YoVDO

Identifying the Scan and Attack Infrastructure Behind Amplification DDoS Attacks

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

ACM CCS (Computer and Communications Security) Courses Cybersecurity Courses Network Security Courses DDoS Attacks Courses Honeypots Courses

Course Description

Overview

Explore a conference talk that delves into the identification of scan and attack infrastructure behind amplification DDoS attacks. Learn about the authors' approach to understanding these cyber threats, including scanning techniques, honeypot usage, and community-based detection methods. Discover the challenges faced in tracking attack sources and the innovative solutions proposed, such as trilateration and Time to Live analysis. Gain insights into the experiments conducted and their implications for cybersecurity professionals and researchers working to combat amplification DDoS attacks.

Syllabus

Introduction
What is amplification DDoS
Previous approaches
Scanning
Honeypot
Community Torics
Results
Trilateration
Time to Live
Problems
Experiments
Conclusion


Taught by

ACM CCS

Related Courses

Peeling the Onion's User Experience Layer - Examining Naturalistic Use of the Tor Browser
Association for Computing Machinery (ACM) via YouTube
DeepCorr - Strong Flow Correlation Attacks on Tor Using Deep Learning
Association for Computing Machinery (ACM) via YouTube
SandScout - Automatic Detection of Flaws in iOS Sandbox Profiles
Association for Computing Machinery (ACM) via YouTube
Game of Decoys - Optimal Decoy Routing Through Game Theory
Association for Computing Machinery (ACM) via YouTube
PREDATOR - Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Association for Computing Machinery (ACM) via YouTube