Overview
Syllabus
Intro
Overview
Use Cases
Generate Threat Intelligence Feed
Firewall Rule Propagation
Drop Propagation
Capture Threat Activity
Inject Beacon
Redirect Traffic
Reporting Threats
Host Isolation
Additional Logging
Trigger Password Resets
Security Orchestration
Adaptive Network Protocol (ANP)
Packet
Messages
Peering
Multiple Locations
Cloud Assets
Surrogate
Blacklist
Sharing Also Provides
Expanded Visibility
Cooperative Behavior
Acting to Defend The Network
Acting To Investigate A Threat
Acting To Respond To An Incident
Demonstrations
Needed Improvements
Making The Difference
Final Thoughts
iptables
Links
Taught by
BruCON Security Conference