Attack Mining: Using Distributed Sensors to Identify and Take Down Cyber Adversaries
media.ccc.de via YouTube
AI, Data Science & Cloud Certificates from Google, IBM & Meta
Learn the Skills Netflix, Meta, and Capital One Actually Hire For
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a comprehensive conference talk from the 38th Chaos Communication Congress (38C3) that delves into analyzing and combating cyber attacks using distributed sensor networks. Learn how to set up systems that collect attack data from multiple sensors worldwide, understand the process of enriching this data centrally, and discover effective methods for reporting abuse to ISPs and governing bodies. Examine the implementation of Docker containers with modified OpenSSH servers that log attack attempts while remaining undetectable to adversaries. Gain insights into attack patterns, credential analysis, and the correlation between internet-identifiable information and attack strategies. Understand the effectiveness of various takedown approaches, including response times from different ISPs and regional variations in cooperation. Master defensive strategies based on real attack data and learn how to contribute to making the internet more secure through proactive threat identification and reporting.
Syllabus
38C3 - Attack Mining: How to use distributed sensors to identify and take down adversaries
Taught by
media.ccc.de