Great Hopes and some concerns at the African Internet Summit (AIS)

Earlier this month, the African Internet community gathered in Dakar, Senegal for the Africa Internet Summit (AIS). The event highlighted some of the great hopes, as well as some of the concerns, that the African Internet community has for the future.

I had the personal honor of speaking at the Opening of the AFNOG meeting where I talked about what the Internet has brought to Africa and the promise that it still holds. I highlighted how Africa has experienced tremendous growth in Internet access and usage over the past few years, and how enormous development opportunities have been opened up for its young population. Believing that we need to put people at the center of our decision-making and build an Internet where everyone’s voice counts, I encouraged the Internet community in Africa to continue to embrace diversity, inclusion, and equality in order to shape an Internet that best serves the billions of people who use it every day, now and into the future.

In many ways, AIS is a showcase for the progress that is being made in creating an Internet for everyone. Key groups are making sure that their voices are being heard.

For example, at a Women in Continue reading

This Week in Internet News: AI Diagnoses Skin Cancer Better than Doctors

AI plays doctor: Artificial intelligence can detect skin cancer better than dermatologists, according to a new international study. Flesh-and-blood dermatologists in the study accurately detected 86.6 percent of skin cancers from images, compared to 95 percent for a deep learning convolutional neural network, reports Agence France Presse. Still, there’s no substitute for a thorough clinical examination, the researchers said in a Mirror.co.uk story.

AI can teach, too: Many schools in China are now testing AI as a way to grade homework, reports the South China Morning Post. AI is being used to grade essays, and it recommends improvements in writing style and structure.

AI vs. Internet trolls: AI can even predict when an Internet fight is about to break out, says Bigthink.com. Apparently, one way to predict an online fight is about to happen is when a commenter begins to let the accusations fly by using the word “you.”

Hackers target routers: It’s those Russian hackers again, and they’re after your router. The Russian Sofancy group is among the foreign cyber actors who “have compromised hundreds of thousands of home and office routers and other networked devices,” the FBI warned. One way to limit the attack Continue reading

Cato Networks adds threat hunting to its Network as a Service

Enterprises that have grown comfortable with Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (IaaS) are increasingly accepting of Network as a Service (NaaS). NaaS is a rapidly growing market. According to Market Research Future, NaaS is expected to become a US $126 billion market by 2022, sustaining an annual growth rate of 28.4 percent.One of the key benefits of cloud-based networking is increased security for applications and data. Given that the traditional perimeter of on-premise networks has been decimated by mobile and cloud computing, NaaS builds a new perimeter in the cloud. Now it’s possible to unify all traffic – from data centers, branch locations, mobile users, and cloud platforms – in the cloud. This means an enterprise can set all its security policies in one place, and it can push traffic through cloud-based security functions such as next-generation firewall, secure web gateway, advanced threat protection, and so on.To read this article in full, please click here

Cato Networks adds threat hunting to its Network as a Service

Enterprises that have grown comfortable with Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (IaaS) are increasingly accepting of Network as a Service (NaaS). NaaS is a rapidly growing market. According to Market Research Future, NaaS is expected to become a US $126 billion market by 2022, sustaining an annual growth rate of 28.4 percent.One of the key benefits of cloud-based networking is increased security for applications and data. Given that the traditional perimeter of on-premise networks has been decimated by mobile and cloud computing, NaaS builds a new perimeter in the cloud. Now it’s possible to unify all traffic – from data centers, branch locations, mobile users, and cloud platforms – in the cloud. This means an enterprise can set all its security policies in one place, and it can push traffic through cloud-based security functions such as next-generation firewall, secure web gateway, advanced threat protection, and so on.To read this article in full, please click here

REVIEW: 6 enterprise-scale IoT platforms

There's little need to tell anyone in IT that the Internet of Things (IoT) is a big deal and that it's growing insanely fast; BI Intelligence estimates that there will be some 23.3 billion IoT devices by 2019. As IoT support becomes more of an enterprise concern, there are four key issues about enterprise IoT (EIoT) deployments to consider: The sheer number of enterprise IoT endpoint devices – There will be 1 billion by 2019. The frequency of data generated IoT devices – IDC estimates that by 2025, an average connected person anywhere in the world will interact with connected devices nearly 4,800 times per day or one interaction every 18 seconds. The incredible volume of IoT data – Of the 163 zettabytes (that's 1021bytes) of data that will be created in 2025, IDC estimates that 60% will be from IoT endpoints and half of that (roughly 49 zettabytes) will be stored in enterprise data centers. The challenges of maintaining security for your device constellation – IDC estimates that by 2025, 45% of the stored enterprise data will be sensitive enough to require being secured but will not be. [ For more on IoT see tips for securing IoT Continue reading

Securing with NSX – Beyond the DevSecOps Paradigm

There are two digital explosions simultaneously happening in enterprises across all verticals. Enterprises are moving at a breakneck speed on every aspect of their business. From managing their supply-chain, making purchasing decisions, targeted marketing campaign to users, creating apps to connect with users and making it easier for users to consume their products.

The good news is technology is keeping pace and is a step ahead in helping the business achieve their goals. These business imperatives are forcing software iterations to be faster and be more efficient. This is leading to newer innovative models around people/processes/tools that we collectively call Continuous Integration(CI)/Continuous Development (CD). Teams leading the charge on CI/CD models are working in a “DevOps” model. 

The second explosion is related to the first explosion. As complex software become easy-to-use and be ubiquitous, sophisticated tools can be used to attack enterprises. Managing Security is getting harder. Last decade – there was a belief – I am not going to be attacked. Fast forward today – enterprises expect to be attacked and breached. This is not just a baseless impression. Forrester’s 2018 survey shows that 66% of survey respondents have faced a major security incident. 

 

 ”It’s kind Continue reading

Is EBGP Really Better than OSPF in Leaf-and-Spine Fabrics?

Using EBGP instead of an IGP (OSPF or IS-IS) in leaf-and-spine data center fabrics is becoming a best practice (read: thing to do when you have no clue what you’re doing).

The usual argument defending this design choice is “BGP scales better than OSPF or IS-IS”. That’s usually true (see also: Internet), and so far, EBGP is the only reasonable choice in very large leaf-and-spine fabrics… but does it really scale better than a link-state IGP in smaller fabrics?

Read more ...

Hyperledger fabric: a distributed operating system for permissioned blockchains

Hyperledger fabric: a distributed operating system for permissioned blockchains Androulaki et al., EuroSys’18

(If you don’t have ACM Digital Library access, the paper can be accessed either by following the link above directly from The Morning Paper blog site).

This very well written paper outlines the design of HyperLedger Fabric and the rationales for many of the key design decisions. It’s a great introduction and overview. Fabric is a permissioned blockchain system with the following key features:

  • A modular design allows many components to be pluggable, including the consensus algorithm
  • Instead of the order-execute architecture used by virtually all existing blockchain systems, Fabric uses an execute-order-validate paradigm which enables a combination of passive and active replication. (We’ll be getting into this in much more detail shortly).
  • Smart contracts can be written in any language.

…in popular deployment configurations, Fabric achieves throughput of more than 3500 tps, achieving finality with latency of a few hundred ms and scaling well to over 100 peers.

Examples of use cases powered by Fabric include foreign exchange netting in which a blockchain is used to resolve trades that aren’t settling; enterprise asset management tracking hardware assets as they move from manufacturing to Continue reading

SINOG 5: IPv6, DNS Privacy and IoT Security

There will be significant Internet Society involvement at SINOG 5 next week, which is being co-organised by our colleague Jan Žorž, supported by ISOC, and will feature talks on NAT64Check and the Online Trust Alliance. SINOG is the Slovenian Network Operators Group, and the meeting is held on 7-8 June 2018 at the Biotehniška Fakulteta in Ljubljana, Slovenia.

It’s well worth coming for the keynote alone, which will be given by Ron Broersma (DREN) – one of the earliest Internet pioneers who operated Node #3 of ARPANET. He’ll be talking about IPv6, the Cloud, and a bit of Internet history, and as he was involved in the NCP-to-TCP/IP migration back in 1983, there are perhaps some lessons to be learned in migrating from IPv4-to-IPv6.

Following-on from this will be how IPv6 was implemented at IBM from Andy Mindnich (IBM), a discussion on the issues of CGN and IPv6 from a law enforcement perspective from Sara Marcolla (Europol), some of which we touched upon in a previous blog, and then an update on version 2 of the NAT64Check portal from Sander Steffann. NAT64Check is a tool allowing you to enter the URL of a particular website and run tests over IPv4, IPv6 and NAT64, and Continue reading

Oxidized Gitlab Storage Backend

In a previous post I installed and configured Oxidized using the local file system for storage. In this post I will configure Oxidized to use Gitlab community edition as a storage backend. For reference the following software will be used in this post. Oxidized - 0.21.0 Oxidized...

Payments with less of the evil

Payments with less of the evil

I hate card networks.

Visa and MasterCard are a pair of companies that I feel definitely make the world a worse place to live in, due to the fact that they sit in front of a critical part of how modern society wo

Troubleshoot like a pro with tcpdump

When it comes to troubleshooting, everyone talks about the power of the command tcpdump — after all, “the wire never lies.” But to really use it, you need to put in some time to understand the options. Let us save you some time and give you a quick overview of this powerful tool. You’ll be troubleshooting like a pro in no time!

What is tcpdump and why does it matter?

For those unfamiliar with this powerful command, tcpdump is a packet analyzer that prints out a description of packets being transmitted or received over a network. Each line of output represents a packet. Every line includes a time stamp printed as hours, minutes, seconds, and fractions of a second since midnight. It will also show you packets dropped, packets received by the filter (which can vary depending on your OS) and packets dropped by kernel. Essentially, tcpdump does exactly what its name implies — it “dumps” all the information you need about the content of packets in the CLI so you can analyze it for yourself.

So, why is this so important for troubleshooting? Think of it this way. When box isn’t acting right, seeing what you are getting Continue reading

First Python App-Read and Configure Cisco Devices -Test Enviornment GNS

It’s first version of python app where we have number of devices loopback0 ip address stored in device.txt file.Program will read the file ,fatch  loopback0 address and ssh into the respective device.

Program will  push the command “sh ip int brief”   in second step and  display output on screen .We have taken example of 3 devices to test the code.If there are more number of devices ,just need to add the loopback0 of additional device in device.txt file

Python code is written to  configure the loopback10 with IP addresss into each respective devices (mentioned in devices.txt file)  by reading the required device config file stored as respective device Loopback0.txt file.( if need to add more configuration ,just need to add the config in that respective device loopback0.txt file.)

I have used GNS environment  to test the python program.

topology

 

We have Used Netmiko Library to access cisco devices to get the required output and also configure the device

import_netmiko.PNG

Below are the functions defined in Python code :

  • Function get_devices_info() will read the file and get the device loopback0 detailsget_devices_info.PNG
  •  Function connect() will connect the devices using ssh (ConnectHandler used from library Netmiko)connect.PNG
  • Continue reading

Oxidized Getting Started

Oxidized is a network device configuration backup tool which was developed to be a replacement for Rancid. Oxidized is written in Ruby and is quite extensible, at the time of writing it supports collection of configuration for over 90 network operating system types. In this post I will...