Identifying the Scan and Attack Infrastructure Behind Amplification DDoS Attacks
Association for Computing Machinery (ACM) via YouTube
Overview
This course covers the identification of the scan and attack infrastructure behind amplification DDoS attacks. The learning outcomes include understanding amplification DDoS, previous approaches, scanning techniques, honeypots, community Torics, trilateration, time to live, experimental results, and challenges. The course teaches skills in analyzing DDoS attack infrastructure and methods for identifying and mitigating such attacks. The teaching method involves presenting research findings and experimental results. This course is intended for cybersecurity professionals, researchers, and individuals interested in DDoS attack mitigation and network security.
Syllabus
Introduction
What is amplification DDoS
Previous approaches
Scanning
Honeypot
Community Torics
Results
Trilateration
Time to Live
Problems
Experiments
Conclusion
Taught by
ACM CCS