YoVDO

MiddlePolice - Toward Enforcing Destination-Defined Policies in the Middle of the Internet

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

ACM CCS (Computer and Communications Security) Courses Network Architecture Courses

Course Description

Overview

Explore a conference talk from CCS 2016 that introduces MiddlePolice, a novel approach to enforcing destination-defined policies in the middle of the Internet. Delve into the challenges of Distributed Denial of Service attacks and examine commercial solutions, their advantages, and limitations. Gain insights into network capabilities and the MiddlePolice architecture, including its challenges and capabilities. Learn how to avoid underestimates, accept packets, bypass traffic throttle, and validate sources. Discover the implementation and evaluation of MiddlePolice, covering aspects such as path length inflation, latency, fair share, and reactive attacks. Conclude with an understanding of premium support options and the potential impact of this innovative approach to Internet security.

Syllabus

Introduction
Distributed Denial of Service
Commercial Solutions
Advantages and Limitations
Network Capabilities
MiddlePolice
Architecture
Challenges
Capabilities
How to avoid underestimates
How to accept a packet
Bypass traffic throttle
Validate a source
Implementation
Evaluation
Path Length Inflation
Latency
Fair Share
Reactive Attacks
Premium Support
Conclusion


Taught by

ACM CCS

Related Courses

Peeling the Onion's User Experience Layer - Examining Naturalistic Use of the Tor Browser
Association for Computing Machinery (ACM) via YouTube
DeepCorr - Strong Flow Correlation Attacks on Tor Using Deep Learning
Association for Computing Machinery (ACM) via YouTube
SandScout - Automatic Detection of Flaws in iOS Sandbox Profiles
Association for Computing Machinery (ACM) via YouTube
Game of Decoys - Optimal Decoy Routing Through Game Theory
Association for Computing Machinery (ACM) via YouTube
PREDATOR - Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Association for Computing Machinery (ACM) via YouTube