PPT-Weaponizing Middleboxes for

Author : bella | Published Date : 2024-07-06

TCP Reflected Amplification Kevin Bock Abdulrahman Alaraj Yair Fax Kyle Hurley Eric Wustrow Dave Levin University of Maryland University of Colorado

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Weaponizing Middleboxes for" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Weaponizing Middleboxes for: Transcript


TCP Reflected Amplification Kevin Bock Abdulrahman Alaraj Yair Fax Kyle Hurley Eric Wustrow Dave Levin University of Maryland University of Colorado Boulder. Convergence between. SDN and . Middleboxes. 1. Zafar. . Qazi. Cheng-Chun . Tu. . Luis Chiang. Vyas Sekar. Rui. Miao. Minlan. Yu. Type. of appliance . Number. Firewalls. 166. Intrusion detection . :. . Enforcing Network-Wide . Policies . in . the Presence of . Dynamic . Middlebox. Actions. Seyed. K. . Fayazbakhsh. Vyas Sekar . Jeff . Mogul. Minlan. Yu . 1. Network OS. Data Plane. Aaron . Gember. , . Prathmesh. . Prabhu. , . Zainab. . Ghadiyali. , . Aditya. . Akella. University of Wisconsin-Madison. 1. Network. Physical. Data Link. Transport. Session. Presentation. Application. Aditya Akella. 3/11/2010. A Layered Naming Architecture . for the Internet. Hari. . Balakrishnan. , . Karthik. . Lakshminarayanan. , Sylvia . Ratnasamy. , . Scott . Shenker. , Ion . Stoica. , Michael . Convergence between. SDN and . Middleboxes. 1. Zafar. . Qazi. Cheng-Chun . Tu. . Luis Chiang. Vyas Sekar. Rui. Miao. Minlan. Yu. Type. of appliance . Number. Firewalls. 166. Intrusion detection . Extensions. Middleboxes. 1. Ack. : . Vyas. . Sekar. , Aaron . Gember. , . Felipe . Huici. , . Zafar. . Qazi. Need for Network Evolution. 2. New devices. New applications. Evolving . threats. Policy . Middlebox. Traversals and Functionality. Aaron . Gember. , . Theophilus Benson. , . Aditya. . Akella. University of Wisconsin-Madison. Components of Enterprise Networks. 2. Middleboxes. make up 40% of the network devices in large enterprises with over 200K hosts. Aaron . Gember. , . Prathmesh. . Prabhu. , . Zainab. . Ghadiyali. , . Aditya. . Akella. University of Wisconsin-Madison. 1. Network. Physical. Data Link. Transport. Session. Presentation. Application. EE122 TAs Past and Present. What is a middlebox?. “. A . middlebox . is defined . as any intermediary device performing functions other . than the . normal, standard functions of an IP router on the datagram . Middlebox. Traversals and Functionality. Aaron . Gember. , . Theophilus Benson. , . Aditya. . Akella. University of Wisconsin-Madison. Components of Enterprise Networks. 2. Middleboxes. make up 40% of the network devices in large enterprises with over 200K hosts. Hakim . Weatherspoon. Assistant Professor, . Dept. of Computer Science. CS 5413: High Performance Systems and Networking. November 24, 2014. Slides from ACM SIGCOMM . 2012 presentation on “Making . Middleboxes. Ed Lopez – . elopez@fortinet.com. Prologue. Middleboxes. (and proxies) break the end-to-end principal of Internet architecture. Stateful. ones force single path architectures. Packet transforms, especially by encapsulation, NAT devices and proxies, are particularly problematic. The ongoing battle for hearts and minds in Iraq and Afghanistan is a military strategy inspired originally by efforts at domestic social control and counterinsurgency in the United States. Weaponizing Anthropology documents how anthropological knowledge and ethnographic methods are harnessed by military and intelligence agencies in post-9/11 America to placate hostile foreign populations. David H. Price outlines the ethical implications of appropriating this traditional academic discourse for use by embedded, militarized research teams.Price\'s inquiry into past relationships between anthropologists and the CIA, FBI, and Pentagon provides the historical base for this expose of the current abuses of anthropology by military and intelligence agencies. Weaponizing Anthropology explores the ways that recent shifts in funding sources for university students threaten academic freedom, as new secretive CIA-linked fellowship programs rapidly infiltrate American university campuses. Price examines the specific uses of anthropological knowledge in military doctrine that have appeared in a new generation of counterinsurgency manuals and paramilitary social science units like the Human Terrain Teams.David H. Price is the author of Threatening Anthropology: McCarthyism and the FBI\'s Surveillance of Activist Anthropologists and Anthropological Intelligence: The Deployment and Neglect of American Anthropology in the Second World War. He is a member of the Network of Concerned Anthropologists and teaches at St. Martin\'s College in Lacey, Washington. Justine Sherry*, . Shaddi. . Hasan. *. , . Colin Scott. *. , . Arvind. Krishnamurthy. †. , . Sylvia . Ratnasamy. *. , and . Vyas. . Sekar. ‡. ‡. *. †. Typical Enterprise Networks. Internet.

Download Document

Here is the link to download the presentation.
"Weaponizing Middleboxes for"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents