Submit Search
Upload
Atelier Technique ARBOR NETWORKS ACSS 2018
•
1 like
•
461 views
A
African Cyber Security Summit
Follow
Techniques Avancées de protection Anti-DDoS Reda NEDJAR Consulting Engineer EMEA
Read less
Read more
Presentations & Public Speaking
Report
Share
Report
Share
1 of 15
Recommended
Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018
African Cyber Security Summit
DNS Security, is it enough?
DNS Security, is it enough?
Zscaler
Web Application Security
Web Application Security
MarketingArrowECS_CZ
What Happens Before the Kill Chain
What Happens Before the Kill Chain
OpenDNS
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber War
Radware
Radware Cloud Security Services
Radware Cloud Security Services
Radware
Issa jason dablow
Issa jason dablow
ISSA LA
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]
Radware
Recommended
Atelier Technique CISCO ACSS 2018
Atelier Technique CISCO ACSS 2018
African Cyber Security Summit
DNS Security, is it enough?
DNS Security, is it enough?
Zscaler
Web Application Security
Web Application Security
MarketingArrowECS_CZ
What Happens Before the Kill Chain
What Happens Before the Kill Chain
OpenDNS
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber War
Radware
Radware Cloud Security Services
Radware Cloud Security Services
Radware
Issa jason dablow
Issa jason dablow
ISSA LA
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]
Radware
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2016
Radware Solutions for MSSPs
Radware Solutions for MSSPs
Radware
Esteban Próspero
Esteban Próspero
ClusterCba
Honey, I Stole Your C2 Server: A Dive into Attacker Infrastructure
Honey, I Stole Your C2 Server: A Dive into Attacker Infrastructure
Shakacon
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
PROIDEA
Cloud Crime Ops
Cloud Crime Ops
Greg Foss
Addressing the cyber kill chain
Addressing the cyber kill chain
Symantec Brasil
Cyber kill chain
Cyber kill chain
Ankita Ganguly
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
MITRE ATT&CK
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival: Are You Ready?
Radware
ATT&CKING Containers in The Cloud
ATT&CKING Containers in The Cloud
MITRE ATT&CK
kill-chain-presentation-v3
kill-chain-presentation-v3
Shawn Croswell
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the Noise
Cisco Canada
Hands on Security - Disrupting the Kill Chain Breakout Session
Hands on Security - Disrupting the Kill Chain Breakout Session
Splunk
NDIA 2021 - solar winds overview and takeaways
NDIA 2021 - solar winds overview and takeaways
Bryson Bort
Next Generation Security
Next Generation Security
Cisco Canada
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
VMUG IT
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Blue Coat
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
Prime Infoserv
Advanced Threat Protection
Advanced Threat Protection
Lan & Wan Solutions
DDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in Defense
NETSCOUT
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
African Cyber Security Summit
More Related Content
What's hot
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2016
Radware Solutions for MSSPs
Radware Solutions for MSSPs
Radware
Esteban Próspero
Esteban Próspero
ClusterCba
Honey, I Stole Your C2 Server: A Dive into Attacker Infrastructure
Honey, I Stole Your C2 Server: A Dive into Attacker Infrastructure
Shakacon
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
PROIDEA
Cloud Crime Ops
Cloud Crime Ops
Greg Foss
Addressing the cyber kill chain
Addressing the cyber kill chain
Symantec Brasil
Cyber kill chain
Cyber kill chain
Ankita Ganguly
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
MITRE ATT&CK
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival: Are You Ready?
Radware
ATT&CKING Containers in The Cloud
ATT&CKING Containers in The Cloud
MITRE ATT&CK
kill-chain-presentation-v3
kill-chain-presentation-v3
Shawn Croswell
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the Noise
Cisco Canada
Hands on Security - Disrupting the Kill Chain Breakout Session
Hands on Security - Disrupting the Kill Chain Breakout Session
Splunk
NDIA 2021 - solar winds overview and takeaways
NDIA 2021 - solar winds overview and takeaways
Bryson Bort
Next Generation Security
Next Generation Security
Cisco Canada
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
VMUG IT
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Blue Coat
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
Prime Infoserv
Advanced Threat Protection
Advanced Threat Protection
Lan & Wan Solutions
What's hot
(20)
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
Radware Solutions for MSSPs
Radware Solutions for MSSPs
Esteban Próspero
Esteban Próspero
Honey, I Stole Your C2 Server: A Dive into Attacker Infrastructure
Honey, I Stole Your C2 Server: A Dive into Attacker Infrastructure
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
Cloud Crime Ops
Cloud Crime Ops
Addressing the cyber kill chain
Addressing the cyber kill chain
Cyber kill chain
Cyber kill chain
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival: Are You Ready?
ATT&CKING Containers in The Cloud
ATT&CKING Containers in The Cloud
kill-chain-presentation-v3
kill-chain-presentation-v3
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the Noise
Hands on Security - Disrupting the Kill Chain Breakout Session
Hands on Security - Disrupting the Kill Chain Breakout Session
NDIA 2021 - solar winds overview and takeaways
NDIA 2021 - solar winds overview and takeaways
Next Generation Security
Next Generation Security
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
Advanced Threat Protection
Advanced Threat Protection
Similar to Atelier Technique ARBOR NETWORKS ACSS 2018
DDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in Defense
NETSCOUT
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
African Cyber Security Summit
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Rachel Wandishin
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT
Stopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South Africa
Cloudflare
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
Cristian Garcia G.
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
Cloudflare
Worldwide Infrastructure Security Report Highlights
Worldwide Infrastructure Security Report Highlights
APNIC
Attack Prevention Solution for RADWARE
Attack Prevention Solution for RADWARE
Deivid Toledo
ddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdf
TuPhan66
DDoS Report.docx
DDoS Report.docx
Tushar Mathur
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
SecPod Technologies
DDoS Mitigator. Personal control panel for each hosting clients.
DDoS Mitigator. Personal control panel for each hosting clients.
Глеб Хохлов
[HashiConf EU] Securing Cloud Native Communication, From End User to Service
[HashiConf EU] Securing Cloud Native Communication, From End User to Service
Daniel Bryant
Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-Service
Sagi Brody
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Cloudflare
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
Nexusguard
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Emulex Corporation
F5 DDoS Protection
F5 DDoS Protection
MarketingArrowECS_CZ
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
Tejaswi Agarwal
Similar to Atelier Technique ARBOR NETWORKS ACSS 2018
(20)
DDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in Defense
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
Stopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South Africa
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
Worldwide Infrastructure Security Report Highlights
Worldwide Infrastructure Security Report Highlights
Attack Prevention Solution for RADWARE
Attack Prevention Solution for RADWARE
ddos-protector-customer-presentation.pdf
ddos-protector-customer-presentation.pdf
DDoS Report.docx
DDoS Report.docx
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
DDoS Mitigator. Personal control panel for each hosting clients.
DDoS Mitigator. Personal control panel for each hosting clients.
[HashiConf EU] Securing Cloud Native Communication, From End User to Service
[HashiConf EU] Securing Cloud Native Communication, From End User to Service
Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-Service
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
F5 DDoS Protection
F5 DDoS Protection
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
More from African Cyber Security Summit
Bilan & Perspectives #ACSS2019
Bilan & Perspectives #ACSS2019
African Cyber Security Summit
Rapport de Visibilité #ACSS2019
Rapport de Visibilité #ACSS2019
African Cyber Security Summit
Atelier Technique - F5 - #ACSS2019
Atelier Technique - F5 - #ACSS2019
African Cyber Security Summit
Atelier Technique - F5 - #ACSS2019
Atelier Technique - F5 - #ACSS2019
African Cyber Security Summit
Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019
African Cyber Security Summit
Conférence - Les enjeux et la vision de Veritas sur la protection des donnée...
Conférence - Les enjeux et la vision de Veritas sur la protection des donnée...
African Cyber Security Summit
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
African Cyber Security Summit
Conférence - Loi 18-07 du 10 Juin 2018 : la protection des données à caractèr...
Conférence - Loi 18-07 du 10 Juin 2018 : la protection des données à caractèr...
African Cyber Security Summit
Conférence - Le métier du RSSI en pleine évolution - #ACSS2019
Conférence - Le métier du RSSI en pleine évolution - #ACSS2019
African Cyber Security Summit
Conférence - Vecteurs d'attaques basées sur les navigateurs et comment se pro...
Conférence - Vecteurs d'attaques basées sur les navigateurs et comment se pro...
African Cyber Security Summit
Conférence - Pourquoi le PAM (Privileged Access Management) doit-il être le s...
Conférence - Pourquoi le PAM (Privileged Access Management) doit-il être le s...
African Cyber Security Summit
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
African Cyber Security Summit
Conférence - Digital Identity and Blockchain - #ACSS2019
Conférence - Digital Identity and Blockchain - #ACSS2019
African Cyber Security Summit
Bilan & Perspectives - ACSS 2018
Bilan & Perspectives - ACSS 2018
African Cyber Security Summit
Rapport de Visibilité ACCS 2018
Rapport de Visibilité ACCS 2018
African Cyber Security Summit
Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018
African Cyber Security Summit
Atelier Technique MANAGE ENGINE ACSS 2018
Atelier Technique MANAGE ENGINE ACSS 2018
African Cyber Security Summit
Atelier Technique EXTREME NETWORKS ACSS 2018
Atelier Technique EXTREME NETWORKS ACSS 2018
African Cyber Security Summit
Atelier Technique WALLIX ACSS 2018
Atelier Technique WALLIX ACSS 2018
African Cyber Security Summit
Atelier Technique RAPID7 ACSS 2018
Atelier Technique RAPID7 ACSS 2018
African Cyber Security Summit
More from African Cyber Security Summit
(20)
Bilan & Perspectives #ACSS2019
Bilan & Perspectives #ACSS2019
Rapport de Visibilité #ACSS2019
Rapport de Visibilité #ACSS2019
Atelier Technique - F5 - #ACSS2019
Atelier Technique - F5 - #ACSS2019
Atelier Technique - F5 - #ACSS2019
Atelier Technique - F5 - #ACSS2019
Atelier Technique - Symantec - #ACSS2019
Atelier Technique - Symantec - #ACSS2019
Conférence - Les enjeux et la vision de Veritas sur la protection des donnée...
Conférence - Les enjeux et la vision de Veritas sur la protection des donnée...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Loi 18-07 du 10 Juin 2018 : la protection des données à caractèr...
Conférence - Loi 18-07 du 10 Juin 2018 : la protection des données à caractèr...
Conférence - Le métier du RSSI en pleine évolution - #ACSS2019
Conférence - Le métier du RSSI en pleine évolution - #ACSS2019
Conférence - Vecteurs d'attaques basées sur les navigateurs et comment se pro...
Conférence - Vecteurs d'attaques basées sur les navigateurs et comment se pro...
Conférence - Pourquoi le PAM (Privileged Access Management) doit-il être le s...
Conférence - Pourquoi le PAM (Privileged Access Management) doit-il être le s...
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
Conférence - Digital Identity and Blockchain - #ACSS2019
Conférence - Digital Identity and Blockchain - #ACSS2019
Bilan & Perspectives - ACSS 2018
Bilan & Perspectives - ACSS 2018
Rapport de Visibilité ACCS 2018
Rapport de Visibilité ACCS 2018
Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018
Atelier Technique MANAGE ENGINE ACSS 2018
Atelier Technique MANAGE ENGINE ACSS 2018
Atelier Technique EXTREME NETWORKS ACSS 2018
Atelier Technique EXTREME NETWORKS ACSS 2018
Atelier Technique WALLIX ACSS 2018
Atelier Technique WALLIX ACSS 2018
Atelier Technique RAPID7 ACSS 2018
Atelier Technique RAPID7 ACSS 2018
Recently uploaded
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
Basil Achie
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Pooja Nehwal
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
Sebastiano Panichella
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Krijn Poppe
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
henrik385807
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
NETWAYS
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
NETWAYS
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
marjmae69
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
henrik385807
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
NETWAYS
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Salam Al-Karadaghi
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸
mathanramanathan2005
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
mavinoikein
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptx
aryanv1753
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
NETWAYS
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
henrik385807
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
vikas rana
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
FamilyWorshipCenterD
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
soniya singh
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Sebastiano Panichella
Recently uploaded
(20)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptx
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Atelier Technique ARBOR NETWORKS ACSS 2018
1.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 1 Techniques Avancés de Protection Anti-DDoS Reda Nedjar – Consulting Engineer EMEA (rnedjar@arbor.net)
2.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 2 Do I know the• latest DDoS attack trends? Do I know the best practices in• DDoS attack mitigation? Do I know the real impact of a• DDoS attack to my business? Time to re-assess risk of DDoS attacks Can you answer these questions? Cost of DDoS Impact to Victim
3.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 3 How easy it really is to launch a DDoS? • Easy to find • Clear and modern User Interface • Several locations • Many attack vectors • Multiple paiement options • Support center • Community Manager Really really easy!!!
4.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 4 Modern day DDoS attacks are Complex Dynamic Multi-vector Combination The Internet BotNet Your ISP Firewall Your Data Center Volumetric Attacks ◦ Large(up to 500 Gbps) ◦ Saturates links TCP State-Exhaustion Attacks Crashes◦ stateful devices (Load balancers, firewalls, IPSs) Application Layer Attacks ◦ Low and Slow, Stealth attacks ◦ Crashes application servers Legitimate Traffic
5.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 5 Dutch banks crippled by DDoS Attack January 2018 Myth: ABN Amro CEO Kees van Dijkhuizen said that “attacks like these probably cost the perpetrators tens of millions of euros”, fuelling speculation that the attack had come from a nation state. Fact: But the truth has proved rather less spectacular when police arrested an 18-year- old known as Jelle S in his home town of Oosterhout. Jelle claimed to have bought a ready-made “stresser” DDoS package on the dark web for which he had paid €50 a week to send 50-100Gb/s of data to victims. Source: computerweekly.com
6.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 6 The Cyber Reflection Every Physical Geo-Political Event… Has a Cyber Reflection…
7.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 7 Every event has a cyber reflection Attack targets were not necessarily the events themselves, but organizations tangentially associated with the events.
8.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 8 Who are we? We See What Others Can’t Collaboration Continuous Innovation > 100 Countries Protect World’s Largest Networks Leading Authority
9.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 9 Arbor Networks The Security Division of Industry leader in DDoS attack protection products. Number of years Arbor has been delivering innovative security and network visibility technologies & products 18 98% Percentage of world’s Tier 1 service providers who are Arbor customers http://digitalattackmap.com Amount of Internet traffic monitored by the ATLAS 1/3
10.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 10 • New weaponized attack vector • Targets a vulnerability in a Datacenter service used to improve request performance • Amplification factor can go up to 1:500,000 (maximum achieved in a lab environment) • 1Mbps can generate 50Gbps • Not the most dangerous attack Peak attacks And after Memcached
11.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 11 On-PremThe Internet In-Operator Intelligent coordination between on-prem and in-cloud protection 2 Global, In-Cloud, Volumetric Attack Protection (over 7 Tbps Mitigation Capacity) 3 Detection & Alerting with Mitigation Capabilities 1 Backed by global threat intelligence4 Operator Scrubbing Center Cloud Signal Arbor APS Volumetric Attack Application Attack Botnet, DDoS, Malware DDoS Protection Against Complex Attacks Hybrid Model
12.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 12 How to counter every type of attack Data Center Firewall IDS Backbone ISP 3 ISP 2 ISP 1 Load Balancer Saturation Volumetric or Flooding Attack Exhaustion of State L4 – L7 Crashes stateful devices (Load Balancers, Firewalls, IPS/IDS) Exhaustion of Service L4 – L7 Application Layer or Slow & Low Attack, Crashes application servers
13.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 13 13©2016 ARBOR® CONFIDENTIAL & PROPRIETARY DDoS Attacks Vectors and Mitigation Options • UDP / ICMP Floods : Reflection/Amplification NTP/DNS/SSDP/SNMP/MS-SQL attacks • IP / TCP /UDP Fragments Floods • Procotol Floods (GRE) Volumetric Attacks • TCP SYN (ACK) Floods • Window Size Attacks (Sockstress, etc) • Slow TCP Connections (TCP Idling, etc) State Exhaustion Attacks • Http-Get / Post Floods (LOIC, HOIC) • HTTP Slow request (Slowloris, Pyloris) • DNS Floods (DNS water torture) • DNS Authentication • SSL Renegociation (THC, Pushdo) • SSL Encrypted (HTTPS) Application Layer Attacks Confidential Arbor Networks – For Internal Use Only Arbor Cloud Operator Scrubbing (Arbor SP/TMS) ISP / In-Cloud Arbor CloudOperator Scrubbing (Arbor SP/TMS) ISP / In-Cloud On-Premise (Arbor APS)
14.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 14 VOLUMETRIC ATTACKS USING ARBOR SP AND BGP FLOWSPEC Core Peering Edge BGP FS BGP FS Peering Edge UDP RA attack UDP RA attack Arbor TMS Arbor SP • Arbor SP does Automatic BGP FlowSpec Blocking on routers – Block UDP Reflection/Amplifcation Attacks • Memcached, NTP, SSDP, CLDAP – Arbor SP automatically detects and blocks attacks on routers • Arbor TMS capacity can be used for other complex attacks : L4 TCP – L7 (DNS / HTTP) • Leverages the routers capacity to block large UDP attacks – 1.7 Tbps was the largest attack (memcached)
15.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 15 Thank You. www.netscout.com Reda Nedjar rnedjar@arbor.net