Networks

Networks / Most Viewed

Close to a Quarter of ZeroAccess Botnet Disabled, Reports Symantec

Symantec has disabled part of one of the world's largest networks of infected computers, according to reports today. About 500,000 hijacked computers have been taken out of the 1.9 million strong ZeroAccess botnet. The zombie computers were used for advertising and online currency fraud and to infect other machines. Security experts warned that any benefits from the takedown might be short-lived. more

UN Human Rights Council Passes Resolution ‘Unequivocally’ Condemning Internet Shutdowns

United Nations Human Rights Council today adopted resolutions condemning measures to intentionally prevent or disrupt access or dissemination of information on the Internet in violation of international human rights law. more

Audio and Video Traffic Passes 70% in North America

Real-Time Entertainment (streaming video and audio) traffic is now responsible for over 70% of North American downstream traffic in the peak evening hours on fixed access networks, according to a new report from Sandvine. Five years ago, video and audio streaming accounted for less than 35%. more

What is Bring Your Own IP (BYOIP)?

An IPv4 address identifies your connection to the online world. IP addresses make it possible to host websites, manage secure communication, and engage in countless other essential, internet-related activities. Typically, when migrating to a new cloud provider, a business has only one path: lease the provider's IP addresses. But what if a business already has a block of IP addresses? more

Kill the Spreadsheets! Automate VPN IP Assignments and Tracking over MPLS/VRF and vLAN

Advancements in virtual private networking have extended system capabilities for service providers. Providers can divide LANs into multiple discrete segments using either Virtual Local Area Networks (vLANs), leverage Multiprotocol Label Switching (MPLS) or Virtual Routing and Forwarding (VRF) to host Virtual Private Networks (VPNs) that support service operations over multiple instances. more

Internet Heavy Weights Staying Out of Net Neutrality Battle

Tech giants including Aamzon and Tiwtter are staring out of the contentious, public fight over the future of the Obama-era net neutrality rules. more

Zero-Touch Provisioning… Really?

Zero-touch provisioning (ZTP) -- whatever does that mean? Of course, it is another marketing term. I think the term "closer to zero touch provisioning" is probably better, but CTZTP -- as opposed to ZTP -- is a bit more of a mouthful. Whenever I hear language like this that I'm not familiar with, I get struck by a bolt of curiosity. What is this new and shiny phrase that has just appeared as if from nowhere? more

Building a More Secure Routing System: Verisign’s Path to RPKI

At Verisign, we believe that continuous improvements to the safety and security of the global routing system are critical for the reliability of the internet. As such, we've recently embarked on a path to implement Resource Public Key Infrastructure (RPKI) within our technology ecosystem as a step toward building a more secure routing system. In this blog, we share our ongoing journey toward RPKI adoption and the lessons we've learned as an operator of critical internet infrastructure. more

The Christmas Goat and IPv6 (Year 14)

A new year and a new goat with new conditions, the goat was slowly eaten by jackdaws, and in the end, almost only the frame remained. This was really slow TV for the devastation… You can read more on Wikipedia about the devastating jackdaws and the straw... 36% IPv6 is equal to last year, and I had high hopes as Telia (AS3301) has made great progress in IPv6 and that Sweden should be the dominant country.  more

New Ways Cybercriminals are Thwarting Security

M86 Security today released it's bi-annual security report for the first half of 2010, highlighting the evolution of obfuscation through combined attacks. From the report: "This threat trend is the latest to emerge as cybercriminals seek new ways to limit the effectiveness of many proactive security controls. Because existing techniques for 'covering their tracks' are becoming less effective, cybercriminals have begun using combined attacks, which are more complex and difficult to detect. By splitting the malicious code between Adobe ActionScript language - built into Adobe flash - and JavaScript components on the webpage, they limit the effectiveness of many of the the proactive security detection mechanisms in place today." more

Average DDoS Attacks Now Large Enough to Take Most Organizations Completely Offline

Arbor Networks today released its Global DDoS Attack Data for the first half of 2016 affirming continued escalation in both the size and frequency of denial-of-service (DDoS) attacks. more

Internet Service Restored in Egypt

Renesys reports that Internet services in Egypt have been restored. According to the report, Egyptian Internet providers returned to the Internet at 09:29:31 UTC (11:29am Cairo time). "Websites such as the Egyptian Stock Exchange, Commercial International Bank of Egypt, MCDR, and the US Embassy in Cairo, are once again reachable. All major Egyptian ISPs appear to have readvertised routes to their domestic customer networks in the global routing table."
 more

Caribbean Network Operators Group Hosts 17th Regional Meeting

The seventeenth regional meeting of the Caribbean Network Operators Group, CaribNOG 17, took place at the Hilton Barbados Resort, Bridgetown, Barbados from April 10 to 12, 2019, with the theme "Securing Caribbean Networks." Approximately 100 participants, including technical experts from the global Internet community and other stakeholders from across the Caribbean, joined dozens of online participants for this first of two regional gatherings for the year. more

Antigua to Host CaribNOG 18 in September

Antigua and Barbuda will host the eighteenth regional meeting of the Caribbean Network Operators Group (CaribNOG) from September 25 to 27. CaribNOG is a vibrant community of professionals committed to improving the region’s networks, expanding the technical capacity of those who build and secure them, and strengthening the interconnections among all actors in the Internet space. more

WSIS+10 and the Challenge of Securing the Internet

In just one week, representatives of governments from all around the world will gather at the UN headquarters in New York for the 10-year Review of the World Summit on the Information Society, a.k.a. "WSIS+10". We are very pleased to see the consensus forming that the principles of multi-stakeholder cooperation and engagement should be at the core of the Information Society. Moreover, consensus has emerged around a "post-2015" vision for how the Internet can be used to support the Sustainable Development Goals (SDGs) that will bring about a better future for us all. more