Cloud Aggregation: Smart Access to a Smarter CloudExponential_e
The noise in the market is all about placing data in the cloud – security,
compliance and risk. However, a good cloud strategy is underpinned with the network providing the access to cloud services and providers. How secure is the route to the cloud, is the infrastructure fit for purpose and is bandwidth scalable?
Jeremy Cowan's AWS user group presentation "AWS Greengrass & IoT demo"AWS Chicago
"AWS Greengrass & IoT demo" - by Jeremy Cowan, Solutions Architect at Amazon Web Services
This presentation was given at the AWS Chicago user group event on 22 March 2017 on the Internet of Things (IoT)
https://www.meetup.com/AWS-Chicago/events/237737145/
@jicowan
AWS IoT is a managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices. In this tech talk, we will discuss how constrained devices can leverage AWS IoT to send data to the cloud and receive commands back to the device from the cloud using the protocol of their choice. We will use the AWS IoT Button to demonstrate building a real connected product, securely connect with AWS IoT using MQTT, WebSockets, and HTTP protocols, and show how developers and businesses can leverage features of AWS IoT like Device Shadows and the Rules Engine, which provides message processing and integration with other AWS services.
Cloud computing is the emerging trend in todays world. Cloud computing is not a separate technology, it is platform which provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is that we hire everything from a third party or store our important datas in a third parties place .Here comes the major issue of how our datas are secured. In this paper, we discuss about how to protect our datas in the cloud with various cryptographic techniques. Padmapriya I | Ragini H "Cloud Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21547.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/21547/cloud-cryptography/padmapriya-i
Serverless is the new hotness, but are Azure Functions right for your system?
Presented by Adam Jones, Chief Technology Officer for LHP Telematics, LLC based in Westfield, IN.
Cloud Aggregation: Smart Access to a Smarter CloudExponential_e
The noise in the market is all about placing data in the cloud – security,
compliance and risk. However, a good cloud strategy is underpinned with the network providing the access to cloud services and providers. How secure is the route to the cloud, is the infrastructure fit for purpose and is bandwidth scalable?
Jeremy Cowan's AWS user group presentation "AWS Greengrass & IoT demo"AWS Chicago
"AWS Greengrass & IoT demo" - by Jeremy Cowan, Solutions Architect at Amazon Web Services
This presentation was given at the AWS Chicago user group event on 22 March 2017 on the Internet of Things (IoT)
https://www.meetup.com/AWS-Chicago/events/237737145/
@jicowan
AWS IoT is a managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices. In this tech talk, we will discuss how constrained devices can leverage AWS IoT to send data to the cloud and receive commands back to the device from the cloud using the protocol of their choice. We will use the AWS IoT Button to demonstrate building a real connected product, securely connect with AWS IoT using MQTT, WebSockets, and HTTP protocols, and show how developers and businesses can leverage features of AWS IoT like Device Shadows and the Rules Engine, which provides message processing and integration with other AWS services.
Cloud computing is the emerging trend in todays world. Cloud computing is not a separate technology, it is platform which provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is that we hire everything from a third party or store our important datas in a third parties place .Here comes the major issue of how our datas are secured. In this paper, we discuss about how to protect our datas in the cloud with various cryptographic techniques. Padmapriya I | Ragini H "Cloud Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21547.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/21547/cloud-cryptography/padmapriya-i
Serverless is the new hotness, but are Azure Functions right for your system?
Presented by Adam Jones, Chief Technology Officer for LHP Telematics, LLC based in Westfield, IN.
AWS Greengrass is a new software platform for running local compute, data caching and messaging on connected devices. With AWS Greengrass, connected devices can run AWS Lambda functions, keep device data in sync, and communicate with other devices securely – even when not connected to the Internet. Using AWS Lambda, Greengrass ensures your IoT devices can respond quickly to local events, operate with intermittent connections, and minimize the cost of transmitting IoT data to the cloud.
Attack graph generation for micro services architectureAbdul Qadir
Cyber crime is an evolving issue for global enterprises and individuals. Cyber criminals (i.e., attackers) are focusing more on valuable assets and critical infrastructures in a networked system (e.g., enterprise systems and cyber physical systems), which potentially has a high socioeconomic impact in an event of an attack. Security mechanisms (e.g., firewalls) may enhance the security, but the overall in-depth security of the networked system cannot be estimated without a security analysis (e.g., cannot identify security flaws and potential threats). Moreover, attackers may explore an attack surface of the networked system to find vulnerabilities, and exploit them to penetrate through. Therefore, it is important to reduce and continuously change the attack surface based on a security analysis.
When remote command injection attacks succeed at the entry points of a cloud (servers exposed to the outside Internet), attackers targeting a specific asset in the cloud will pursue further exploration to find their targets. Attack targets, such as database servers, are often running on separate machines, forcing an extra step for a successful attack.
Scaling Security in the Cloud With Open SourceCloudVillage
The programmability of the cloud has revolutionized infrastructure deployments at scale and, at the same time, has enabled the automation of both the attack and defense of these deployments. In this talk, I will discuss the open-source tools and the techniques that my organization has used to scale security in the cloud to keep pace with our deployments. I’ll also cover how we’ve used automation to adapt security processes to cloud strategies such as immutable servers. Some topics include: temporal leasing of API access keys and database credentials, automation of patching groups and scans, and automated enforcement of configuration policy.
Exploiting IAM in the google cloud platform - dani_goland_mohsan_faridCloudVillage
"Cloud infrastructure design is complex and makes even the most straight-forward topics, such as Identity and Access Management (IAM), non-trivial and confusing and therefore, full of security risk. While AWS IAM provides for access via console and API/CLI using access keys, there is also a temporary security tokens feature, designed for secure temporary access. However, temporary tokens have multiple security pot-holes that can lead to exploits.
I'll explore the limitations of temporary tokens including:
- the lack of visibility/management
- minimal logging
- limited remediation options
and how this can be taken advantage of, especially in combination with other techniques such as assuming of roles, pre-signed URLs, log attacks, and serverless functions to achieve persistence, lateral movement, and obfuscation.
In addition, I’ll look at common defensive techniques and best practices around lockdown, provisioning, logging and alerting to see whether these are practical and can shift the field."
Why does connecting your physical devices to the cloud create more value for the user? How can connectivity enhance user experience? Why does connecting your things enhance your business model? In this session, Kyle Roche, GM of AWS IoT, will discuss the power of connecting your devices to the cloud and share AWS vision and latest products and features. Kyle provides an overview of real customer use cases and shares trends we are seeing among IoT customers. He will also bring some key customers on stage to share their experiences.
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Web Services
In this session, we will walk through the fundamentals of Amazon Virtual Private Cloud (VPC). We will discuss core VPC concepts including picking your IP space, subnetting, routing, security, NAT and VPC Endpoints.
Processing Real-time Sensor Data Streams for 3D Web VisualizationArne Bröring
Today, myriads of sensors are surrounding us. Their usage ranges from environmental monitoring (e.g., weather and air quality), over sensor-equipped smart buildings, to the quantified self and other human observing applications. The data streams produced by such sensors often update with high frequencies, resulting in large data volumes. Being able to analyze those real-time sensor data streams requires efficient visualization techniques. In our work, we explore how 3D visualizations can be used to extend the available information space. More specifically, we present an approach for processing real-time sensor data streams to enable scalable Web-based 3D visualizations. Based on an event-driven architecture, our key contribution is the presentation of three processing patterns to optimize transmission of sensor data streams to 3D Web clients.
DDoS attacks make headlines everyday, but how do they work and how can you defend against them? DDoS attacks can be high volume UDP traffic floods, SYN floods, DNS amplification, or Layer 7 HTTP attacks. Understanding how to protect yourself from DDoS is critical to doing business on the internet today. Suzanne Aldrich, a lead Solutions Engineer at Cloudflare, will cover how these attacks work, what is being targeted by the attackers, and how you can protect against the different attack types. She will cap the session with the rise in IoT attacks, and expectations for the future of web security.
AWS Greengrass is a new software platform for running local compute, data caching and messaging on connected devices. With AWS Greengrass, connected devices can run AWS Lambda functions, keep device data in sync, and communicate with other devices securely – even when not connected to the Internet. Using AWS Lambda, Greengrass ensures your IoT devices can respond quickly to local events, operate with intermittent connections, and minimize the cost of transmitting IoT data to the cloud.
Attack graph generation for micro services architectureAbdul Qadir
Cyber crime is an evolving issue for global enterprises and individuals. Cyber criminals (i.e., attackers) are focusing more on valuable assets and critical infrastructures in a networked system (e.g., enterprise systems and cyber physical systems), which potentially has a high socioeconomic impact in an event of an attack. Security mechanisms (e.g., firewalls) may enhance the security, but the overall in-depth security of the networked system cannot be estimated without a security analysis (e.g., cannot identify security flaws and potential threats). Moreover, attackers may explore an attack surface of the networked system to find vulnerabilities, and exploit them to penetrate through. Therefore, it is important to reduce and continuously change the attack surface based on a security analysis.
When remote command injection attacks succeed at the entry points of a cloud (servers exposed to the outside Internet), attackers targeting a specific asset in the cloud will pursue further exploration to find their targets. Attack targets, such as database servers, are often running on separate machines, forcing an extra step for a successful attack.
Scaling Security in the Cloud With Open SourceCloudVillage
The programmability of the cloud has revolutionized infrastructure deployments at scale and, at the same time, has enabled the automation of both the attack and defense of these deployments. In this talk, I will discuss the open-source tools and the techniques that my organization has used to scale security in the cloud to keep pace with our deployments. I’ll also cover how we’ve used automation to adapt security processes to cloud strategies such as immutable servers. Some topics include: temporal leasing of API access keys and database credentials, automation of patching groups and scans, and automated enforcement of configuration policy.
Exploiting IAM in the google cloud platform - dani_goland_mohsan_faridCloudVillage
"Cloud infrastructure design is complex and makes even the most straight-forward topics, such as Identity and Access Management (IAM), non-trivial and confusing and therefore, full of security risk. While AWS IAM provides for access via console and API/CLI using access keys, there is also a temporary security tokens feature, designed for secure temporary access. However, temporary tokens have multiple security pot-holes that can lead to exploits.
I'll explore the limitations of temporary tokens including:
- the lack of visibility/management
- minimal logging
- limited remediation options
and how this can be taken advantage of, especially in combination with other techniques such as assuming of roles, pre-signed URLs, log attacks, and serverless functions to achieve persistence, lateral movement, and obfuscation.
In addition, I’ll look at common defensive techniques and best practices around lockdown, provisioning, logging and alerting to see whether these are practical and can shift the field."
Why does connecting your physical devices to the cloud create more value for the user? How can connectivity enhance user experience? Why does connecting your things enhance your business model? In this session, Kyle Roche, GM of AWS IoT, will discuss the power of connecting your devices to the cloud and share AWS vision and latest products and features. Kyle provides an overview of real customer use cases and shares trends we are seeing among IoT customers. He will also bring some key customers on stage to share their experiences.
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Web Services
In this session, we will walk through the fundamentals of Amazon Virtual Private Cloud (VPC). We will discuss core VPC concepts including picking your IP space, subnetting, routing, security, NAT and VPC Endpoints.
Processing Real-time Sensor Data Streams for 3D Web VisualizationArne Bröring
Today, myriads of sensors are surrounding us. Their usage ranges from environmental monitoring (e.g., weather and air quality), over sensor-equipped smart buildings, to the quantified self and other human observing applications. The data streams produced by such sensors often update with high frequencies, resulting in large data volumes. Being able to analyze those real-time sensor data streams requires efficient visualization techniques. In our work, we explore how 3D visualizations can be used to extend the available information space. More specifically, we present an approach for processing real-time sensor data streams to enable scalable Web-based 3D visualizations. Based on an event-driven architecture, our key contribution is the presentation of three processing patterns to optimize transmission of sensor data streams to 3D Web clients.
DDoS attacks make headlines everyday, but how do they work and how can you defend against them? DDoS attacks can be high volume UDP traffic floods, SYN floods, DNS amplification, or Layer 7 HTTP attacks. Understanding how to protect yourself from DDoS is critical to doing business on the internet today. Suzanne Aldrich, a lead Solutions Engineer at Cloudflare, will cover how these attacks work, what is being targeted by the attackers, and how you can protect against the different attack types. She will cap the session with the rise in IoT attacks, and expectations for the future of web security.
A Survey: DDOS Attack on Internet of ThingsIJERD Editor
Internet of Things refer as interconnection of smart object, included from small coffee machine to
big car, communicate with each other without human interactions also called as Device to Device
communications. In current emerging world, all of the devices become smarter and can communicate with other
devices as well. With this rapid development of Internet of Things in different area like smart home, smart
hospital etc. it also have to face some difficulty to securing overall privacy due to heterogeneity nature. There
are so many types of vulnerability but here in this paper we put concentration on Distributed Denial of Service
attack (DDoS). DoS is attack which can block the usage for authentic user and make network resource
unavailable, consume bandwidth; if similar attack is penetrated from different sources its call DDoS. To prevent
from such attack it need mechanism that can detect and prevent it from attack, but due to small devices it has
limited power capacity. So that mechanism must be implemented at network entrance. In this paper we discuss
different DDoS attack and its effect on IoT.
Matt Johnson, Eduserv's Cloud Services Product Manager, talked about how we handled a Denial of Service attack at the Amazon Web Services UK User Group.
Denial-of-service (DoS) attack: is an action that prevents or
impairs the authorized use of networks, systems or applications
by exhausting resources such as central processing units (CPU),
memory, bandwidth and disk space.
OR
• Denial-of-service (DoS) attack: An attack that attempts to
overwhelm a computer’s ability to handle incoming
communications, prohibiting legitimate users from accessing
those systems.
Distributed DoS (DDoS) attack: A form of DoS attack in which
a coordinated stream of requests is launched against a target
from many locations simultaneously using bots or zombies.
• Bot (also referred as botnet or zombie): an abbreviation of
robot, which is an automated software program that executes
certain commands when it receives a specific input.
Not Defendable Attacks
• DDoS attacks are difficult to defend against, and currently there
are no controls that any single organization can apply! WHY?
• Any system connected to the Internet and providing TCP-based
network services (such as a Web server, FTP server, mail server,
routers) is vulnerable to DoS/DDoS attacks.
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...Imperva Incapsula
DDoS attacks are bigger and more sophisticated than ever before. Odds are your business is going to be attacked – and without an effective mitigation strategy, you don't stand a chance.
In this webinar Andrew Shoemaker a DDoS simulation expert from NimbusDDOS gives you a rare glimpse into how hackers find the weak points in your defenses and exploit them to level devastating DDoS attacks. You'll see real world examples of the tactics and methods used to create tailored DDoS attacks that can bring down a targeted network or application, and learn how best to defend them.
<p>DDoS attacks make headlines everyday, but how do they work and how can you defend against them? DDoS attacks can be high volume UDP traffic floods, SYN floods, DNS amplification, or Layer 7 HTTP attacks. Understanding how to protect yourself from DDoS is critical to doing business on the internet today.</p>
<p>Suzanne Aldrich, a lead Solutions Engineer at Cloudflare, will cover how these attacks work, what is being targeted by the attackers, and how you can protect against the different attack types. She will cap the session with the rise in IoT attacks, and expectations for the future of web security.</p>
<p><strong>Speaker Bio</strong>:</p>
<p>Suzanne is a solutions engineer team lead at Cloudflare, where she specializes in security, performance, and usability. Her interest in all things web started in high school when she created the school’s first website. While at Stanford, Suzanne was the webmaster for a matchbox sized server running the Wearable Computing Lab’s site.</p>
Combating Cyberattacks through Network Agility and AutomationSagi Brody
As presented January 2018 at PTC18 in Hawaii. This talk covers the use of new network automation technologies and strategies which can be used to combat Cyberattacks including DDoS, Ransomware, and Reflection. The talk specifically discusses how DDoS monitoring and mitigation can be improved via the use of interconnection fabrics to replace traditional GRE tunnels for out-of-band communication; How Disaster Recovery (DRaaS) may be used as an entry point for Cyberattacks, how DRaaS infrastructure may be used to improve production site security, and how Managed Security Service providers can integrate directly with DRaaS infrastructure and Software-Defined-Perimeter solutions to improve automated network failover and failback
As presented on 1/31/2018 at Cisco NYC Security Open House. These slides describe how a proper Disaster Recovery infrastructure, with a proper an automated network integration can provide instant recovery from Ransomware attacks and can improve security of the production environment.
In this session, David Ting, VP of Engineering at DataVisor, explores the latency challenges associated with a global client base and what can be learned when implementing a performance-improving solution.
BDA403 The Visible Network: How Netflix Uses Kinesis Streams to Monitor Appli...Amazon Web Services
Thousands of services work in concert to deliver millions of hours of video streams to Netflix customers every day. These applications vary in size, function, and technology, but they all make use of the Netflix network to communicate. Understanding the interactions between these services is a daunting challenge both because of the sheer volume of traffic and the dynamic nature of deployments. In this talk, we’ll first discuss why Netflix chose Amazon Kinesis Streams over other data streaming solutions like Kafka to address these challenges at scale. We’ll then dive deep into how Netflix uses Amazon Kinesis Streams to enrich network traffic logs and identify usage patterns in real time. Lastly, we will cover how Netflix uses this system to build comprehensive dependency maps, increase network efficiency, and improve failure resiliency. From this talk, you’ll take away techniques and processes that you can apply to your large-scale networks and derive real-time, actionable insights.
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksCloudflare
DDoS attacks are evolving. Detecting and mitigating attacks quickly and accurately is a key strategy to ensure business continuity.
Join this webinar to learn about:
- What is a DDoS attack and what it can cost you
- Global DDoS attack trends and what it means to you
- How Cloudflare Magic Transit and Kentik together monitor and mitigate DDoS attacks of all sizes and kinds
Similar to Economical Denial of Sustainability in the Cloud (EDOS) (20)
Stephan Gerling in Bucharest, Romania on November 8-9th 2018 at DefCamp #9.
The videos and other presentations can be found on https://def.camp/archive
Stefan Zarinschi in Bucharest, Romania on November 8-9th 2018 at DefCamp #9.
The videos and other presentations can be found on https://def.camp/archive
Drupalgeddon 2 – Yet Another Weapon for the AttackerDefCamp
Radu-Emanuel Chiscariu in Bucharest, Romania on November 8-9th 2018 at DefCamp #9.
The videos and other presentations can be found on https://def.camp/archive
Mircea Nenciu and Stefan Mitroi in Bucharest, Romania on November 8-9th 2018 at DefCamp #9.
The videos and other presentations can be found on https://def.camp/archive
Threat Hunting: From Platitudes to Practical ApplicationDefCamp
Neil “Grifter” Wyler in Bucharest, Romania on November 8-9th 2018 at DefCamp #9.
The videos and other presentations can be found on https://def.camp/archive
Building application security with 0 money downDefCamp
Muhammad Mudassar Yamin in Bucharest, Romania on November 8-9th 2018 at DefCamp #9.
The videos and other presentations can be found on https://def.camp/archive
Implementation of information security techniques on modern android based Kio...DefCamp
Muhammad Mudassar Yamin in Bucharest, Romania on November 8-9th 2018 at DefCamp #9.
The videos and other presentations can be found on https://def.camp/archive
The challenge of building a secure and safe digital environment in healthcareDefCamp
Jelena Milosevic in Bucharest, Romania on November 8-9th 2018 at DefCamp #9.
The videos and other presentations can be found on https://def.camp/archive
Tor .onions: The Good, The Rotten and The Misconfigured DefCamp
Ionut-Cristian Bucur in Bucharest, Romania on November 8-9th 2018 at DefCamp #9.
The videos and other presentations can be found on https://def.camp/archive
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...DefCamp
Ioan Constantin in Bucharest, Romania on November 8-9th 2018 at DefCamp #9.
The videos and other presentations can be found on https://def.camp/archive
Cristian Pațachia-Sultănoiu in Bucharest, Romania on November 8-9th 2018 at DefCamp #9.
The videos and other presentations can be found on https://def.camp/archive
Catch Me If You Can - Finding APTs in your networkDefCamp
Adrian Tudor & Leo Neagu in Bucharest, Romania on November 8-9th 2018 at DefCamp #9.
The videos and other presentations can be found on https://def.camp/archive
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
4. DDoS – a serious threat. Why?
2016: 1,5 million hijacked wireless
cameras 1-Tbps DDoS attack
In 2017: the first Android botnet
(WireX) = 150.000 infected devices
BOTNETS
5. Attack numbers?
20,000 daily attacks
source: DDoSMon (2017)
$2.5 million DDoS costs per company
source: Neustar (2016-2017)
6. Examples:
Victim company When Attack peak size Attack duration Other details
Undisclosed
customer of a U.S.-
based service
provider
March
2018
1.7Tbps _ • Largest attack known until now
• Amplification attack.
GitHub February
2018
1.35Tbps 10 minutes • Memcached-Servers amplification attack
Microsoft’s and
Sony’s online
gaming services
(PSN and Xbox)
Christmas
2014
_ 2 days for Microsoft
3 days for Sony
• The attack took down entirely Microsoft’s
and Sony’s online gaming services.
• Millions of users were unable to play online
games or access entertainment channels
Runescape, a
gaming platform
2014 _ _ • Spent £6 million trying to defend against
the DDOS attack.
Rackspace, a Cloud
service provider
2014 _ 11 hours
11. DDoS protection in Cloud. How?
1h of downtime = How much revenue loss ?
NO ACCESS to
the physical
network
infrastructure
DDoS
Protection
as a Service
12. What’s the best you can do
with DDoSPaaS?
1.Reduce attack surface
2.Be ready to scale
3.Architect for resilience.
4. Register for live support service
Time-to-mitigation
= MONEY
13. 1. Reduce attack surface Expose ONLY if necessary
If exposed, protect, protect,
PROTECT!Cloud storage resources
Access Control Lists Ports
Firewall rules
Anti-spoofing protection
VPC network configuration
VPC Administrative Console
Identity Access Management
Internal traffic
Isolated:
• Public IP only if needed
• NAT Gateway
• Internal Load Balancing: for your internal client
instances accessing internally deployed services
thereby avoiding exposure to the external world.
You have API Frontend exposed to the
public
The API frontend is can be DDoS
attacked and expose resources
also => use the Cloud provider’s
API Gateway as a “front door”
14. 2. Be ready to scale Elastic Load Balancing
scales automatically at need => can manage larger volumes
1. Application Load Balancer routes traffic based on its
content and accepts only well-formed web requests => it
blocks SYN floods, UDP reflection attacks and others
2. Network Load Balancer For TCP-based applications,
you can use NLB to route traffic to Amazon EC2 instances
at ultralow latency
Elastic IP Addresses
Static IPv4 address designed for
dynamic cloud computing. If the
assigned instance fails, it is remapped
to another instance
Proper Elastic Computer type (resources-wise)
ex: 25Gb NIC & Enhanced Networking
Choose a SLA with automatic scaling
horizontally: add instances;
vertically: use larger instances
16. Limit, limit, limit!!!
per-IP request count
per-IP connection count
count of users who can make requests to your application
Choose a product which can properly
protect detect both bad AND GOOD
traffic (what if your web service has
a legit spike of clients?)
Costs!!!! Hidden or not!!! In the Cloud, even a sneeze costs!
Cloud-provided regions performance,
data sovereignty, optimal latency
Shared Responsibility Model !!!
Differences between the
DDoS protection products
DDoSPaaS – Other MUSTS
17. • Understand the differences
between Cloud DDoS
protection services
18. *Third party DDoSPaaS
Akamai helped protect against the
2018 1.35 TB attack against GitHub
Blockchain DDoS
mitigation
Ok, probably you all have heard about DDoS,
But what kind of animal is EDoS then?
What can become unavailable? In a very simplistic image,
they can target …
Today, ANYONE can launch a crippling attack for virtually
no money. Do you know why? Because of botnets.
DDoS-for-hire botnets - subscription-based model
Analytics company – analyze DDoS data around the world
Let me give you a few more examples so that you can better understand
THE SEVERITY of the problem
Do you guys like your Xbox? Do you remember the Christmas of 2014 when the
online service was down? Guess why.
How many of you are dependent on GitHub?
This year, luckily, Github was down only for 10 minutes. But what if it was
down for a couple of days?
Interesting fact? Do you want to see how a live DDoS looks like?
Well, here’s a preview.
You can go to digitalattackmap.com and see ACTUAL attacks
happening right now!!
Now let’s better understand how a DDoS is created.
Analytics
The latest strategy for attacks is to create a diversion by
having low-impact attacks just to test the waters and in the background
Network mapping - data breaches - infection with malware
If you think that protecting against DDoS was complicated on prems, well,
the cherry on top in Cloud
ONE QUESTION FOR YOU: If an un-mitigated attack costs 1 hour
Health Checks and Monitoring
AWS Shield Standard default, free
DNS at the Edge Amazon Route 53 DNS service with Traffic Flow, Latency Based Routing, Geo DNS, and Health Checks and Monitoring
Amazon CloudFront (CDN with caching takes load from EC2 instances + better internet speed and bandwidth to users at Amazon Edge Locations). distributes traffic across multiple edge locations and filters requests to ensure that only valid HTTP(S) requests will be forwarded to backend hosts. CloudFront also supports geoblocking, which you can use to prevent requests from particular geographic locations from being served.
AWS WAF A "regular" firewall typically only looks at layers 3 and 4 of the OSI model. For instance, to allow TCP port 80, allow UDP port 53 from only specific IP addresses, or deny TCP port 25.
For HTTP requests, once the "allow TCP port 80" hurdle is cleared, the firewall is uninterested in what's passed via that connection.
A Web Application Firewall works almost exclusively at layer 7, dealing with security in terms of the content of HTTP requests.
Mainly, they're looking to prevent requests that are outside what should be expected for your web application, using rules applied to incoming HTTP requests to prevent attacks like cross-site scripting, SQL injection, directory traversal, or brute-force authentication attempts. Essentially, their whole purpose is shielding the web server from the kinds of manipulated and malicious requests that attackers might use to compromise your web application.
Firewall - A device or application that analyzes packet headers and enforces policy based on protocol type, source address, destination address, source port, and/or destination port. Packets that do not match policy are rejected.
Intrusion Detection System - A device or application that analyzes whole packets, both header and payload, looking for known events. When a known event is detected a log message is generated detailing the event.
Intrusion Prevention System - A device or application that analyzes whole packets, both header and payload, looking for known events. When a known event is detected the packet is rejected.
Most cloud providers have DDoS resilience infrastructure architecture recommandations for different types of applications. For example:
Web applications
Non-web load-balanceable apps
Non-web non-load balanceable apps
DDoS Telemetry analyze the digital fingerprint, and gather intelligence
Regions Being close to exchanges where international carriers and large peers