- dosd looks for patterns in sampled packets, generate permutations to find the fingerprint with highest mitigation efficacy
- mitigation rules applied based on fingerprint counts, rule times out to prevent false +ves
- dosd looks for patterns in sampled packets, generate permutations to find the fingerprint with highest mitigation efficacy
- mitigation rules applied based on fingerprint counts, rule times out to prevent false +ves
- QOTD DDoS (reflect & amp, UDP/17)
- Echo DDoS (reflect & amp, UDP/TCP/7)
- NTP DDoS (reflect & amp, NTP `monlist` command)
- Mirai UDP attack (flood, botnet)
- Portmap DDoS (reflect & amp, UDP/111, RPC info)
- RIPv1 DDoS (reflect & amp, UDP/520, unauthenticated routing info)
- QOTD DDoS (reflect & amp, UDP/17)
- Echo DDoS (reflect & amp, UDP/TCP/7)
- NTP DDoS (reflect & amp, NTP `monlist` command)
- Mirai UDP attack (flood, botnet)
- Portmap DDoS (reflect & amp, UDP/111, RPC info)
- RIPv1 DDoS (reflect & amp, UDP/520, unauthenticated routing info)
Target was a single IP over 21925 target ports, source port distribution was also similar. 99.996% of attack traffic was UDP DDoS (flood)
Target was a single IP over 21925 target ports, source port distribution was also similar. 99.996% of attack traffic was UDP DDoS (flood)
- Aim for cloud platform independent deployment systems
- Security is "not a choice" for software development
- Analyze systems from both attackers POV as well as DevOps POV
(3/3)
- Aim for cloud platform independent deployment systems
- Security is "not a choice" for software development
- Analyze systems from both attackers POV as well as DevOps POV
(3/3)
- Keep teams small
- Design simple straightforward architectures
- Use framework defaults as much as possible
- Avoid microservices, stick with monolith
- Proactively update dependency versions regularly
- Reject unstructured data inputs
(2/3)
- Keep teams small
- Design simple straightforward architectures
- Use framework defaults as much as possible
- Avoid microservices, stick with monolith
- Proactively update dependency versions regularly
- Reject unstructured data inputs
(2/3)