Three of the best: George Michaelson
In 2024, George Michaelson touched on topics ranging from news to explainers. Here are three of George’s best.
View ArticleThree of the best: RPKI
Securing routing by adopting RPKI is now an essential practice in the modern Internet — here are three of 2024’s top posts.
View ArticleThree of the best: Podcasts
APNIC’s Podcast PING continued to attract experts to discuss varied Internet operation topics — here are three of the best.
View ArticleThree of the best: ‘How to…’
‘How to’ posts are a great way to learn how to use a new tool, troubleshoot problems, or perform advanced tasks. Here are three of 2024’s best.
View ArticleThree of the best: Security
Here are APNIC Blog’s top three posts related to security for 2024.
View ArticleBGP in 2024
Geoff Huston’s analysis of BGP routing table growth for 2024 and some projections.
View ArticleObserving the DDoS landscape requires collaboration
Guest Post: An industry-academic analysis on trends in direct-path and reflection-amplification attacks to encourage greater common understanding of the DDoS landscape.
View ArticleFirst penguin advantage in cryptography?
Deprecating SHA-256, RSA, ECDSA, and ECDH key usage ahead of quantum computing?
View ArticleIP addresses through 2024
What IPv4 and IPv6 addressing in 2024 tells us about the changing nature of the network.
View ArticleHow networking technology enables cheating in online exams
Guest Post: How might a student cheat during a supervised in-person online exam in a BYOD environment?
View ArticleReliable IoT network traffic inference
Understanding and managing changes in IoT device behaviour to make network traffic predictions more reliable.
View ArticleIXP from scratch: Part 3 — The peering LAN
Guest Post: How we connected our two PoPs and which security and safety mechanisms (L2 and L3) we configured to ensure reliable operation.
View ArticleHow to convince your boss to deploy DNSSEC and RPKI
An improved strategy to advocate for DNSSEC and RPKI deployment.
View Article[Podcast] RISKY BIZ-ness
Gautam Akiwate discusses his prize-winning paper on risks in the DNS supply chain.
View ArticleImpact of scanning on authoritative nameservers
Guest Post: Investigating the risks of DNS scanning for the DNS infrastructure.
View ArticleRPKI’s 2024 year in review
Guest Post: RPKI has become the number one tool in the toolbox to prevent routing incidents.
View ArticleIXP steps into the terabit era
Guest Post: Tracing the growth of an IXP from a local hub to exceeding one terabit of Internet traffic.
View ArticleNetwork traffic modelling approaches
Guest Post: Exploring the characteristics of various traffic models using synthetic data to gain insight into traffic patterns.
View ArticleRecent cases of watering hole attacks: Part 1
Guest Post: Dissecting a recent watering hole and how to defend against them.
View Article