YoVDO

Moving Target Defense - Learning from Hackers

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Botnets Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk from Derbycon 2015 that delves into Moving Target Defense (MTD) and its applications in cybersecurity. Learn about the concept of MTD, its comparison to Star Trek's shield nutation, and various MTD techniques such as instruction-set randomization and software diversity. Examine the evolution of botnets, from early centralized models to sophisticated decentralized networks, and understand the lessons learned from this progression. Investigate the relationship between cloud computing and botnets, and discover how MTD principles can be applied to protect distributed systems. Gain insights into strategies like evolving distributed system topologies, moving virtual machines in the cloud, and network-aware VM migration to enhance security against zero-day vulnerabilities and other attacks.

Syllabus

Moving Target Defense - Lessons from
Roadmap
What is the problem?
What is Moving Target Defense (MID)
MTD and Star Trek Shield Nutation (2366 AD)
MTD Techniques
Instruction-Set Randomization
Software Diversity
Internet Services Diversity
Early Origins: Centralized botnet
Botnet Acceleration: Sophisticated Centralized botnet
Maturation: Decentralized botnet
Lessons: What did we learn from the Botnet Evolution?
Examples of Cloud Computing Attacks
How are Cloud and Botnets related ?
Distributed Systems Topology Evolving Mechanisms
Moving Virtual Machines in Cloud
Scalable Network Diversity Modeling for Assessing Zero-Day Vulnerabilities
Network Aware Virtual Machine Migration for Distributed Systems under attack


Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network