Blog
-
When “Nearby” Isn’t Nearby: How Remote Peering Undermines Anycast
Remote peering has quietly disrupted the benefits of anycast and IXPs.
-
Exposing the Roots of Phishing DNS Abuse
Malicious domain registrations are concentrated, with attackers favoring specific registrar-TLD combinations based on pricing, bundled services, and operational policies rather than randomly registering domains.
Categories: -
Are LEO Networks the Future of National Emergency Failovers?
Low Earth Orbit (LEO) satellite-based Internet constellations have been immensely helpful during national connectivity disruptions, but evidence of their effectiveness remains largely anecdotal, with no systematic national-scale studies.
Categories: -
Unveiling and Engaging with the Humans of Networking Research
Action research, Participatory Action Research, and Participatory Design approaches should be employed in Internet research studies to integrate community participation directly into the research output.
Categories: -
Visualizing How the Internet Breathes
The need to visualize network performance data is especially relevant in today’s increasingly large network telemetry datasets.
Categories: -
Double-Edged Sword: How Attackers Use the Same Cloud Infrastructure We Rely On
Malicious actors are increasingly favoring partial use of cloud services rather than fully migrating their infrastructure.
Categories: -
A Decade-long Landscape of Advanced Persistent Threats
Between 2014 and 2023, 154 countries experienced an Advanced Persistent Threat (APT) attack.
Categories: -
BGP Vortex: Internet Routing Vortices Create Outages by Preventing Convergence
A BGP Vortex exploits widely used routing policies to trigger persistent oscillations between major Internet networks that can lead to Internet outages.
Categories: -
Rethinking Geolocation on the Internet
Researchers have proposed a new approach that relies on a trusted third-party authority to verify and attest both a user's location and the accuracy requirements declared by the service.
Categories: -
Characterizing Internet Centralization vs Regionalization
Geopolitical, historical, and linguistic factors shape which companies and countries are relied upon for web infrastructure.
Categories: -
Exploring the Potential of RPKI Signed Checklists: The Results Are In
The Internet Society recently explored the feasibility of RSCs to strengthen the resilience and trustworthiness of the Internet's routing system.
Categories: -
Comparing Batch and Streaming Detection of Internet Outages
Using both batch and streaming Internet detection methods can improve visibility of Internet outages.
Categories:












