/ Most Viewed

Worm Propagation Strategies in an Ipv6 Internet

A recent paper called "Worm Propagation Strategies in an IPv6 Internet", written by Steven M. Bellovin, Angelos Keromytis, and Bill Cheswick, examines whether or not the deployment of IPv6 will in fact provide a substantial level of barrier against worms. Shared below are the introductory paragraphs from this paper. "In recent years, the internet has been plagued by a number of worms. One popular mechanism that worms use to detect vulnerable targets is random IP address-space probing..." more

21st Century Triple Networks: Ubiquitous 4G, WiFi, & Wires

The best engineers on the planet are coming to the same conclusion: a hybrid 4G/WiFi/landline network is the way to meet mobile demand. Folks like John Donovan of AT&T and Masayoshi Son of Softbank in Japan had this vision around 2007-2008. As the iPhone/iPad/Android made the coming demand clear, networks planners around the world evolved similar strategies. more

Trademarks for TLDs

The United States Patent and Trademark Office (USPTO) has recently circulated proposed examination guidelines to allow the USPTO to begin providing Trademark Protection for Top Level Domains (TLDs). This is an important new development. TLDs today are currently ineligible for Trademark protection on the basis that they do not constitute a source-identifying mark. The USPTO is currently in the process of rectifying this situation by extending Trademark protection to Registry Service providers and has released its proposed examination procedures for that purpose. However, there are some very concerning elements to their proposed examination guidelines. more

Are We Attending the Right ICANN Meeting?

I have no idea who wrote that wonderful piece, Time for Reformation of the Internet, posted by Susan Crawford. (It wasn't me - I never use the word "netizen".) Elliot Noss of Tucows wrote a partial rebuttal, I must be attending the wrong ICANN meetings. Elliot's company, Tucows, has been a leader in registrar innovation and competition. And Tucows has constantly been among the most imaginative, progressive, responsible, and socially engaged companies engaged in these debates. ...But the points made by Time for Reformation of the Internet go far beyond registries and registrars. more

Email Recommendation System-Abstract: Deployment Considerations (Part III)

Perhaps, one of the most thrilling moments of any machine learning project for a data science team is learning that they get to deploy the model in a production environment. However, this can be a daunting task or a simplified one, if all the tools are readily available. Machine-learning (ML) models "require" deployment to a production environment to deliver optimal business value, and the reality is that most models never make it to production. more

How Decades-Old Decisions Left U.S. Networks Vulnerable to Chinese Cyberintrusion

It seems like there is more disturbing news every day about Chinese infiltration of our telecommunications networks. A recent headline said that nine large ISPs have now been infiltrated. Tom Wheeler, a previous Chairman of the FCC, recently wrote an article for the Brookings Institute that speculates that the ability of the Chinese to infiltrate our networks stems back to decisions made decades ago that have never been updated for the modern world of sophisticated hacking. more

South Korean Banks Receive DDoS Threat from Hacker Group, Record Ransomware Payment Demanded

Various sources including South Korea's news agency Yonhap are reporting that a hacker group has threatened to launch a DDoS attack against seven South Korean banks unless they pay about 360 million won (US$315,000) in bitcoin. more

DNS Attack Code Has Been Published

As warned by Dan Kaminsky, Paul Vixie, and numerous other experts experts, it was just a matter of time before an exploit code for the now public DNS flaw would surface. An exploit code for the flaw allowing insertion of malicious DNS records into the cache of target nameservers has been posted to Metasploit, a free provider of information and tools on exploit techniques. According to reports Metasploit creator, H D Moore in collaboration with a researcher named "|)ruid" from Computer Academic Underground, created the exploit, dubbed "DNS BaliWicked Attack", along with a DNS service created to assist with the exploit. more

Private vs. ICANN Auction of Last Resort

As an applicant in this new gTLD round with quite a few overlapping strings, I've had a keen interest in the various proposed auction platforms. In the past six months the ideas behind private auction have matured significantly and I now see it as a strong mechanism for resolving contention. Following are my observations. more

IP Address Management as a Service on the Cloud

Consumption of software as a service with a usage-based business model has gained incredible popularity in recent years. On the other hand, other cloud services such as infrastructure and platform as a service are just starting to pick up. While compute and storage are by the far the most commonly used cloud infrastructure services, few consider core network services such as IP Address Management (IPAM) as something that could be utilized over the cloud. more

Why ICANN TLD Policy Imposes Severe Constraint on Development of Internationalized Domain Names

In 2008, ICANN made it known to the community that it is finally ready to discuss Internationalized Domain Names regarding Top-Level Domains (TLDs) after several years of working groups, technical trials, studies and considerations. It was highly anticipated by the Chinese, Japanese and Korean (CJK) community. It was also with great disappointment when the New gTLD Application Guidebook, published on 24th Oct 2008, included the following paragraph... more

State Hacking: Do’s and Don’ts, Pros and Cons

Over the past days a lot has been said and written on counter hacking by enforcement agencies. The cause is a letter Dutch Minister I. Opstelten, Security & Justice, sent to parliament. Pros and cons were debated and exchanged. Despite the fact that I perfectly understand the frustration of enforcement agencies of having to find actionable data and evidence that gets criminals convicted in a borderless, amorphous environment, a line seems to be crossed with this idea presented to Dutch parliament. Where are we? more

CAIDA and ARIN Release IPv6 Survey

The Cooperative Association for Internet Data Analysis (CAIDA) and the American Registry for Internet Numbers (ARIN) presented the results [PDF] of a recent IPv6 survey at the ARIN XXI Public Policy Meeting in Denver on April 7th. The survey involved over 200 respondents from a blend of Government, commercial organizations (including ISPs and end users), educational institutions, associations, and other profit and non-profit entities. The purpose of the survey, conducted between March 10th and 24th, was to capture IPv6 penetration data in the ARIN region... more

Does ICANN’s New Proposed Budget Harm Competition?

Despite the stated commitment to meeting their obligations to the government, ICANN's proposed budget may potentially breach the MoU. Specifically, the MoU commits ICANN to "perform as an organization founded on the principles of competition..." However, an alliance of at least 50 Registrars claims that the new Registrar fee structure contained in the proposed budget would significantly harm competition.  more

Verisign vs. ICANN: More at Stake than Sitefinder

It's easy to dismiss Verisign's antitrust suit as a ploy to push through Sitefinder. But whether one loves Sitefinder or hates Sitefinder, the complaint raises a much more significant issue that won't go away even if ICANN lets Verisign roll out Sitefinder. At the heart of Verisign's complaint is the lack of any definable process for decisionmaking, and its a complaint shared by others. A settlement between Verisign and ICANN that does not create a clear process for decisionmaking at ICANN that includes trustworthy independent review will merely delay the inevitable. Eventually, some other party will become just as frustrated and again challenge ICANN -- either in U.S. court or by enlisting the help of the U.S. Commerce Department, non-U.S. governements, or multinational treaty organizations. ICANN must recognize that the days of ad hoc decision making based on realpolitick must end and give way to stable processes that ICANN staff cannot control. more