17
Collaboration For DDoS Attack Mitigation in the Netherlands Jair Santanna jairsantanna.com [email protected] 22/02/2017

Meeting Towards Collaboration for DDoS Attack Mitigation

Embed Size (px)

Citation preview

Page 1: Meeting Towards Collaboration for DDoS Attack Mitigation

CollaborationFor DDoS Attack Mitigation in the Netherlands

Jair Santanna jairsantanna.com

[email protected] 22/02/2017

Page 2: Meeting Towards Collaboration for DDoS Attack Mitigation
Page 3: Meeting Towards Collaboration for DDoS Attack Mitigation

•Characterizing and Mitigating The DDoS-as-a-Service Phenomenon

•Booter Websites Characterization: Towards a list of threats •Booter Blacklist: Unveiling DDoS-for-hire Websites

•Booters - An Analysis of DDoS-as-a-Service Attacks •DDoS 3.0 - How Terrorists Bring Down the Internet

•Inside Booters: An Analysis on Operational Databases •Helping the Future of Cyber Teenagers - Facilitating Analysis and

Notification of People Associated with Booter DDoS Database

• Booters: Can Anything Justify DDoS Attacks for Hire?

• Quite Dogs Can Bite: What Booters We Should Go After? And Which Are Our Mitigation Options

http://booterblacklist.com

http://jairsantanna.com/booter_dbs_analyses

http://jairsantanna.com/booter_ecosystem_analysis

Page 4: Meeting Towards Collaboration for DDoS Attack Mitigation

DDoSDistributed Denial of Service

Attack

Page 5: Meeting Towards Collaboration for DDoS Attack Mitigation

US$ 53.000,00

US$ 417.000,00

Kaspersky Lab. (2015). Denial of Service: How Businesses Evaluate the Threat of DDoS Attacks.

[SMB]

Page 6: Meeting Towards Collaboration for DDoS Attack Mitigation

http://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/

Page 7: Meeting Towards Collaboration for DDoS Attack Mitigation
Page 8: Meeting Towards Collaboration for DDoS Attack Mitigation

Academia Private Organisations

Public Organisations

Page 9: Meeting Towards Collaboration for DDoS Attack Mitigation
Page 10: Meeting Towards Collaboration for DDoS Attack Mitigation
Page 11: Meeting Towards Collaboration for DDoS Attack Mitigation
Page 12: Meeting Towards Collaboration for DDoS Attack Mitigation

1. Collect

2. Transform

3. Apply

4. Disseminate

Page 13: Meeting Towards Collaboration for DDoS Attack Mitigation
Page 14: Meeting Towards Collaboration for DDoS Attack Mitigation

1. Collect

2. Transform

3. Apply

4. Disseminate

Page 15: Meeting Towards Collaboration for DDoS Attack Mitigation

CollaborationFor DDoS Attack Mitigation in the Netherlands

Jair Santanna jairsantanna.com

[email protected] 22/02/2017

Page 16: Meeting Towards Collaboration for DDoS Attack Mitigation
Page 17: Meeting Towards Collaboration for DDoS Attack Mitigation