Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Identifying the Scan and Attack Infrastructure Behind Amplification DDoS Attacks

Association for Computing Machinery (ACM) via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk that delves into the identification of scan and attack infrastructure behind amplification DDoS attacks. Learn about the authors' approach to understanding these cyber threats, including scanning techniques, honeypot usage, and community-based detection methods. Discover the challenges faced in tracking attack sources and the innovative solutions proposed, such as trilateration and Time to Live analysis. Gain insights into the experiments conducted and their implications for cybersecurity professionals and researchers working to combat amplification DDoS attacks.

Syllabus

Introduction
What is amplification DDoS
Previous approaches
Scanning
Honeypot
Community Torics
Results
Trilateration
Time to Live
Problems
Experiments
Conclusion

Taught by

ACM CCS

Reviews

Start your review of Identifying the Scan and Attack Infrastructure Behind Amplification DDoS Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.