Overview
Syllabus
Intro
Blacklists - Why Do We Need Them?
Two types of Access. Ist Download
Two types of Access. 2nd API
Problem Blacklists Need to be Evaluated
Previous Works in Academia
Source Data of Real Attacks
AIP V1.0 Update Framework - How it generates an updates BlackLists
AIP Rating Functions
Evaluation Methodology
AIP Two Month Evaluation. Num of IPS
What We Needed To Improve
AIP V2.0 - Current Version Implemented Improvements
AIP V3.0 - Future Planned Improvements • Data analysis comparing features
Blacklists Need to be Evaluated Our Contributions A new algorithm for blacklists creation, the Attacker IP Prioritizer
Download Community Contributions
Taught by
Hack In The Box Security Conference