Akamai Diversity

The Akamai Blog

Donghoon Shin

Donghoon Shin

October 25, 2019 8:00 AM

A View into Top Level Domain (TLD) Abuse

Data science and security research teams in the carrier organization at Akamai process massive volumes of DNS queries every day to detect and track malicious activity. The data is live-streamed from DNS resolvers deployed in diverse service provider networks in every region of the world. Providers who supply the data anonymize it using Cryptography-based Prefix-preserving Anonymization (Crypto-PAn), a well known tool.

Akamai

Akamai

October 23, 2019 3:36 PM

CPDoS Poisoning Attack

On October 22, 2019, a new method of web cache poisoning, called CPDoS or Cache Poisoned Denial of Service, was announced by researchers, Hoai Viet Nguyen and Luigi Lo Iacono. Targeting content delivery networks and other caching systems, the attack works by using a malicious header in the HTTP request to cause an error message to be cached, rather than the intended content. The error page is subsequently served to

Domitian Tamas-Selicean

Domitian Tamas-Selicean

October 23, 2019 12:30 PM

Enhancing video streaming quality for ExoPlayer - Pa ...

Co-Author: Mark Greve, Engineering Manager at Akamai. Part of the Media Client Team The first part of this blog series discussed about the quality of user experience (QoE) metrics and two strategies that heavily influence the QoE: the bitrate selection strategy and the buffering strategy. In this second part, we discuss about ExoPlayer's buffering strategy and how to configure the ExoPlayer to lower the startup time and, for video on-demand

Sam Preston

Sam Preston

October 21, 2019 11:00 AM

All Resolvers Aren't Equal - Don't Worry, GTM is Awa ...

What is GTM Global Traffic Management, or GTM, is a DNS-based load balancing service that offers application owners a level of flexibility and insight that is unmatched by traditional on-prem solutions. Highly scalable and fault-resilient, GTM offers customers a layer of abstraction between endpoints, so traffic can be easily shifted between targets. However, the platform is not limited to weighted load distribution: GTM can execute intelligent routing decisions based on

Ritesh Kalyanshetty

Ritesh Kalyanshetty

October 21, 2019 11:00 AM

Akamai Outlook: Optimizing Edge Delivery Performance ...

Written by: Ritesh Kalyanshetty and Sandeep Singh Pervasiveness of CDNs within the expanding Media and Entertainment Industry Media and entertainment companies, including content owners and over-the-top (OTT) service providers are living in an era symbolized by a dramatic increase in content consumption fueled by the widespread availability of online video content, coupled with factors like hyper-connected devices and ubiquitous high-speed data.

Adam Karon

Adam Karon

October 21, 2019 9:13 AM

A Peak at the Edge: Akamai Sets New Traffic Benchmar ...

Last week Akamai reached a significant milestone when traffic on our intelligent edge platform exceeded the threshold of 100 Tbps (terabits per second) for the first time in our history, peaking at 106 Tbps. To put that volume of traffic into context, delivering 106 terabits per second is roughly the same as downloading 3,300 two-hour HD movies every second, or nearly 12 million an hour.

Luis Raga Hines

Luis Raga Hines

October 14, 2019 11:00 AM

Phishing Tool Analysis: Modlishka

Additional research and support provided by Danny Wasserman. Overview One of the goals of phishing sites is to lure individuals into providing sensitive data, such as personally identifiable information, banking and credit card details, and passwords, through the use of email, SMS, social media, and messaging apps. This information is then used to access important accounts and can result in identity theft and financial loss.

Jeffrey Costa

Jeffrey Costa

October 11, 2019 3:00 PM

Verify JWT With JSON Web Key Set (JWKS) in API Gatew ...

JSON Web Tokens (JWT) use digital signatures to establish the authenticity of the data they contain, as well as authenticating the identity of the signer. A valid signature check ensures that any party can rely on the contents and the signatory of the JWT. This is typically accomplished by using an asymmetric signing algorithm such as RS-256 (RSA + SHA256 hash). The "asymmetry" is where the private key of a

Gregory Griffiths

Gregory Griffiths

October 11, 2019 3:00 PM

Introducing Serverless Computing at the Edge with Ak ...

For the first time, Akamai is introducing an all-new serverless compute capability to help you customize web traffic, expanding the possibilities of personalized engagement with your customers while putting the flexibility and control in the hands of your developers. Developers can now manipulate JavaScript at the Edge, injecting business logic at the point of customer interaction to support contextual and low-latency use cases that will help power innovation in customer