Post: Investigating NSA guidance for securing 5G cloud infrastructures.
Guest Post: New routing method uses bandwidth reservations, improving speed and security to meet service-level objectives.
Adli Wahid shared insights on the APNIC Honeynet Project at the PacSON Virtual Webinar, held online on 8 March 2022.