|Wednesday 8 April 2009||Tutorials|
Title: TUTORIAL: ISP Security
Author: Merike Kaeo (Doubleshot Security)
Abstract: Understanding security threats and implementing effective security measures are key factors in ensuring network infrastructure reliability and integrity. This tutorial will detail securing both IPv4 and IPv6 network infrastructures and discuss best current practices for addressing many security risks. Specific attention will be given to securing network infrastructure devices, common filtering practices, effective logging practices, routing protocol security issues, and mechanisms to mitigate damage from Distributed Denial of Service (DDoS) attacks.
Material: Security Workshop (PDF 2.6 MB)
Title: TUTORIAL: Introduction to ISIS
Author:Philip Smith (Cisco)
Abstract:This tutorial introduces the ISIS routing protocol, briefly compares it with OSPF, and shows how to deploy ISIS in an environment supporting both IPv4 and IPv6. Finally it explains some of the typical configuration options used by ISPs.
Material: ISIS Tutorial (PDF 552 KB)
|Wednesday 8 April 2009||Conferences|
Title: IXPs in Europe and the Business Case for Peering
Author:Kurtis Lindqvist (NetNod)
Material: IXPs in Europe and the Business Case for Peering (PDF 1.3 MB)
Title: Network Operations Groups around the World
Author: Philip Smith (MENOG Coordination Team)
Abstract: Presentation briefly introduces each regional NOG and touches on some of the more successful country NOGs. Aim is to explain their purpose, their activities, and the benefits they bring to their communities.
Material: Network Operations Groups (PDF 2.9 MB)
Title: Internet location-based services
Speaker: Richard Barnes (BBN Technologies)
Abstract: Location-based services (LBS) are clearly a growing area of interest for consumers and application providers, The LBS marketplace is currently dominated by proprietary solutions. The IETF has been working on a standard framework for network-based or -assisted positioning and for location-based services. This framework has relevance to ISPs for two reasons: First, Internet LBS communications will be happening over their networks, and second, network-based location services (actually providing location information, as opposed to LBS) are a new suite of services that ISPs can provide their customers. The proposed presentation would review the current state of the art in LBS, the IETF framework for location and privacy, and the relevance of this whole scene to ISPs in the MENA region.
Material: Internet Geolocation and Location-Based Services (PDF 476 KB)
Title: DNS Cache Poisoning – Looking at CERT VU#800113
Author: Nadhem AlFardan (Cisco Systems)
Abstract: DNS cache poisoning is not a new concept. In fact, multiple deficiencies have been identified earlier. This tutorial covers the latest and one of the most severe DNS vulnerabilities that have been disclosed in the year 2008, where an unauthenticated, remote attacker could exploit such a vulnerability to conduct DNS cache poisoning attacks. Such an attack may result in the modification of stored DNS entries, possibly allowing the attacker to conduct further attacks against systems that rely on the affected DNS server. This presentation illustrates how such an exploit has been conducted and the required protection controls.
Material: Looking at CERT VU (PDF 3.7MB)
Title: Signing the DNS root
Author: Lars-Johan Liman (NetNod)
Speaker: Kurt Erik Lindqvist (NetNod)
Abstract: This presentation gives an overview of what it means to DNSSEC sign the root zone, as well as a quick overview of the different alternatives as presented in the NTIA call for comments paper.
Material: Signing the DNS Root (PDF 1.7 MB)
Title: ICANN DNS Operations Update
Speaker: Mehmet Akcin (ICANN)
Abstract: The presentation describes IANA’s DNSSEC efforts and recent state of affairs regarding signing the root and other domains IANA is responsible for and the TLD interim trust anchor repository.
Material: ICANN DNS Operations (PDF132 KB)
|Thursday 9 April 2009||Conferences|
Title: IPv6 Update, stats, policy update
Author: Axel Pawlik (RIPE NCC)
Material: IPv6 Update, stats, policy update (PDF 2.6 MB)
Title: Technical & Research Reports and Updates
Author: Alaa Al-Din Al-Radhi (PIR AC)
Material: Technical & Research Reports and Updates (PDF 4.3 MB)
Title: Resilience of Communications Infrastructure
Author: Karl F Rauscher (Bell Labs Fellow, IEEE CQR Chair Emeritus)
Abstract: A summary of the recently completed availability and robustness of electronic communications infrastructures (ARECI) Study and an introduction and update on the ongoing IEEE reliability of global undersea communications cable infrastructure (ROGUCCI) study. This study is engaging subject matter experts from around the world to the aim of better understanding the resiliency issues of this critical infrastructure. For the culmination of this work an historic IEEE summit in the region (October
Material: Resilience of Critical Infrastructure (PDF 4.1 MB)
Title: Experiences with Peer2Peer Caching
Author: Mishary Al-Faris (QualityNet)
Abstract: Over the past 5 years the internet user has shifted as much as 45% of total bandwidth consumption to P2P(Bittorrent) and Youtube. Qualitynet as an ISP in Kuwait opted to deploy PeerApp to cache Torrent files and Youtube videos, as existing legacy caches did not. After 1 year of operation we have highly encouraging results of bandwidth saving, quicker customer downloads and reliability. This also removes the need , to employ bandwidth shaping/throttling devices in the network.
Material: Experiences in Peer2Peer Caching (PDF 524 KB)
Title: IPv6 initiative and Status in Saudi Arabia
Author: Rayed Alrashed (CITC)
Abstract: The presentation will talk about Saudi Arabia IPv6 initiative, with overview of the current status, other countries benchmark, and related international organization. It will also cover IPv6 taskforce and its achievements.
Material: IPv6 initiative and Status in Saudi Arabia (PDF 5.7 MB)
Title: IPv6 deployment at PCH
Author: Gaurab Raj Upadhaya (PCH)
Material: PCH IPv6 Deployment (PDF 76 KB)
Title: IPv6 and DNS
Author: Raed AlFayez (CITC)
Abstract: The presentation highlights the status of DNS in order to support IPv6 , it also gives a general guideline for a ccTLD registry to support IPv6 and what SaudiNIC has done in that area.
Material: IPv6 and DNS (PDF 1.2 MB)
Title: Network Security
Author: Alaa Al-Din Al-Radhi (PIR AC)
Material: Network Security (PDF 3.9 MB)
Title: ICANN’s Global Security Engagement Framework
Author: Baher Esmat (ICANN)
Abstract: The presentation is intended to outline how ICANN is planning to contribute to global efforts and to engage with community in addressing Internet security, stability and resiliency challenges. Specifically, ICANN needs to contribute to confidence of the global stakeholder base that Internet infrastructures such as the DNS are secure, stable, and resilient. ICANN believes that strategies for addressing these concerns must be grounded in an understanding of the Internet as a vibrant ecosystem with many competing interests and communities. The most successful strategies will utilize a multi-stakeholder approach to engaging specific threats, empowering individuals and organizations that operate and use the Internet to understand the risks and engage in collaboration to make the Internet more secure and resilient. ICANN has a unique position as the coordinator of the unique identifier systems to reach across the range of stakeholders in these systems to pursue constructive collaboration and enable security, stability and resiliency activities. A principal focus of ICANN’s activities during this year is the joint Attack and Contingency Response (ACRP) program that has been established in conjunction with the ccNSO and the regional TLD associations to provide training on best practices and exercise assistance. The program focuses on improved security and resiliency through proactive planning and strong response capabilities against a full range of disruptive threats and risks. ICANN understands its role going forward must include plans, program and activities related to making the Internet a more secure, stable and resilient environment. Challenges are growing and ICANN’s efforts in this area are becoming more vigorous. ICANN also recognizes the limits to its role and resources and its strategy in this area plans to rely heavily on partnerships and a wide ranging collaboration. The Internet has thrived as a global environment fostering innovation and relying on multi-stakeholder coordination. ICANN’s contribution to improving security, stability and resiliency will rely on the same approach.
Material: ICANN’s Global Security Engagement Framework (PDF 716 KB)
Author: Ibraheem S Al-Furaih (CITC)
Material: IXSA (PDF 4 MB)
Title: Internet Filtering in Saudi Arabia
Author: Hesham Al-Hammad (CITC)
Abstract:The presentation gives an overview about the technical infrastructure used to manage the filtering through all Data Providers in KSA. It provides an overall picture about current state and the roadmap for filtering.
Title: Tools for Network Operators
Author: Franz Schwarzinger (RIPE NCC)
Material: Tools for Network Operators (PDF 2.8 MB)
Title: Euro-IX activities
Author: Serge Radovcic (Euro-IX)
Speaker: Kurtis Lindqvist (NetNod)
Abstract: Summary of Euro-IX activities as the industry association of the Internet Exchange Points in Europe.
Material: Euro-IX update (PDF 3.3 MB)