Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The Future of Data Exfiltration and Malicious Communication

WEareTROOPERS via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a conference talk on advanced data exfiltration techniques and malicious communication methods. Delve into covert channels, protocol channels, and protocol hopping covert channels. Learn about shared resource matrices, covert flow trees, and traffic normalization. Discover micro protocol engineering approaches and status update techniques. Examine packet forwarding examples and requirements for covert channel routing. Investigate agents and drones for overlay routing. Gain insights into BACnet protection and the implementation of multi-level security using an open-source BACnet firewall router. Access related publications to further expand your knowledge on these cutting-edge cybersecurity topics.

Syllabus

Intro
Typical Techniques for Covert Channels
Shared Resource Matrix
Covert Flow Trees
Traffic Normalization
Other Approaches
Summary (pt. 1)
Protocol Channels & Protocol Hopping Covert Channels
Terminology
Combining Multiple Layers
Micro Prot. Engineering Approach
Status Update Approach
Example: Packet Forwarding
Requirements for CC Routing
Agents and Drones for Overlay Routing
Summary (pt. 2)
BACnet Protection
Introducing MLS using the Open Source BACnet Firewall Router
Summary (pt. 3)
Related Publications

Taught by

WEareTROOPERS

Reviews

Start your review of The Future of Data Exfiltration and Malicious Communication

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.