June 9, 2015
Will SIDR Succeed Where the IRR Model Failed? (Part I)
This article is the first of a three-part series where I compare and contrast the IRR and SIDR security models as well as discuss how we can get close...
READ ARTICLE
May 27, 2015
Level 3’s SDN Analytics Comments Are Music to Our Ears
Level 3 Communications was in the news last week during Light Reading’s Carrier SDN Networks Conference. Reporting from the conference, (“Level 3:...
READ ARTICLE
April 15, 2015
Route Hijacking of Sensitive Network Traffic Highlights BGP Security Issues
Last month web traffic designated for some highly sensitive UK entities – including the nuclear weapons agency that provides and maintains warheads...
READ ARTICLE
April 7, 2015
All About That YANG at the 92nd IETF Meeting
I was at the 92nd IETF meeting in Dallas a few weeks ago. I attended 16 sessions, mostly in the routing area, and every single one had a discussion ab...
READ ARTICLE
March 17, 2015
Use Cases and Requirements for Service-Centric SDN Automation
Ever since we unveiled our SDN Platform at the Cisco Live event last May, we have been demonstrating it to many service providers, industry analysts,...
READ ARTICLE
November 11, 2014
The Best Presentations on SDN Analytics and Wide Area Orchestration at SDN/MPLS 2014
I attended the SDN/MPLS conference in Washington, D.C. last week, where I presented on the importance of analytics for WAN SDN application bandwidth s...
READ ARTICLE
September 9, 2014
How Route Analytics Help Detect BGP Route Hijacking
  Previously, I have talked about BGP route hijacking as a security threat and various techniques being developed to secure it. In this blog entry, I...
READ ARTICLE
August 12, 2014
Thwarting BGP Route Hijacking with SDN as a Catalyst
Following up on my last post about the security vulnerabilities in BGP, the IETF has taken two efforts to fix them. Back in 1995, the Routing Policy S...
READ ARTICLE
August 6, 2014
BGP Security Vulnerabilities a Growing Concern
Border Gateway Protocol (BGP), the protocol that connects different networks together, was not designed with security in mind. It is easy to take down...
READ ARTICLE
July 1, 2014
Hot Potatoes and Network Neutrality
If you are reading this blog, you probably know what I mean by hot potatoes. The routing in the Internet is often referred to as hot potato routing. T...
READ ARTICLE