Measurements and Statistics

All articles

Better Crypto - Applied Cryptography Hardening

Better Crypto - Applied Cryptography Hardening

5 min read

This project aims at creating a simple, copy & paste-able HOWTO for secure crypto settings of the most common services (webservers, mail, ssh, etc.). It was presented at the recent RIPE 68 Meeting in Warsaw. For those of you who couldn't attend the meeting, here is summary of the talk.

Article tags:

4 You have liked this article 0 times.
2
Suggestions for Improving Abuse Contact Management

Suggestions for Improving Abuse Contact Management

Denis Walker

6 min read

The aim of the policy Abuse Contact Management in the RIPE Database (RIPE document ripe-563), was to make available an abuse contact for all resources maintained by the RIPE NCC. The RIPE NCC proposed an implementation plan that was accepted. During the deployment there has been some feedback on th…

Article tags:

0 You have liked this article 0 times.
0
RIPE Atlas: Latest Results API and Parsing Library

RIPE Atlas: Latest Results API and Parsing Library

Suzanne Taylor

4 min read

You can now get the latest results from any of your user-defined measurements with a new API created specifically for this purpose. In addition, we've developed a parsing library that can be used in combination with the new API to make it an even more useful tool.

Article tags:

0 You have liked this article 0 times.
1
Assisted Registry Check - First Results

Assisted Registry Check - First Results

Matt Parker

6 min read

In the final quarter of 2013, we launched the Assisted Registry Check (ARC) for our members. This enhancement to the auditing activities of the RIPE NCC was initiated in response to feedback from members who indicated that our previous auditing activities were time-consuming and could be more effic…

Article tags:

0 You have liked this article 0 times.
0
Modifications to the IP Analyser to Reflect New Policy

Modifications to the IP Analyser to Reflect New Policy

Alex Band

5 min read

We are in the process of implementing the policy regarding Post Depletion Adjustment of Procedures (2013-03). In this article we will give an overview of the changes we are making to the IP Analyser web interface and API, so you can accommodate your scripts and workflow. We intend to implement thes…

Article tags:

0 You have liked this article 0 times.
0
BGP Leaks in Indonesia

BGP Leaks in Indonesia

Rene Wilhelm

5 min read

In this article we are looking in some more detail at BGP leak in Indonesia and illustrate how RIPEstat visualisations can help to assess the impact.

Article tags:

0 You have liked this article 0 times.
0
Timeline for Phasing Out the Old TTM-based DNSMON

Timeline for Phasing Out the Old TTM-based DNSMON

Romeo Zwart

3 min read

The RIPE NCC announced a new version of DNSMON, available for testing by the public, in March 2014. We are now planning the removal of the old DNSMON.

Article tags:

0 You have liked this article 0 times.
0
A RIPE Atlas View of Internet Meddling in Turkey

A RIPE Atlas View of Internet Meddling in Turkey

Emile Aben

5 min read

In RIPE Atlas we see latencies to Google's 8.8.8.8 DNS resolver service drop in Turkey. We expect this is due to hijacking of the 8.8.8.8 service. Our measurements show a timeline of these events. Note that even when the Twitter ban had been lifted, RIPE Atlas still saw fake 8.8.8.8 DNS service…

Article tags:

0 You have liked this article 0 times.
7
An Updated DNS Monitoring Service

An Updated DNS Monitoring Service

Fatemah Mafi

4 min read

Since 2003, the RIPE NCC’s DNS Monitoring Service (DNSMON), has been providing a comprehensive, objective, and up-to-date overview on the quality of the service offered by TLD and other DNS operators. Due to technical advancements and in line with our aim to provide consolidated services, we are in…

Article tags:

0 You have liked this article 0 times.
3
Network Anomaly Detection – Survey Evaluation

Network Anomaly Detection – Survey Evaluation

Jan Rejchrt

5 min read

We wanted to find out what network security experts think about network anomalies. We created a short web survey in order to map opinions of network professionals. In this article we describe the results.

Article tags:

0 You have liked this article 0 times.
0

Showing 825 article(s)