Networks

Networks / Most Viewed

Study Finds IPv6 Adoption Exposes More Residential Devices to Unsolicited Traffic

As IPv6 adoption accelerates, a new study warns that the disappearance of NAT in home networks is exposing millions of devices to online threats -- potentially fueling a new wave of powerful IoT botnets. more

GlavMed Hacks U.S. Government Website

Garth Bruen writes: A report in LegitScript takes a look at Russian rogue Internet pharmacy hacking US government website. "As rogue Internet pharmacy networks become more sophisticated, even US government websites are at risk. Today, we're taking a look at how a rogue Internet pharmacy linked to a criminal network operating out of Russia and Eastern Europe has hacked into a US government website. The Millennium Challenge Corporation, a US foreign aid agency, utilizes a ".gov" top-level domain, which is assigned to the control of the US government. Domain names ending in .gov are typically administered by the General Services Administration." more

The Value of Community Broadband

There are many voices calling for increased initiatives by municipalities to build and operate broadband internet infrastructure as a public utility, but until this week, very little in the way of economic analysis to fully examine whether the benefits justify the costs. A paper released this week finds that local efforts produce small economic benefits, but cause a notable increase in the size of local government. more

Telecoms Infrastructure As a Service

More than a decade ago we predicted that the telecoms industry would be transformed, driven by its own innovations and technological developments. As a result we indicated that in many situations the telecommunications infrastructure would be offered as a service by hardware providers. We also predicted that this would open the way for a better sharing of the infrastructure. more

Botnet Metrics and Calibration

As ISP's continue to spin up their anti-botnet defenses and begin taking a more active role in dealing with the botnet menace, more and more interested parties are looking for statistics that help define both the scale of the threat and the success of the various tactics being deployed... To overcome this problem there are several initiatives trying to grapple with this problem at the moment.. Obviously, if every ISP was using the same detection technology, in the same way, at the same time, it wouldn't be such a difficult task. Unfortunately, that's not the case. more

The Christmas Goat and IPv6 (Year 13)

2022 was not a normal year for me. We sold our company of almost 25 years to Interlan Gefle AB to Nordlo Group, and I also moved away from Gävle city to Boänge, a small rural village outside Sandviken where my ISP (AS20626) still isn't ready for IPv6 in my location.... ☹ ( I use a Mikrotik with a Wireguard tunnel to solve my IPv6 today.) It's 2023 when I'm writing this, and I can't understand why ISPs still haven't deployed IPv6! more

Which Way Does Your Data Flow?

Data may be moving to the cloud, but understanding the physical geography underlying the cloud is becoming increasingly critical. October's decision by the European Court of Justice, striking down key portions of the Safe Harbor rules that some companies had relied on to legally transfer personal data between Europe and the U.S., was only the latest example of the regulatory uncertainty involved in cross-border data flows. While Internet companies have begun to address challenges at the static geographic points where data is resident, understanding the actual paths that data travels is an important and sometimes overlooked part of the compliance analysis. more

Cyber and Telecommunications Defence One of the Fastest Growing Industries in the World

In the past five years, cyber and telecommunications defence has left its niche market to become one of the fastest growing industries in the world. In 2011, governments, industry and ordinary computer users spent roughly £65 billion shoring up their computer networks, a figure that is predicted to double within five years. more

Looking at Centrality in the DNS

The Internet's Domain Name System undertakes a vitally important role in today's Internet. Originally conceived as a human-friendly way of specifying the location of the other end of an Internet transaction, it became the name of a service point during the transition to a client/server architecture. A domain name was still associated with an IP address, but that 1:1 association was weakened when we started adjusting to IPv4 address exhaustion. more

Green Revolving Funds Can Help Fund Costs of Cloud Computing and R&E Networking

There have been some interesting new developments in university Green Revolving Funds (GRF) that I believe could be a significant revenue opportunity for cloud suppliers and R&E networks. In this age of severe financial constraints and cutbacks for universities, new revenue models are needed to sustain advanced cyber-infrastructure in support of research and education. more

Myanmar Internet Down from Massive DDoS Attack

Craig Labovitz of Arbor Networks reports: "Back in 2007, the Myanmar government reportedly severed all Myanmar Internet connectivity in a crackdown over growing political unrest. Yesterday, Myanmar once again fell of the Internet. Over the course of the past several days, Myanmar's main Internet provider, the Ministry of Post and Telecommunication (or PTT for short), suffered a large, sustained DDoS attack disrupting most network traffic in and out of the country." more

A Glance Back at the Looking Glass: Will IP Really Take Over the World?

In 2003, the world of network engineering was far different than it is today. For instance, EIGRP was still being implemented on the basis of its ability to support multi-protocol routing. SONET, and other optical technologies were just starting to come into their own, and all-optical switching was just beginning to be considered for large-scale deployment. What Hartley says of history holds true when looking back at what seems to be a former age: "The past is a foreign country; they do things differently there." more

Dissecting the (Likely) Forthcoming Repeal of the FCC’s Privacy Rulemaking

Last week, the House and Senate both passed a joint resolution that prevent's the new privacy rules from the Federal Communications Commission (FCC) from taking effect; the rules were released by the FCC last November, and would have bound Internet Service Providers (ISPs) in the United States to a set of practices concerning the collection and sharing of data about consumers. The rules were widely heralded by consumer advocates, and several researchers in the computer science community, including myself, played a role in helping to shape aspects of the rules. more

What Happened to Quantum Networks?

A few years ago, there were a lot of predictions that we'd see broadband networks converting to quantum technology because of the enhanced security. As happens with many new technologies, quantum computing is advancing at a slower pace than the wild predictions that accompanied the launch of the new technology. more

Landmark IPv6 Report Published: State of Deployment 2017

On the fifth anniversary of World IPv6 Launch, we're excited to share a detailed report on the State of IPv6 Deployment in 2017. It really is staggering how far IPv6 deployment has progressed in five years. In mid-2012, Google measured less than 1% of users accessing their services over IPv6. Today that figure is getting close to 20%. Since World IPv6 Launch, several major operators are now delivering the majority of traffic from major content sources like Google, Akamai and others over IPv6. more