Using Machine Learning to Detect IP Hijacking

This is interesting research: In a BGP hijack, a malicious actor convinces nearby networks that the best path to reach a specific IP address is through their network. That’s unfortunately not very hard to do, since BGP itself doesn’t have any security procedures for validating that a message is actually coming from the place it says it’s coming from. […]… Continue reading Using Machine Learning to Detect IP Hijacking

Researchers may have found a way to trace serial IP hijackers

Hijacking IP addresses is an increasingly popular form of cyberattack. This is done for a range of reasons, from sending spam and malware to stealing Bitcoin. It’s estimated that in 2017 alone, routing incidents such as IP hijacks affected more than 10… Continue reading Researchers may have found a way to trace serial IP hijackers

Learn About BGP With The Internet Of EvE

When we first saw [Ben Jojo’s] post about the Internet inside EvE Online, we didn’t think we’d be that interested. We don’t play EvE — a massively multiplayer game. But it turns out, the post is really about understanding BGP (Border Gateway Protocol) and how it helps route traffic in large networks. The best part? He actually simulates a network with 8,000 nodes to test out what he’s talking about.

Obviously, you wouldn’t want to fire up 8,000 Raspberry Pi computers for such an experiment. Using Buildroot, he set up a very small Linux image that had the bare minimum …read more

Continue reading Learn About BGP With The Internet Of EvE

BGP secure routing experiment ends in online row

An experiment to make the internet safer ended up breaking parts of it last week. Continue reading BGP secure routing experiment ends in online row

BGP secure routing experiment ends in online row

An experiment to make the internet safer ended up breaking parts of it last week. Continue reading BGP secure routing experiment ends in online row