RIPE Documents and Policy Proposals
Archived Content
Mailing List Archives

It appears that you are searching for a specific IP address, range or prefix, or an ASN. Search results appear below, but you can also search for this resource in the RIPE Database.

By pressing the "Search" button you explicitly express your agreement with the RIPE Database Terms and Conditions.

The RIPE Database allows Whois queries on Internet resources.

Can't find what you're looking for? Try quotation marks around search terms with multiple words, file names, or hyphenations. It can improve your search results.
Are you seeing too many obsolete RIPE Documents? Uncheck "Obsolete, Withdrawn, Accepted".

Search results from ripe.net

12 items matching your search terms
1
Every day the Internet experiences failures that affect the reachability of certain zones (i.e prefixes), such as cities, countries, etc. Whenever such ...
2
Large Distributed Denial-of-Service (DDoS) attacks pose a major threat not only to end systems but also to the Internet infrastructure as a whole. Remote ...
3
This is the second of two articles in which we present a new attack vector on the routing infrastructure of the Internet using BGP communities.
4
Since October 2014, we have been advertising two IPv4 /25s and two IPv4 /28s, to better understand how far they propagate across the network. In this article, ...
5
BGP routing table growth is one of the major Internet scaling issues, and prefix deaggregation is thought to be a major contributor to table growth. In this ...
6
This is the first of two articles in which we present a new attack vector on the routing infrastructure of the Internet using BGP communities.
7
Page - On RIPE Labs
There are many resources available to learn about Internet peering. But when it comes to de-peering, networkers are mostly left with their gut feeling.
8
In this article, we investigate the various relationships between MPLS tunnels and standard probing techniques (i.e., ping and traceroute). We investigate ...
9
BGP prefix hijacking is a persistent threat against Internet organisations, attributed to a lack of authorisation and authentication mechanisms in the ...
10
The number of Resource Certificates and ROAs is steadily growing, especially in the RIPE NCC service region. However, it remains unclear how widely BGP ...
12 items matching your search terms