In recent years, the concepts of Artificial Intelligence (AI) and Machine Learning (ML) have moved from the academic realm to the forefront of many industries. The networking world, in particular, has started to explore ways to harness these...


In recent years, the concepts of Artificial Intelligence (AI) and Machine Learning (ML) have moved from the academic realm to the forefront of many industries. The networking world, in particular, has started to explore ways to harness these...
The Resource Public Key Infrastructure (RPKI) system is a way to couple an IP address range to an autonomous system number through cryptographic signatures,...
Previously, we’ve already looked at traffic engineering in general and AS path prepending in particular. Traffic engineering is distributing the traffic load...
On the 25th of November 2019, RIPE NCC made the final /22 IPv4 allocation from the last remaining addresses in the available pool and has officially run out...
When you’re managing a network, there’s so much to think about — from monitoring bandwidth, discovering traffic patterns to performing threat analysis and...
Usage-based billing enables customers to pay only for data that they have used. In order to charge customers based on data usage, a company must have a good...
When it comes to major security concerns, one of the most serious ones are the data breaches and security exploits caused by insider incidents. According to...
With the increasing popularity of multicast media applications, the monitoring of multicast traffic becomes more and more important. When it comes to NetFlow,...
Role of RTT and OWD for TCP RTT stands for Round Trip Time and it is a length of time that a packet takes from point A to point B plus the length of the time...
In traditional methods for DDoS mitigation, such as RTBH (remotely triggered blackhole), a BGP route is injected, advertising the IP address of the server...
Network visibility is crucial because we cannot manage and secure what we cannot see. NetFlow plays a critical role in traffic visibility by helping network...
Border Gateway Protocol (BGP) is a core routing protocol used by most of the Internet Service Providers (ISPs). BGP’s role is to exchange routing and...
This article gives some insights on how to set up a network traffic analysis and alerting system based on NetFlow. NetFlow is an advanced and widely used...
Software-Defined Networking (SDN) in a Wide Area Network (WAN) - SD-WAN is a technology that simplifies management of WAN by decoupling control plane from the...
On August 8th, 2014 some ISPs experienced a phenomenon called the “512k Day”. The global BGP routing table, which consists of the global Internet routes and...
Bring Your Own Device (BYOD) is a practice that allows users to bring their personal devices such as tablets or smartphones to the workplace and use them to...
So far, we have discussed NetFlow configuration for network devices from various vendors such as Cisco, Juniper, Huawei, VyOS. We have collected layer 3 and 4...
Our previous article discusses flow-based SSH compromise detection. A force attack against SSH hosts consists of scan, brute-force and compromise phases that...
Secure Shell (SSH) provides a secure channel over an unsecured network in a client-server model. SSH is typically used to log into a remote machine and...
