Top of Page
In this report, we will report on incidents to which IIJ responded between July and September 2009. At the same time, we will also cite the details behind large-scale DDoS attacks targeting Web servers in the United States and South Korea, TCP vulnerabilities announced by CERT-FI, and the mechanism behind silent phone calls caused by SIP packets.
In this report, we will offer our analysis of trends in the ratio of spam and regional sources of spam detected over the period between weeks 27 and 39 of 2009. At the same time, we will also comment on the results of international activities designed to reduce or prevent spam, as well as the adoption rates of sender-authentication technologies.
In order to construct an efficient virtual computing environment, a system for ensuring the availability of virtual computers and managing them flexibly is required. In this whitepaper a virtual computer migration method using NEMO BS technology, which adds a mobility function to IPv6 routers, is discussed and the results of experiments using this setup are examined. NEMO BS makes it possible to migrate virtual computers beyond the network segment.
NHN (Next Host Network) is IIJ's next generation service infrastructure. When NHN is adopted, service development flow and demand forecasts for equipment upgrades at IIJ are set to change dramatically. Here, we provide an overview of NHN, its technological components, architecture and implementation.
End of the page.