Detection, Tagging and Mitigation

Business model discussion (Security as a Service)

F5 Silverline Managed DDOS Protection Service: https://aws.amazon.com/marketplace/pp/F5-Networks-F5-Silverline-Managed-DDOS-Protection-/B083VZXLQXarrow-up-right

HiveWind: https://aws.amazon.com/marketplace/pp/HiveWind-LLC-HiveShield-DDoS-Blocking-Load-Balance/B00WGTQF1Garrow-up-right

Imperva: https://aws.amazon.com/marketplace/pp/Incapsula-Inc-Incapsula-DDoS-Protection-for-AWS/B00LNJNCDYarrow-up-right

Mitigation XDP

https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=8789414arrow-up-right

Automated Monitoring and Security Services in Federated Software-defined Network Infrastructures https://dspace.lib.ntua.gr/xmlui/bitstream/handle/123456789/50875/20200630_dissertation_APAVLIDIS.pdf?sequence=1&isAllowed=yarrow-up-right

參考一下XDP, DDoS的防禦方式,好像有三層,比較粗的,比較細的,AI的。

Introducing SmartNICs in Server-based Data Plane Processing: The DDoS Mitigation Use Case: https://www.cambridge.org/core/journals/knowledge-engineering-review/article/orchestrating-ddos-mitigation-via-blockchainbased-network-provider-collaborations/1E9D4FF7E3B72E442D615F1C811B26CBarrow-up-right

SmartNIC-based mitigation

Orchestrating DDoS mitigation via blockchain-based network provider collaborations https://www.cambridge.org/core/journals/knowledge-engineering-review/article/orchestrating-ddos-mitigation-via-blockchainbased-network-provider-collaborations/1E9D4FF7E3B72E442D615F1C811B26CBarrow-up-right

為什麼要用Bloackchain

Fast Packet Processing with eBPF and XDP: Concepts, Code, Challenges, and Applications https://dl.acm.org/doi/pdf/10.1145/3371038?casa_token=iOI93t9XStwAAAAA:_1yQqdCG7NR6VAy5x37GZjc4sLv3y9HhgKu4ODUEDjdQgr6oNN7hO8cFW63KmKDRLtmlSWCLua-Ddwarrow-up-right

ACHIEVING NETWORK RESILIENCY USING SOUND THEORETICAL AND PRACTICAL METHODS https://www.ideals.illinois.edu/bitstream/handle/2142/108512/NOUREDDINE-DISSERTATION-2020.pdf?sequence=1&isAllowed=yarrow-up-right

Efficient DDoS Detection based on K-FKNN in Software Defined Networks https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=8889743arrow-up-right

Examining the Security of DDoS Detection Systems in Software Defined Networks https://dl.acm.org/doi/pdf/10.1145/3360468.3368174?casa_token=rQ9cWtMR-ncAAAAA:85Hf_ygxCtQy-qLyFrmMKTdkytJ1PIBwahUvP2ezvkzEzzaI7OjaA71XzNHgH4E-2Fc_YSzZqZ_qCQarrow-up-right

Magic Transit makes your network smarter, better, stronger, and cheaper to operate https://blog.cloudflare.com/magic-transit/arrow-up-right

KDATACENTER, https://www.kdatacenter.com/index.htmlarrow-up-right

Super Fast Packet Filtering with eBPF and XDP https://events19.linuxfoundation.org/wp-content/uploads/2017/12/Super-Fast-Packet-Filtering-with-eBPF-and-XDP-Helen-Tabunshchyk-Cloudflare-1.pdfarrow-up-right

Detecting Asymmetric Application-layer Denial-of-Service Attacks in-flight with FINELAME, http://nikos.vasilak.is/pubs/finelame:atc:2019/paper.pdfarrow-up-right

Cases

XDP in Practice: DDoS Mitigation @Cloudflare https://www.infoq.com/presentations/xdp-ddos-cloudflare/arrow-up-right

https://blog.cloudflare.com/protecting-remote-desktops-at-scale-with-cloudflare-access/arrow-up-right

https://blog.cloudflare.com/l4drop-xdp-ebpf-based-ddos-mitigations/arrow-up-right

EDR, Ransomware

https://news.sophos.com/en-us/2020/08/04/the-realities-of-ransomware-five-signs-youre-about-to-be-attacked/arrow-up-right

Network Detection & Response vs. Network Traffic Analysis https://www.extrahop.com/company/blog/2019/ndr-vs-nta-network-detection-and-response-defined/arrow-up-right

Papers

http://cse.sustech.edu.cn/faculty/~zhangfw/paper/tang-compsec20.pdfarrow-up-right

https://evessio.s3.amazonaws.com/customer/8c4659ee-526a-4e9c-89dc-f6f4c3c1a789/event/cybersecurity-chicago/Exhibitors/protectwise-0_ProtectWise-datasheet-NDR-Network-Detection-Response.pdfarrow-up-right

Becoming a super hero is a fairly straight forward process:

Network Detection and Response (NDR)

Last updated