Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Identifying the Scan and Attack Infrastructure Behind Amplification DDoS Attacks

Association for Computing Machinery (ACM) via YouTube

Overview

This course covers the identification of the scan and attack infrastructure behind amplification DDoS attacks. The learning outcomes include understanding amplification DDoS, previous approaches, scanning techniques, honeypots, community Torics, trilateration, time to live, experimental results, and challenges. The course teaches skills in analyzing DDoS attack infrastructure and methods for identifying and mitigating such attacks. The teaching method involves presenting research findings and experimental results. This course is intended for cybersecurity professionals, researchers, and individuals interested in DDoS attack mitigation and network security.

Syllabus

Introduction
What is amplification DDoS
Previous approaches
Scanning
Honeypot
Community Torics
Results
Trilateration
Time to Live
Problems
Experiments
Conclusion

Taught by

ACM CCS

Reviews

Start your review of Identifying the Scan and Attack Infrastructure Behind Amplification DDoS Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.