/ Most Viewed

European Standardization Organizations Discuss Role of Standards for EU Cybersecurity Strategy

Delegation from the European Standardization Organizations (ESOs) - CEN, CENELEC and ETSI - met with Neelie Kroes, the Vice-President of the European Commission responsible for the Digital Agenda, in Brussels yesterday (2 April 2014) discussing how to maximize the positive contribution that standards can make to enhancing internet security and protecting personal data, in order to support the successful implementation of the EU Cybersecurity Strategy. more

Exploiting the Firewall Beachhead: A History of Backdoors Into Critical Infrastructure

There is no network security technology more ubiquitous than the firewall. With nearly three decades of deployment history and a growing myriad of corporate and industrial compliance policies mandating its use, no matter how irrelevant you may think a firewall is in preventing today's spectrum of cyber threats, any breached corporation found without the technology can expect to be hung, drawn, and quartered by both shareholders and industry experts alike. more

On the Internet Everyone is Connected to Everyone Else - Right?

We tend to make a number of assumptions about the Internet, and sometimes these assumptions don't always stand up to critical analysis. We were perhaps 'trained' by the claims of the telephone service to believe that these communications networks supported a model of universal connectivity. Any telephone handset could establish a call with any other telephone handset was the underlying model of a ubiquitous telephone service, and we've carried that assumption into our perception of the Internet. On the Internet anyone can communicate with anyone else - right? more

Video: IETF Chair Jari Arkko on “Pervasive Monitoring and the Internet”

Today at the RIPE 67 event in Athens, Greece, IETF Chair Jari Arkko gave a presentation on "Pervasive Monitoring and the Internet" where he spoke about the ongoing surveillance issues and: What do we know? What are the implications? What can we do? Similar to his earlier article on the topic, Jari looked at the overall issues and spoke about how Internet technology should better support security and privacy. more

ICANN 55 Next Week In Marrakech - What to Expect

As you may know, ICANN holds three public meetings every year. The most recent one, ICANN 54, was held in Dublin... So the next ICANN meeting is being held in Marrakech, Morocco starting Saturday, March 5th through March the 10th. Up until now all three meetings were the same length and had the same basic structure. However, from this year onwards, that'll change. How that will play out in reality, however, is anyone's best guess. more

The ICANN Registrar Community

It started way back in 1993 with a Cooperative Agreement with the US Government and Network Solutions, making them registrar 'numero uno'. At that time, they enjoyed a monopoly of the market and the much envied ability to charge $70 for a 2 year registration. As all good things come to an end (for NetSol), the agreement was amended in October 1998 to introduce a more competitive spirit. more

It’s Time for Privacy Progress in ICANN

Privacy issues have been important to parts of the ICANN community for many years. I can attest to that fact as a long time veteran of Whois debates as far back as 1998 when I was with the U.S. Federal Trade Commission. However, they have started to receive the general ICANN community visibility only relatively recently. These efforts must continue in order to protect rights, to avoid increasing potential conflicts between ICANN rules and applicable laws, and to generally maintain trust in the Internet as a place to be. more

Caidagram: Visualising Geographically Annotated Internet Measurements

With measurement networks rapidly evolving up to hundreds of nodes, it becomes more and more challenging to extract useful visualisations from tons of collected data. At the same time, geographical information related to Internet measurements (either known or inferred with state-of-the-art techniques) can be exploited to build tools based on geography as a common knowledge base. We wanted to develop a tool to visualise different classes of geographically annotated Internet data, e.g., topology, address allocation, DNS and economical data. more

What’s Holding Back NFV Deployments?

Back in early 2012, the media was all over stack wars that reportedly were taking place between Cisco and VMware. This culminated in VMware's Nicira acquisition in July 2012, paving the way for the coming of software-based networking. Four years later, the market still remains in development mode. Many service providers and enterprises are trying to come to grips with Network Function Virtualization (NFV) and Software-Defined Networking (SDN). more

Similarity of gTLD Applications: Required Reading for Evaluators

ICANN's evaluators should look at data published on "gTLD application similarity analysis". This sort of data helps dramatically reduce time and expense for the evaluation of new gTLD applications while increasing quality. The principle is simple: find the similarities between the 1930 applications. It is a proof-of-concept project by Arnoldo Mueller-Molina, a young Costa Rican researcher with a doctorate in computational analytics. more

The Governance of the Internet

Among the hottest topics at the Broadband Leadership Summit, which was held during the ITU Telecom World 2011 in Geneva, were the issues in relation to the security of the various aspects of the digital economy. The key issue in relation to the governance of the internet relates to the many political, social and cultural differences between countries. This is one of the most contentious issues. more

Resources for Cleaning Your Network

The first step (but certainly not the last) towards saving the internet from spam, malware, and other abuse is to keep your own network clean. A friend of CAUCE, who wishes to remain anonymous, offers these tips and resources to help you identify problem traffic emanating from your network, and clean it up. Though primarily written for ISPs, many of the items below should apply equally well to any network owner. more

A Q&A on Google’s New gTLD Solution, Nomulus

Nomulus is the code for the backend domain name registry solution offered by Google which requires the use of Google Cloud. This solution is the one used for all of Google's new gTLDs and the solution works. An announcement for this solution can look like a potentially "simple" solution for future .BRAND new gTLD applicants, but is it truly the case? more

Dealing With DMARC

DMARC is an anti-phishing scheme that was repurposed in April to try to deal with the fallout from security breaches at AOL and Yahoo. A side effect of AOL and Yahoo's actions is that a variety of bad things happen to mail that has 'From:' addresses at aol.com or yahoo.com, but wasn't sent from AOL or Yahoo's own mail systems. If the mail is phish or spam, that's good, but when it's mailing lists or a newspaper's mail-an-article, it's no so good. more

Do-Not-Track: Still Not a Great Idea

Back in August, FTC chair Jon Leibowitz suggested an Internet do-not-track registry, analogous to the telephone do-not-call registry. At the time, I thought it wasn't a good idea for both technical and non-technical reasons. This week, the FTC published an online privacy report recommending the same thing, and Rep. Ed Markey promises to offer a bill next year to mandate do-not-track for children. With all this interest, might it be a good idea now? Maybe. more