2017/12/13:A major BGP routing "incident" routes traffic for big-name sites through Russia. 80 prefixes normally announced by organizations such Google, Apple, Facebook, Microsoft, Twitch, NTT Communications and Riot Games were now detected in the global BGP routing tables with a previously unknown Origin AS of 39523 (DV-LINK-AS), originating in Russia. This incident was one of almost 5000 route leaks and hijacks in the first 11 months of 2017. More information can be found here and here
2017/11/30:The tutorials on how to set up and run a SCION node on different platforms are available here.
2017/11/14:The SCION team was part of the Swiss Next Generation Internet (NGI) workshop hosted by Euresearch. The goals of the event were to get informed about the Next Generation Internet initiative of the European Commission, to provide thoughts on how a future Internet might look like by 2030, and how to get there.
2017/10/10:The SCION architecture book is available in print (ISBN 978-3-319-67079-9) and online. Additionally, we have published a PDF-version of the book on our publications page.
2017/08/26:BGP leak caused Internet outages in Japan and beyond. Google accidentally leaked a big route table, the result of which was traffic from Japanese ISPs NTT and KDDI was sent to Google on expectation it would be treated as transit. SCION prevents such accidental BGP hijacks.
2017/07/28:Anapaya Systems is our startup to commercialize SCION technology. The Anapaya Systems website is now active.
2017/07/19:The Path Aware Networking Research Group (PANRG), a proposed research group of the IRTF, had the first meeting at the IETF meeting in Prague. Brian Trammell did an excellent job to establish the research group, which received broad support from the community. We also presented SCION as an architecture for path awareness. Here are the meeting notes. The next meeting will be at the IETF in Singapore in November.
2017/06/23:We have published an article about effect mitigation of IoT attacks in future Internet architectures.
2017/06/15:Article by Felix Würsten in ETH Globe "A new foundation". The article is on pages 13 and 14 in the PDF, and on pages 25 and 26 in the print version. PDF in English and in German.
2017/06/13:HIDDEN COBRA is North Koreaâs DDoS Botnet Infrastructure. It has been used by cyber actors of the North Korean government to target the media, aerospace, financial, and critical infrastructure sectors in the United States and globally. SCION would help to ensure communication despite attacks. CERT TA17-164A
2017/06/12:The CrashOverride Malware is an extensible platform that could be used to target critical infrastructure sectors (CERT TA17-163A). Wired Magazine published an interesting article. What is interesting about CrashOverride is that it can operate disconnected from the Internet. Thus, it is important to run a secure routing protocol, even in networks that claim to be secure because they are disconnected from the Internet. The SCION secure routing protocol could help in those cases.
2017/06/09:Today, a 10Gbit Fiber cross-connect was installed between two SCION border routers at CERN, Geneva. This allows native SCION communication between the two SCION ASes located in CERN premises of our collaborating ISPs: Swisscom and SWITCH. Many thanks to these ISPs for supporting SCION.
2017/05/28:The Sonntagszeitung publishes an article on SCION (german).
2017/05/26:A near-final draft of the SCION book is completed.