BGP and DNS are the two critical protocols that glue the entire global network (the Internet). Without them, the Internet falls apart. The security, resiliency, and integrity Border Gateway Protocol (BGP) holds up the routing of packets end-to-end across the Internet. Threats to BGP systems are life-threatening, disrupting critical infrastructure people depend on for their
Meaningful Security Conversations with your Vendors: Can vendors ever provide secure solutions?
It is critical to have meaningful security conversations with your vendors. Operators depend on their vendors to supply products and solutions that are secure. As all operators have experienced, “secure products” is almost always a vendor afterthought. This leads to an operational risk that in some cases turns deadly. In this session, we will explore
Conference Talks, Workshops, and Webinars
Barry frequently presents at conference talks, workshops, and webinars. Barry enjoys working with peers to share, empower, and entertain with live interactive sessions. Forty years of public speaking experience is reflected in the talks below. Crafted conference talks tuned to the organizer’s audience. The general theme for all the talks is to help people understand,
What Stops a Nation-State BGP Hijack?
Can Nation-State BGP Hijack Parts of the Internet? Yes, a Nation-State BGP Hijack is a threat on the Internet. Nation-States can orchestrate the manipulation of the Border Gateway Protocol (BGP) via “hacked routers all over the world. These routers would then be used to inject bad, misconfigured, or non-authorized routes all over the world. The result Read More
There are many Security Organizations in the world all working towards the goal of a more secure & resilient Internet. This is an ongoing list of known security organization. Security Groups 10 Years and Older Forum of Incident Response and Security Teams (FIRST) – FIRST is the Forum of Incident Response and Security Teams. The
5G Latency – Reality Checks
The industry is flooded with a lot of “5G will save the planet” without doing the homework to understand what is going on. It is shocking to see disinformation statements that “5G is expected to slash data transmission delays from about 30 milliseconds to less than one.” Yes! 5G defines the law of physics! 5G Read More
Tools for BGP Peering, Analysis, Troubleshooting & Monitoring
Tools to troubleshoot routing issues, monitor for BGP Hijacking, and alert when there are major routing issues are critical for any organization who connects to the Internet. This is a guide to help organizations pick tools that are useful. BGP Stream by BGPMON BGP Stream is a free resource for receiving alerts about hijacks,
BGP Hijack Presentations, Talks, & Tutorials
Fortunately, we will have a huge library of BGP Hijacking presentations, talks, & tutorials. Many of these talk about the routing risk and how to mitigate the risk from human mistakes. BGP Hijacking overview. Routing incidents prevention and defense mechanisms. (Updated) from NOCTION provides a good summary of all the materials list below from the various
BGP Hijacking Risks Research Papers and Projects
Research Papers and Projects Exploring BGP Hijacking & Routing Mistakes Risk The BGP Hijacking Risks profile attracts a wide academic interest. This interest attracts government and private research funding to explore new anti-BGP Hijacking tools, techniques, and resiliency approaches. This work is always worth reading, tracking, and exploring to see apply to real-world operations. Monitor,
CLDAP Reflection Attacks are Increasing! Why? Preventable!!!
Yes, CLDAP Reflection Attacks are increasingly used in DOS attacks! Everyone was warned! We have lots of data which illustrated how CLDAP is being used for reflection DOS attacks. Now we have the news from Netlab 360 that CLDAP is now the #3 protocol used for DOS reflection attacks – CLDAP is Now the No.3 Read More