As RPKI is becoming part of ISPs’ daily operations and Route Origin Validation is getting widely deployed, one wonders how long it takes for the effect of RPKI changes to appear in the data plane. Does an operator that adds, fixes, or removes a Route Origin Autho- rization (ROA) have time to brew coffee or rather enjoy a long meal before the Internet routing infrastructure integrates the new...
In this presentation, we focus on BGP security using the Code BGP platform. We start with an introduction to the various types of BGP hijacks and route leaks and the challenges related to detecting BGP anomalies. We explain how the Code BGP Platform leverages multiple data sources and GraphQL subscriptions to detect BGP events of interest. We present two exact prefix hijack events against root...
After 3 weeks of complex Investigation, an apparently ordinary IT problem will suddenly shake the Incident Response Team with one of its members directly targeted by a Criminal Organization.
A real Cyber Attack was narrated from the eyes of the Incident Handler to show the CSIRT reaction in case of an out-of-the-playbook Incident.
Why DFIR and OSINT should be essential parts of any mature...
In this talk we will discuss a number of solutions for DDOS mitigation. This will be a technical presentation. We will discuss traditional ACL's, Blackhole routing, uRPF, RTBH, how to leverage BGP to deploy a protective shield, and a community based solution that leverages RTBH at global scale. In addition we will discuss the importance of BCP 38 and RPKI signing of routes to further...
There are many legal and regulatory obligations on South African ISPs, from complying with ICASA's licensee reporting requirements to registering with the Film and Publication Board. This presentation looks at some of the current obligations and their impact on ISPs as well as investigating how network operators should be planning for future compliance requirements.
This presentation discuss the necessary evolution of the Edge and Central Data Center transport network designs and architectures to comply with the increased requirements in 5G networks.
This paper summarizes the current state-of-the-art in how submarine cable transmission technologies are evolving to support even more capacity over longer distances, not only as the content providers dominate the space, but also as older cables run out of capacity and need to be replaced with new systems.
A review of the usage of layer-2 in modern networks - the good, the bad, and the ugly. How to make layer-2 network more secure and robust.
A review of the usage of layer-2 in modern networks - the good, the bad, and the ugly. How to make layer-2 network more secure and robust.
This is the final slides to the draft submitted earlier.