-
Automating the protection of a network from denial of service with RTBH, NetFlow, goBGP and FastNetMon
In this article, I will introduce Remotely-Triggered Black Hole (RTBH), a technology based on the Border Gateway Protocol (BGP) routing protocol and designed to provide the ability to block unwanted network traffic in order to …
Read More -
Implementing application filtering with nftables and Suricata on Debian
05/02/2023 (updated on 05/10/2024) · 14 min read · cybersecurity networking firewall applicationfiltering nftables suricata debian ·In this article, I invite you to discover or rediscover application filtering, with some help to set up application filtering with a netfilter firewall using the nftables utility and the Suricata tool on the Debian GNU/Linux …
Read More -
flyingroutes: a faster alternative to traceroute
16/12/2022 (updated on 13/09/2024) · 12 min read · cybersecurity networking flyingroutes traceroute ·In this article, I introduce a network diagnostic tool I developed: flyingroutes. The goal is to provide an efficient way to determine the nodes located on a network communication path through a faster alternative to the …
Read More -
In this article, I will dissect the concept of Virtual Private Network (VPN) using the Internet Protocol security (IPsec) protocol. The goal is to help you better understand the various steps involved in setting up an IPsec …
Read More -
In this article, I introduce a network authentication protocol, namely Tunnel Extensible Authentication Protocol (TEAP), a method that allows multiple authentication mechanisms within a secure tunnel. The principle is to be able …
Read More