Internet Hall of Fame Inductee Kimberly Claffy to Present at LACNIC 34 LACNOG 2020
How Measurements are Essential to Building a Better Internet. This is the title chosen by Kimberly Claffy, a prominent engineer working on topics related to Internet cartography and topography, for the presentation she will share with the LACNIC 34 LACNOG 2020 audience on Tuesday, October 6 after the official opening of the event.
Founder and director of the Center for Applied Internet Data Analysis (CAIDA) at the University of San Diego in the United States, KC Claffy has specialized in Internet measurements, particularly in how traffic estimates work and their importance for network architecture, development and security.
A member of the Internet Hall of Fame and winner of the Jonathan B. Postel Award, Claffy has worked for years on the dynamics of Internet traffic, mapping and measuring data in an effort to understand the dynamic behavior of the Internet so that it can be a secure and reliable tool for communication.
From her position at CAIDA, she carries out sophisticated projects, for example, attempting to determine the degree of interconnection of Autonomous Systems and then publishing this data so that other organizations can use it to improve Internet security.
During the event, KC Claffy will try to answer participants’ questions, including how Internet measurement help build a better Internet, why she believes that measurement projects lead to a better Internet, and whether the Internet is truly an end-to-end network.
Spoofer Project. One of KC Claffy’s projects with the greatest impact is the attempt to minimize the Internet’s susceptibility to spoofed DDoS attacks. In this sense, CAIDA is developing the Spoofer project, which consists of open-source software tools to assess and report on the deployment of source address validation best anti-spoofing practices.
They have developed and support a new spoofing measurement analysis system for Windows, MacOS, and UNIX-like systems that periodically tests a network’s ability to both send and receive packets with forged source IP addresses (spoofed packets). The results allow analyzing the characteristics of networks deploying source address validation.
Click here to participate in the event and attend this presentation.