Archive

Category Archives for "Networking"

In Macedonia, Strengthening IXP.mk’s Peering Infrastructure

The Internet Society has been supporting the development of the Internet in Macedonia by collaborating with the Faculty of Computer Science and Engineering (FCSE) of the Saints Cyril and Methodius University in Macedonia on its IXP.mk project. IXPs play a critical role in bringing faster and more affordable Internet, and the Macedonian IXP (IXP.mk) had been established in June 2018 with technical support from a number of stakeholders.

Switch and MUX to Strengthen Infrastructure

As traffic grew, IXP.mk needed to increase its peering capacity with improved switching capabilities and space for data racks that would allow it to attract new participants to the exchange. In 2020, the Internet Society provided IXP.mk with a switch and two Fiber Optic Multiplexers (Fiber Mux) that enabled an additional peering location to be established in the Telesmart Telekom data center, thereby making it easier for other major networks and Content Distribution Networks to peer with each other. The Fiber Muxes support the transmission of multiple data channels over a single fiber that has been donated by an existing member of IXP.mk.

Critical Service Provider

With a strong peering infrastructure, IXP.mk is now a critical service provider to Continue reading

Lessons Learned from Scaling Up Cloudflare’s Anomaly Detection Platform

Introduction to Anomaly Detection for Bot Management

Lessons Learned from Scaling Up Cloudflare’s Anomaly Detection Platform

Cloudflare’s Bot Management platform follows a “defense in depth” model. Although each layer of Bot Management has its own strengths and weaknesses, the combination of many different detection systems — including Machine Learning, rule-based heuristics, JavaScript challenges, and more — makes for a robust platform in which different detection systems compensate for each other’s weaknesses.

One of these systems is Anomaly Detection, a platform motivated by a simple idea: because bots are made to accomplish specific goals, such as credential stuffing or content scraping, they interact with websites in distinct and difficult-to-disguise ways. Over time, the actions of a bot are likely to differ from those of a real user. Anomaly detection aims to model the characteristics of legitimate user traffic as a healthy baseline. Then, when automated bot traffic is set against this baseline, the bots appear as outlying anomalies that can be targeted for mitigation.

An anomaly detection approach is:

  • Resilient against bots that try to circumvent protections by spoofing request metadata (e.g., user agents)
  • Able to catch previously unseen bots without being explicitly trained against them.

So, how well does this work?

Today, Anomaly Detection processes more than Continue reading

Cisco bumps up its silicon speed to 25.6Tbps

Cisco continues to crank up the speed of its webscaler-class Silicon One devices, this week adding three new devices—including 25.6Tbps switching silicon it says delivers  1.7 times higher bandwidth and three times higher packets-per-second than other silicon on the market.Cisco unveiled the Silicon One family of unified switches and routers in 2019 as part of what it called its “Internet for the Future”  strategy.  The Silicon One family is important as Cisco has designs on being a leading provider of the network underpinnings of large webscale and service provider networks. The family can also help Cisco compete effectively with others such as Intel, Broadcom, Juniper, Arista.To read this article in full, please click here

Cisco bumps up its silicon speed to 25.6Tbps

Cisco continues to crank up the speed of its webscaler-class Silicon One devices, this week adding three new devices—including 25.6Tbps switching silicon it says delivers  1.7 times higher bandwidth and three times higher packets-per-second than other silicon on the market.Cisco unveiled the Silicon One family of unified switches and routers in 2019 as part of what it called its “Internet for the Future”  strategy.  The Silicon One family is important as Cisco has designs on being a leading provider of the network underpinnings of large webscale and service provider networks. The family can also help Cisco compete effectively with others such as Intel, Broadcom, Juniper, Arista.To read this article in full, please click here

Video: Cisco SD-WAN Routing Design

After reviewing Cisco SD-WAN policies, it’s time to dig into the routing design. In this section, David Penaloza enumerated several possible topologies, types of transport, their advantages and drawbacks, considerations for tunnel count and regional presence, and what you should consider beforehand when designing the solution from the control plane’s perspective.

You need Free ipSpace.net Subscription to watch the video.

Video: Cisco SD-WAN Routing Design

After reviewing Cisco SD-WAN policies, it’s time to dig into the routing design. In this section, David Penaloza enumerated several possible topologies, types of transport, their advantages and drawbacks, considerations for tunnel count and regional presence, and what you should consider beforehand when designing the solution from the control plane’s perspective.

You need Free ipSpace.net Subscription to watch the video.

Top enterprise data center trends you need to know

Data-center networking was already changing prior to the technology challenges brought on by the COVID-19 pandemic, and few areas of the enterprise will continue to be affected more than data centers by those modifications in the future.That’s because myriad technologies are driving changes in the data center—everything from heavy demand for higher-speed networking, support for a remote workforce, increased security, tighter management and perhaps the biggest alteration—the prolific growth of cloud services.To read this article in full, please click here

Top enterprise data center trends you need to know

Data-center networking was already changing prior to the technology challenges brought on by the COVID-19 pandemic, and few areas of the enterprise will continue to be affected more than data centers by those modifications in the future.That’s because myriad technologies are driving changes in the data center—everything from heavy demand for higher-speed networking, support for a remote workforce, increased security, tighter management and perhaps the biggest alteration—the prolific growth of cloud services.To read this article in full, please click here

Top enterprise data center trends you need to know

Data-center networking was already changing prior to the technology challenges brought on by the COVID-19 pandemic, and few areas of the enterprise will continue to be affected more than data centers by those modifications in the future.That’s because myriad technologies are driving changes in the data center—everything from heavy demand for higher-speed networking, support for a remote workforce, increased security, tighter management and perhaps the biggest alteration—the prolific growth of cloud services.To read this article in full, please click here

How to Improve Employee Morale

We are going through a situation that is unprecedented and heart-breaking. There are so many emotions attached to the situation right now that if you started naming them one by one, it would take you a significant amount of time. The world is crumbling apart, and the worst part is that most people have to work to provide for their families. It doesn’t matter if they are working from home or the office, anxieties and stress are increasing and you can do nothing about it.

The work is increasing, the health situation is deteriorating, and there is too much uncertainty. Which is why companies, like ours, are working to promote ways in which you can help boost your employee’s morale.

When you ask the question, “How to Improve Employee Morale”, we make sure that we provide you with the exact results which can help you. You can also visit our website to see the many products available to you.

Here are just a couple of ways in which you can boost your employee’s morale.

Be Transparent

What your employees need more than anything in the world right now is transparency. They need to know what is going on and what Continue reading

The Tech Recruiter – Friend Or Foe? – Video

Our Day Two Cloud podcast guest is Taylor Desseyn, Sr. Recruiter Advocate at Vaco. Taylor knows tech recruiting forwards and backwards. He gives us an insider’s view of how recruiters look at you and how you should look at them to maximize the benefit of the relationship. Because it IS a relationship. And like any […]

The post The Tech Recruiter – Friend Or Foe? – Video appeared first on Packet Pushers.

The Hedge #74: Brian Keys and the Complexity of User Interfaces

Crossing from the domain of test pilots to the domain of network engineering might seem like a large leap indeed—but user interfaces and their tradeoffs are common across physical and virtual spaces. Brian Keys, Eyvonne Sharp, Tom Ammon, and Russ White as we start with user interfaces and move into a wider discussion around attitudes and beliefs in the network engineering world.

download

Linkerd Goes on a Diet with Opt-In Extensions

Buoyant has released version 2.10 of William Morgan, CEO of Linkerd, in an interview. “An extension is basically a Kubernetes controller or operator. We’re relying as much as possible on Kubernetes primitives, but what we are doing is, there’s a little bit of wrapper magic that happens that makes those extensions feel like the rest of Linkerd.” Among those formerly-default features now being offered as extensions are the multicluster extension, which contains cross-cluster communications tools, the

Deconstructing Defray777 Ransomware

Contributors: Sebastiano Mariani • Stefano Ortolani • Baibhav Singh • Giovanni Vigna • Jason Zhang • Brian Baskin • George Allen • Scott Knight  

Recently, reports surfaced describing ransomware attacks targeting VMware ESXi servers. While many of these attacks were initially based upon credential theft, the goal was to unleash one of a series of ransomware families, including Defray777 and Darkside, to encrypt the files associated with virtualized hosts.

These families of ransomware are related to examples that the VMware Threat Research teams had seen previously in the wild. Specifically, based upon their ransom notes and file extensions, they appeared to be variants of the RansomEXX ransomware family. In the second half of 2020 these variants of ransomware, including Defray777, have been witnessed targeting both Windows and Linux systems.

These attacks also leveraged several ancillary tools such as downloaders, RATs, and exploitation tools to obtain initial access to a system and spread within the target network.

In the following, we provide a technical description of the Defray777 ransomware and a brief discussion of the other components that have been observed in combination with this malware sample.

What is Defray777?

The version of Defray777 analyzed here is a Linux-based, command-line driven ransomware attack that employs Continue reading