YoVDO

Anatomy of a DDoS

Offered By: USENIX via YouTube

Tags

LISA (Large Installation System Administration) Conference Courses Internet of Things Courses Cybersecurity Courses Network Security Courses Botnets Courses DDoS Attacks Courses OSI Model Courses

Course Description

Overview

Explore the anatomy of Distributed Denial of Service (DDoS) attacks in this 37-minute conference talk from LISA19. Delve into the structure of DDoS attacks, the evolution of attack methods, and the construction of attacker networks. Gain insights into recent high-profile incidents, including the 2018 Github Memcached Servers attack and the 2016 Mirai botnet attacks. Examine the costs associated with DDoS attacks, the landscape of Internet of Things vulnerabilities, and how DDoS relates to the OSI model. Learn about protection services and the legal efforts to combat these cyber threats, including recent legislation and enforcement actions against bad actors.

Syllabus

Intro
13TB/s: Github Memcached Servers (2018)
Android-based WireX attacks (2017)
1.1TB/s Mirai botnet attacks (2016)
Level 3/DynDNS attacks (2016)
Cost of a DDoS
Structure of a botnet
Landscape Internet of Things
Rua bot?
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation
Application
DDoS and the OSI model
DDoS Protection Services
Legislation against
Legal Timeline


Taught by

USENIX

Related Courses

Named Data Networking
USENIX via YouTube
Release Engineering Best Practices at Google
USENIX via YouTube
Efficiently Backing Up Terabytes of Data with PgBackRest
USENIX via YouTube
SRE in the Small and in the Large
USENIX via YouTube
Network-Based LUKS Volume Decryption with Tang
USENIX via YouTube