PPT-Yo-Yo Attack : DDoS Attack on Cloud Auto-scaling Mechanisms

Author : crashwillow | Published Date : 2020-06-25

Supported by ERC starting grant IEEE INFOCOM 2017 Atlanta GA USA Mor Sides Anat Bremler Barr Eli Brosh Interdisciplinary Center Herzliya Israel Distributed

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Yo-Yo Attack : DDoS Attack on Cloud Aut..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Yo-Yo Attack : DDoS Attack on Cloud Auto-scaling Mechanisms: Transcript


Supported by ERC starting grant IEEE INFOCOM 2017 Atlanta GA USA Mor Sides Anat Bremler Barr Eli Brosh Interdisciplinary Center Herzliya Israel Distributed Denial of Service. What were their experiences in 2013 The results suggest a more unstable and complex landscape DDoS Attacks More Unpredictable than Ever Over the last year DDoS attacks evolved in strategy and tactics We saw increased media reports of smokescreening Nurfedin Zejnulahi, Arbor Consultant. Ten + Years of Innovation. Trusted Experts. Globally. Global ATLAS. Proprietary and Confidential Information of Arbor Networks, Inc.. Founded from DARPA grant. Over 40 networking and security patents . A simple form of attack. Designed to prey on the Internet’s strengths. Easy availability of attack machines. Attack can look like normal traffic. Lack of Internet enforcement tools. Hard to get cooperation from others. Defense by Offense. Michael . Walfish. , . Mythili. . Vutukuru. ,. Hari. . Balakrishnan. , David . Karger. ,. Scott . Shenker. . , SIGCOMM ‘06. Presented by . Lianmu. Chen. DDoS. : Defense by Offense. Presented by Paul. Problem. The cloud offers. Near infinite computing capabilities. Near infinite storage. On-demand access to new VMs. Pay-as-you-go model. But how do you build an application to automatically take advantage of those resources?. Orly Sorokin. January 2013. AGENDA. DDoS attacks & Cyber security Statistics. About 2012 Global Security Report. Key Findings & Trends. Recommendations. DoS – How does it Look . Simple Way. a.kroczek@f5.com. Jak . zwiększyć bezpieczeństwo . i . wysoką dostępność . aplikacji wg. F5 . Networks. Mobility. SDDC/Cloud. Advanced . threats. Internet of. Things. “Software defined”. everything. Orly Sorokin. January 2013. AGENDA. DDoS attacks & Cyber security Statistics. About 2012 Global Security Report. Key Findings & Trends. Recommendations. DoS – How does it Look . Simple Way. Underestimating the Impact of DDoS. Jim Benanti – Sr. Consulting Engineer, Arbor Networks. Don’t Take My Word For It. Size Still Matters. 1H16 - ATLAS has recorded:. An average of 124,000 events per week over the last 18 months.. Are our smart devices really that smart ?. Christopher McDermott. c.d.mcdermott. @rgu.ac.uk. Cyber Security. Cyber Security Trends. UK migration to IPv6. IoT . Security . vulnerabilities. Final thoughts and role of BCS. (. DDoS. ). Defending against Flooding-Based . DDoS. Attacks: A Tutorial. Rocky K. C. Chang. Presented by. Adwait Belsare (. adwait@wpi.edu. ). Suvesh Pratapa (. suveshp@wpi.edu. ). Modified by Bob Kinicki. (. DDoS. ). Defending against Flooding-Based . DDoS. Attacks: A Tutorial. Rocky K. C. Chang. Presented by. Adwait Belsare (. adwait@wpi.edu. ). Suvesh Pratapa (. suveshp@wpi.edu. ). Modified by Bob Kinicki. About Imperva. Founded in November 2002 by . Shlomo. Kramer, Amichai Shulman and Mickey . Boodaei. ~700 . employees. R&D center in Tel-Aviv. SecureSphere . protects web applications, databases, file access, cloud applications. Unlike other forms of computer attacks, goal isn’t access or theft of information or services. The goal is to stop the service from operating. To deny service to legitimate users. Slowing down may be good enough.

Download Document

Here is the link to download the presentation.
"Yo-Yo Attack : DDoS Attack on Cloud Auto-scaling Mechanisms"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents