Networks

Networks / Most Viewed

New Ways Cybercriminals are Thwarting Security

M86 Security today released it's bi-annual security report for the first half of 2010, highlighting the evolution of obfuscation through combined attacks. From the report: "This threat trend is the latest to emerge as cybercriminals seek new ways to limit the effectiveness of many proactive security controls. Because existing techniques for 'covering their tracks' are becoming less effective, cybercriminals have begun using combined attacks, which are more complex and difficult to detect. By splitting the malicious code between Adobe ActionScript language - built into Adobe flash - and JavaScript components on the webpage, they limit the effectiveness of many of the the proactive security detection mechanisms in place today." more

Renesys Reporting Total Internet Blackout in Sudan

Senior Research Engineer, Doug Madory at Renesys reports: "A few hours ago, we observed a total Internet blackout in Sudan and, as we publish this blog, the Internet remains largely unavailable. By count of impacted networks, it is the largest national blackout since Egypt disconnected itself in January 2011. The massive outage came as the government began a violent crackdown on protests triggered by the government’s decision to end fuel subsidies." more

CarPIF Regional Connectivity Meeting to Address Affordable and Resilient Internet Access

The Eastern Caribbean island of Grenada has been selected as the venue for the fifth regional meeting of the Caribbean Internet Peering and Interconnection Forum, CarPIF, set for June 12 to 13. The annual international event, which draws Internet giants like Facebook and Google to the region, is focused on developing the Internet in the Caribbean by improving policy and building relationships between network operators and content providers. more

U.S. Now Leading Source of Attack Traffic, Followed by China and Russia

The U.S. became the top attack traffic source in the second quarter of 2010, accounting for 11% of observed attack traffic in total, reports Akamai in its State of the Internet Report released today. According to the report, China and Russia held the second and third place spots, accounting for just over 20% of observed attack traffic. Attack traffic from known mobile networks has been reported to be significantly more concentrated than overall observed attack traffic, with half of the observed mobile attacks coming from just three countries: Italy (25%), Brazil (18%) and Chile (7.5%). more

Predictions for a Post-COVID-19 World

While it might still be too early to make predictions, there are dozens of articles on the web predicting how the COVID-19 pandemic might change our long-term behavior. Here are some of the more interesting predictions I've seen that involve broadband and telecom... Millions of people were sent home for work or school to homes that didn't have good broadband. These folks have been telling the world for years that they don't have good broadband... more

A New Busy Hour – One of the Many Consequences of the COVID-19 Pandemic

One of the many consequences of the coronavirus is that networks are going to see a shift in busy hour traffic. Busy hour traffic is just what it sounds like -- it's the time of the day when a network is busiest, and network engineers design networks to accommodate the expected peak amount of bandwidth usage. Verizon reported on March 18 that in the week since people started moving to work from home that they've seen a 20% overall increase in broadband traffic. more

Interstate at Rush Hour ...in the Rain ...on a Friday – AKA, Your Enterprise Traffic on the Net

Congestion. Traffic. Two words that draw a visceral response, whether you are commuting to work or managing a network. Managing data traffic used to be easy. Everything was housed in centralized data centers, and all traffic was routed through big, dedicated, effective but expensive "pipes" -- Multiprotocol Label Switching (MPLS) links. When all the applications are at the data center, it makes sense to build private access for all traffic. more

MANRS Observatory: Monitoring the State of Internet Routing Security

Routing security is vital to the future and stability of the Internet, but it's under constant threat. Mutually Agreed Norms for Routing Security (MANRS) is a global initiative, driven by the networking community and supported by the Internet Society, aiming to reduce the most common threats to the Internet's routing system through technical and collaborative action. more

RIPE 86 Bites: Encryption and Active Network Management

Change is hard, and the larger the system, the slower the pace of change. There are just so many systems that need to change their behaviors, and the motivations of users, vendors, service providers, content generators and many others all vary. Getting all of us to change some aspect of our technology, platform or application set is hard, if not impossible, to orchestrate such that it happens at the same time. more

Give Network Administrators a Zero-Impact Firmware Update Solution

Struggles with the firmware update process are well known by Network Administrators in the cable industry. The copious tasks required to complete an end-to-end firmware update are painstaking and error-prone, often making the investment not worth the time it takes to complete the work... imagine doing these manual tasks over and over for hundreds to thousands of devices, many from different vendors, each with its own unique device update path! Clearly, this complex challenge needs a solution. more

Reframing the Infrastructure Debate

Fast and reliable infrastructure of any kind is good for business. That it's debatable for the Internet shows we still don't understand what the Internet i -- or how, compared to what it costs to build and maintain other forms of infrastructure, it's damned cheap, with economic and social leverage in the extreme. Here's a thought exercise... Imagine no Internet: no data on phones, no ethernet or wi-fi connections at home - or anywhere. No email, no Google, no Facebook, no Amazon, no Skype. That's what we would have if designing the Internet had been left up to phone and cable companies... more

Major International Botnet Disabled Says U.S. Department of Justice

The U.S. Department of Justice and the FBI announced on Wednesday that they have taken actions to disable an international botnet of more than two million infected computers responsible for stealing corporate data including user names, passwords and financial information. more

When Registry Power Detaches From Liability, It Detaches From Reality

IPv4 scarcity turned regional internet registries from clerks into gatekeepers of a valuable resource. Yet liability caps remain trivial, leaving powerful institutions with little accountability and incentives for conflict and structural breakdown ahead. more

Competing With Satellite Cellular: AT&T Sees Little Threat but Niche Appeal Grows

AT&T’s CEO plays down the threat of satellite cellular, citing bandwidth and coverage limits. Yet growing interest in rural and IoT applications suggests the technology could still claim valuable niches in the wireless market. more

Happy Birthday, Backbone

Today marks the 20th anniversary of the decommissioning of the NSFNET backbone on April 30 1995, an important milestone in the development of the commercial Internet. The NSFNET was set up by the US National Science Foundation in 1985 to enable university researchers access to five supercomputer sites across the United States, using Internet Protocol technology. In stepping back, the NSF supported a transition to an Internet shaped by market forces, and the explosion of commercial use soon followed. more