BGP Hijack Presentations, Talks, & Tutorials

Fortunately, we will have a huge library of BGP Hijacking presentations, talks, & tutorials. Many of these talk about the routing risk and how to mitigate the risk from human mistakes.  BGP Hijacking overview. Routing incidents prevention and defense mechanisms. (Updated) from NOCTION provides a good summary of all the materials list below from the various

BGP Hijacking Risks Research Papers and Projects

Research Papers and Projects Exploring BGP Hijacking & Routing Mistakes Risk The BGP Hijacking Risks profile attracts a wide academic interest. This interest attracts government and private research funding to explore new anti-BGP Hijacking tools, techniques, and resiliency approaches. This work is always worth reading, tracking, and exploring to see apply to real-world operations. Monitor,

Operator’s Security Toolkit

It is time for a refresh of the SP Security materials used by many over the years. Back in 2002, several people in the emerging “Service Provider Security” field pulled together a list of top practices every Operator should deploy. These “NSP-SEC Top 10” techniques became the foundation of our toolkit that is used daily

Is “Transparent” Web Caching Dead?

Over the last few months, I’ve been re-exam the value of web caches in a network architecture. Peers have asked me to write up the results. What follows are the results. The are provided to help operators not get pushed by vendors to make costly mistakes. “Web Caching” has been an effective and productive tool Read More

Does the Internet “End” at 500K routes?

No! Of course, the Internet does not end at 500K routes. On August 13, 2014, there was a lot of “news” about instability issues on the Internet that might have been caused by a surge of new Internet routes (see articles like “Internet routers hitting 512K limit, some become unreliable” – http://arstechnica.com/security/2014/08/internet-routers-hitting-512k-limit-some-become-unreliable/). The most accurate write Read More