Blog
-
Secure and Scalable Rerouting in LEO Satellite Networks
The effectiveness of a network’s resilience is directly tied to how much failure information a satellite possesses, ranging from simple local awareness to complex global knowledge.
Categories: -
Investigating Middlebox Deployment and Characteristics in Dutch Autonomous Systems
Study reveals 4% of Dutch network paths are affected by middleboxes; nearly half are located outside the country.
Categories: -
Why Satellites Won’t Close the Digital Divide
Analysis shows that while LEO networks can expand Internet access, current offerings alone cannot easily deliver universal, meaningful connectivity.
Categories: -
Continued Progress in African DNS Security
Four African countries have deployed and enabled DNSSEC on their ccTLD domains in the last six months. Well over 223 million Internet users can now benefit from the protection provided by DNSSEC.
Categories: -
When “Nearby” Isn’t Nearby: How Remote Peering Undermines Anycast
Remote peering has quietly disrupted the benefits of anycast and IXPs.
-
Exposing the Roots of Phishing DNS Abuse
Malicious domain registrations are concentrated, with attackers favoring specific registrar-TLD combinations based on pricing, bundled services, and operational policies rather than randomly registering domains.
Categories: -
Are LEO Networks the Future of National Emergency Failovers?
Low Earth Orbit (LEO) satellite-based Internet constellations have been immensely helpful during national connectivity disruptions, but evidence of their effectiveness remains largely anecdotal, with no systematic national-scale studies.
Categories: -
Unveiling and Engaging with the Humans of Networking Research
Action research, Participatory Action Research, and Participatory Design approaches should be employed in Internet research studies to integrate community participation directly into the research output.
Categories: -
Visualizing How the Internet Breathes
The need to visualize network performance data is especially relevant in today’s increasingly large network telemetry datasets.
Categories: -
Double-Edged Sword: How Attackers Use the Same Cloud Infrastructure We Rely On
Malicious actors are increasingly favoring partial use of cloud services rather than fully migrating their infrastructure.
Categories: -
A Decade-long Landscape of Advanced Persistent Threats
Between 2014 and 2023, 154 countries experienced an Advanced Persistent Threat (APT) attack.
Categories: -
The Ubiquity Tradeoff
Ubiquitous connectivity has been an unattainable goal in the USA, despite hundreds of billions in investment.
Categories:












