ACCEPTED PRESENTATIONS

Geoff Huston
Chief Scientist APNIC

If we could see your stream of queries in real time we could
assemble a detailed profile of you and interests and
activities
• Do we have any evidence of DNS data mining?
– Data miners don’t disclose their sources as a rule
#apricot2019 2019 47
Why?
• Because everything you do on the net starts with a call to the
DNS
• If we could see your stream of queries in real time we could
assemble a detailed profile of you and interests and activities
• Do we have any evidence of DNS data mining?
– Data miners don’t disclose their sources as a rule
• How about something related:
– Do we have any evidence of DNS stalking?

Tashi Phuntsho
Senior Network Analyst at APNIC

Why do we keep on seeing news headlines about major networks not being reachable because traffic got rerouted somewhere else? BGP mishaps are very common and frighteningly very easy. Examples are malicious route hijacking, mis-origination (fat fingers), and bad filters (route leaks). We need better mechanism(s) to ensure no one can inject false information into the global routing system that easily.
This presentation looks at current tools/techniques, how rPKI is just a piece in the puzzle, and what we could all do instead of waiting for an ideal solution that fixes all issues.

Ulsbold Enkhtaivan
Planning Engineer | Mobicom Networks

This papers main point is sharing our experience that fighting the asymmetric routing and using BGP communities. internet asymmetric routing is still major problem of ISP's. Delay is most important for customers, especially online gamer's.

Philip Smith
Senior Network Engineer | NSRC

This presentation describes RouteViews and how it can be useful as a network diagnosis tool for today's network operators, as well as provide valuable analysis data for network researchers

S.Anar
System Engineer | Erdemnet

Discussion between experts:
Panelists: