Measurements and Statistics

All articles

Push the Button: SIDN Lab's DDoS Testbed in Action at CONCORDIA Open Door 2022

Push the Button: SIDN Lab's DDoS Testbed in Action at CONCORDIA Open Door 2022

Thijs van den Hout

7 min read

Over the past months, SIDN Labs have been improving the testbed they developed for the DDoS Clearing House. At the CONCORDIA Open Door event (COD2022) this October, they'll demonstrate how the testbed works as part of the CONCORDIA Threat Intelligence Platform. The team look at the latest changes t…

Article tags:

26 You have liked this article 0 times.
0
240/4 As Seen by RIPE Atlas

240/4 As Seen by RIPE Atlas

Qasim Lone

11 min read

In this article we use data from RIPE Atlas probes to investigate the usage of 240/4, a block of IPv4 addresses 'reserved for future use', formally known as Class E in the wild.

Article tags:

121 You have liked this article 0 times.
2
Measuring Encrypted-DNS Censorship Using OONI Probe

Measuring Encrypted-DNS Censorship Using OONI Probe

Simone Basso

13 min read

In this article we talk through the preliminary results of an encrypted-DNS censorship study currently being conducted by the Open Observatory Network Interference (OONI).

Article tags:

17 You have liked this article 0 times.
2
Journeying into XDP Part 2: XDPerimenting with DNS Telemetry

Journeying into XDP Part 2: XDPerimenting with DNS Telemetry

Luuk Hendriks

16 min read

In this instalment of our Journeying into XDP series, we look into a passive BPF-program that enables us to plot graphs of DNS metrics without altering the DNS packets or touching the DNS software itself.

Article tags:

21 You have liked this article 0 times.
0
Where Did My Packet Go? Measuring the Impact of RPKI ROV

Where Did My Packet Go? Measuring the Impact of RPKI ROV

Koen van Hove

9 min read

Merely doing RPKI ROV does not provide any guarantees where your packet ends up. We conducted an experiment where we look into the impact of RPKI ROV on whether the packet ends up in the intended location based on active beaconing with two servers.

Article tags:

77 You have liked this article 0 times.
1
Dealing with the Undercurrent of Unwanted Traffic

Dealing with the Undercurrent of Unwanted Traffic

Leslie Daigle

6 min read

It’s common knowledge that there are “bad actors” on the Internet, poking and prodding open ports as they find them. But just how much of this “unwanted traffic” is out there, and how much is “too much” to allow out of a source network?

Article tags:

21 You have liked this article 0 times.
0
IPv6 10 Years Out: An Analysis in Users, Tables, and Traffic

IPv6 10 Years Out: An Analysis in Users, Tables, and Traffic

Rene Wilhelm

12 min read

On 6 June 2012, the Internet Society organised the World IPv6 Launch. On that day, participants switched on IPv6 not just for testing, but to use permanently in production services. As ten years have passed since, we look at how IPv6 adoption and deployment has progressed, in terms of routing, end-…

Article tags:

49 You have liked this article 0 times.
1
Pavlos Sermpezis: Revealing Bias in Internet Measurements

Pavlos Sermpezis: Revealing Bias in Internet Measurements

Alun Davies

2 min read

Internet measurement platforms give us a clearer understanding of the state of the Internet. But none of these platforms gives us a ‘view from everywhere’, so that understanding will always be based on a partial and potentially biased view of things. In this episode, Pavlos Sermpezis talks about th…

Article tags:

17 You have liked this article 0 times.
0
RightsCon - Join the Discussion on Digital Rights

RightsCon - Join the Discussion on Digital Rights

Gergana Petrova

12 min read

RightsCon is one of the most established forums for human rights in the digital age. In this article, we give you a taste of some of the issues discussed and hopefully involve you in the debate. We definitely need more voices from the technical community!

Article tags:

21 You have liked this article 0 times.
0
An Introduction to IRR Explorer

An Introduction to IRR Explorer

Teun Vink

9 min read

In this article we take a look at how IRR explorer can be used to analyse and improve routing, IRR registrations, and RPKI configurations by looking at a number of real world examples.

Article tags:

17 You have liked this article 0 times.
0

Showing 815 article(s)

Previous
1 ... 6 7 8 9 10 ... 82
Next