<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base="https://drupalinl.info.ucl.ac.be" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
 <title>INL: IP Networking Lab - Security</title>
 <link>https://drupalinl.info.ucl.ac.be/taxonomy/term/59/0</link>
 <description></description>
 <language>en</language>
<item>
 <title>Securing BGP</title>
 <link>https://drupalinl.info.ucl.ac.be/blogs/11-03-10-securing-bgp</link>
 <description>&lt;p&gt;BGP is one of the key protocols that are used on the Internet today. Despite of its importance, the security of BGP is still a concern. Several solutions to improve the security of BGP have been proposed by the research community :&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://www.ir.bbn.com/sbgp/&quot;&gt;Secure BGP Project&lt;/a&gt;
&lt;li&gt;&lt;a href=&quot;http://portal.acm.org/citation.cfm?id=1266980&quot;&gt;pretty secure BGP&lt;/a&gt;
&lt;li&gt;&lt;a href=&quot;http://portal.acm.org/citation.cfm?id=1251185&quot;&gt;Listen and whisper&lt;/a&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&quot;https://drupalinl.info.ucl.ac.be/blogs/11-03-10-securing-bgp&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <category domain="https://drupalinl.info.ucl.ac.be/category/visibility/public">Public</category>
 <category domain="https://drupalinl.info.ucl.ac.be/keywords/bgp">BGP</category>
 <category domain="https://drupalinl.info.ucl.ac.be/keywords/security">Security</category>
 <pubDate>Thu, 10 Mar 2011 12:10:42 +0000</pubDate>
 <dc:creator>obo</dc:creator>
 <guid isPermaLink="false">785 at https://drupalinl.info.ucl.ac.be</guid>
</item>
<item>
 <title>TCP crypt</title>
 <link>https://drupalinl.info.ucl.ac.be/blogs/11-03-10-tcp-crypt</link>
 <description>&lt;p&gt;Despite its respectable age (the first specification was published in September 1981), TCP is still alive and researches and IETFers continue to develop new extensions to improve the protocol. &lt;a href=&quot;/mptcp&quot;&gt;Multipath TCP&lt;/a&gt; received a lot of attention during the last years. Another TCP extension to improve the security of TCP has been submitted for the next IETF meeting. &lt;a href=&quot;http://tools.ietf.org/html/draft-bittau-tcp-crypt-00.html&quot;&gt;TCP crypt&lt;/a&gt; aims at improving the security of TCP by allowing the utilisation of crypto mechanisms to protect the TCP segments.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://drupalinl.info.ucl.ac.be/blogs/11-03-10-tcp-crypt&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <category domain="https://drupalinl.info.ucl.ac.be/category/visibility/public">Public</category>
 <category domain="https://drupalinl.info.ucl.ac.be/keywords/security">Security</category>
 <category domain="https://drupalinl.info.ucl.ac.be/keywords/tcp">TCP</category>
 <pubDate>Thu, 10 Mar 2011 12:03:13 +0000</pubDate>
 <dc:creator>obo</dc:creator>
 <guid isPermaLink="false">784 at https://drupalinl.info.ucl.ac.be</guid>
</item>
<item>
 <title>Hijacking FON user&#039;s Facebook &amp; Twitter sessions using firesheep</title>
 <link>https://drupalinl.info.ucl.ac.be/fon-firesheep</link>
 <description>&lt;p&gt;In the following video, we show that it is easy (i.e. anybody can do it) to hijack FON user&#039;s sessions (i.e. access his Facebook, Twitter,... accounts) using a simple Firefox extension. You simply have to be connected on the same access point, which is an open access point in the case of FON and most hotspots.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://drupalinl.info.ucl.ac.be/fon-firesheep&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <comments>https://drupalinl.info.ucl.ac.be/fon-firesheep#comments</comments>
 <category domain="https://drupalinl.info.ucl.ac.be/category/visibility/public">Public</category>
 <category domain="https://drupalinl.info.ucl.ac.be/keywords/fon">FON</category>
 <category domain="https://drupalinl.info.ucl.ac.be/keywords/security">Security</category>
 <pubDate>Tue, 14 Dec 2010 15:42:34 +0000</pubDate>
 <dc:creator>dleroy</dc:creator>
 <guid isPermaLink="false">768 at https://drupalinl.info.ucl.ac.be</guid>
</item>
<item>
 <title>A Survey on Network Coordinates Systems, Design, and Security</title>
 <link>https://drupalinl.info.ucl.ac.be/publications/survey-network-coordinates-systems-design-and-security</link>
 <description>&lt;p&gt;During the last decade, a new class of large-scale globally-distributed network services and applications have emerged.  Those systems are flexible in the sense that they can select their communication path among a set of available ones.  However, ceaselessly gathering network information such as latency to select a path is infeasible due to the large amount of measurement traffic it would generate.  To overcome this issue, Network Coordinates Systems (NCS) have been proposed.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://drupalinl.info.ucl.ac.be/publications/survey-network-coordinates-systems-design-and-security&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <category domain="https://drupalinl.info.ucl.ac.be/category/visibility/public">Public</category>
 <category domain="https://drupalinl.info.ucl.ac.be/keywords/measurements">measurements</category>
 <category domain="https://drupalinl.info.ucl.ac.be/keywords/network-coordinate-systems">network coordinate systems</category>
 <category domain="https://drupalinl.info.ucl.ac.be/keywords/security">Security</category>
 <category domain="https://drupalinl.info.ucl.ac.be/keywords/survey">survey</category>
 <pubDate>Tue, 02 Jun 2009 10:00:35 +0000</pubDate>
 <dc:creator>donnet</dc:creator>
 <guid isPermaLink="false">585 at https://drupalinl.info.ucl.ac.be</guid>
</item>
<item>
 <title>LAN Switch Security : What hackers know about your switches</title>
 <link>https://drupalinl.info.ucl.ac.be/blogs/08-03-26-lan-switch-security-what-hackers-know-about-your-switches</link>
 <description>&lt;p&gt;Ethernet is now the default fixed Local Area Network technology. Ethernet LANs are found in all entreprise environments and in more and more home networks. Ethernet was designed in the 1970s when security was not a concern. Since then, Ethernet has evolved with the introduction of hubs and switches. Many network administrators are aware that hubs are a security concern since they broadcast Ethernet frames and some of them assume that switches or more secure.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://drupalinl.info.ucl.ac.be/blogs/08-03-26-lan-switch-security-what-hackers-know-about-your-switches&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <comments>https://drupalinl.info.ucl.ac.be/blogs/08-03-26-lan-switch-security-what-hackers-know-about-your-switches#comments</comments>
 <category domain="https://drupalinl.info.ucl.ac.be/category/visibility/public">Public</category>
 <category domain="https://drupalinl.info.ucl.ac.be/keywords/book">Book</category>
 <category domain="https://drupalinl.info.ucl.ac.be/keywords/ethernet">Ethernet</category>
 <category domain="https://drupalinl.info.ucl.ac.be/keywords/security">Security</category>
 <pubDate>Wed, 26 Mar 2008 18:48:07 +0000</pubDate>
 <dc:creator>obo</dc:creator>
 <guid isPermaLink="false">443 at https://drupalinl.info.ucl.ac.be</guid>
</item>
</channel>
</rss>
