Resources News
Paper Accepted
Investigating the Nature of Routing Anomalies
Our paper has been accepted for publication by the 7th International Workshop on Traffic Monitoring and Analysis. We conducted a study on subprefix hijacking attacks in an effort to reduce false alarms commonly raised by state-of-the-art detection systems.
Paper Accepted
The Abandoned Side of the Internet
Our paper has been accepted for publication by the 7th International Workshop on Traffic Monitoring and Analysis. We contributed an evaluation of the the abandoned side of the Internet, in which attackers can hijack and abuse dormant networks in full anonymity.
Announcement
We are hiring!
As an expanding technology company we are looking for new employees to add to our team. To complement our crew, we are currently seeking expert network engineers with advanced programming skills. Contact us if you are interested.
Paper Accepted
Malicious BGP hijacks can be deceiving
Our paper has been accepted for publication by the IEEE International Conference on Communications. In our practical study, we show that suspicious routing events not always evidence real hijacking incidents.
Paper Accepted
A Forensic Case Study on AS Hijacking
Our paper has been accepted for publication by the ACM SIGCOMM Computer Communication Review. We thoroughly studied a malicious AS hijacking incident to gain unique insight into the attacker's proceeding.