BGP Hijacking Risks Research Papers and Projects

Research Papers and Projects Exploring BGP Hijacking & Routing Mistakes Risk The BGP Hijacking Risks profile attracts a wide academic interest. This interest attracts government and private research funding to explore new anti-BGP Hijacking tools, techniques, and resiliency approaches. This work is always worth reading, tracking, and exploring to see apply to real-world operations. Monitor, Read More

What can Enterprises do to protect against BGP Hijacks?

Yes, you can minimize the risk to BGP Hijacks. All enterprises around the world need to have a conversation around BGP Hijacks. We see security news around malware, phishing ransomware, DOS attacks, breaches, and range of other attacks. What we do not see is conversations around BGP Hijacks. A BGP Hijack can happen on one Read More

7 Critical Security Conversations

The wave of supply chain security conversations that was sparked by the Bloomberg articles has people talking (see The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies and related articles). The increased interest in supply chain security is important. It is feasible for threat-actors sneak in a backdoor, exploitable code, or Read More

Master Class in Internet Networking …. Free

Nick Feamster Provides Operators, Engineers, and Students with the Tools to Understand How the Internet is Glued Together Who is Nick Feamster? Dr. Nick Feamster is known in the Internet Operations community as one of our primary source of great talent, research that pushes the Industry forward, a deep-dive investigation into security issues on the Read More

FlowSpec – Using BGP for Rapid DOS Response

Using BGP FlowSpec to Push an ACL to the Edge of the Network, to Stop a DOS Attacks, and Build a DOS Response Architecture Version (0.7) FlowSpec provides large networks with an ability to push a layer 4 ACL rapidly to the edge of the network using the Network Layer Reachability Information (NRLI) expansion of Read More

Hardware & Software Vulnerabilities are Guaranteed

The long years of experience have taught me through experience, hardware & software vulnerabilities are guaranteed. It is not a matter of “if” but when. The sad reality is that most hardware and software vendors are not ready for vulnerabilities when they happen. Their response ranges from “I’m going to take legal suit” against the Read More

BGP Route Hijacks & Routing Mistakes – What can be done Today?

Protecting your Business, Customers, & the Internet from BGP Route Hijacking Chaos? (DRAFT – Version 0.11) The Internet is glued together with the Board Gateway Protocol (BGP). It may not be perceived as the “perfect” protocol, but it has delivered a transformative global network that spans the Internet and all telecommunications. It is stable, transparent, Read More

Are your customers infected with VPNFilter?

Everyone is talking about VPNFilter, but there is little information to know if my customers, my staff, or my own home is at risk? How do can I get plugged in? Understanding if you are at risk would be helpful to know if you need to drop everything and fix it now, fix it this Read More

7 Habits of Highly Effective Cyber-Criminals

  Yes, there are habits of highly effective cyber-criminals use to be successful! We can leverage the knowledge of these habits to better prepare, defend, and attribute attacks. To understand where these habits were first observed, we must go back to the point where the Internet explosion was creating the opportunity for new criminal enterprises. Read More

Public Cloud DNS Resolvers (which offer services)

  Turning you DNS Resolver into a Security Tool Public Cloud DNS Resolvers are now well known in the industry.  Google DNS has opened the door for many solutions offering a variety of DNS Resolver base solutions. Today, there is a multitude of cloud-based DNS Resolvers. These are services individuals might wish to explore. Everyone Read More