Workshop Program
Click here for printable version (PDF)
| 9¿ù 29ÀÏ (È¿äÀÏ) |
|---|
| ¼¼¼Ç 1 09:00 - 11:00 |
77DDoS (ÁÂÀå : ¼ÛÁØÈ) |
|---|---|
| 09:00 - 09:40 |
Response Activities on 77DDoS Attack by KrCERT |
| 09:40 - 10:20 |
How 77DDoS Attack Observed in the Japanese Internet |
| 10:20 - 11:00 |
What was wrong with our DDoS Defense Strategy against 77DDoS Attack in Korea |
| 11:00 - 11:20 | ÈÞ½Ä |
| ¼¼¼Ç 2 11:20 - 12:40 |
DDoS Attacks (ÁÂÀå : À̵¿¸¸) |
| 11:20 - 12:00 |
An Economic View of DDOS Attacks, Defense, and Future Research Investments |
| 12:00 - 12:40 |
Coremelt: a Powerful New DDoS Attack. Researching Countermeasures |
| 12:40 - 14:00 | Áᫎ |
| ¼¼¼Ç 3 14:00 - 15:20 |
Worm and Botnet Detection (ÁÂÀå : ±è¿ë´ë)
|
| 14:00 - 14:40 |
Botnet Detection and Response |
| 14:40 - 15:20 |
Detecting DDoS Attacks and Worms Using Randomness Check |
| 15:20 - 15:30 | ÈÞ½Ä |
| ¼¼¼Ç 4 15:30 - 16:50 |
Future of Botnets (ÁÂÀå : ¹®¼öº¹) |
| 15:30 - 16:10 |
Resilient P2P Botnets |
| 16:10 - 16:50 |
(Im)possibility of Enumerating Zombies in a Botnet |
| 16:50 - 17:00 | ÈÞ½Ä |
| ÆÐ³ÎÅäÀÇ 17:00 - 18:20 |
Future DDoS Attacks and Defenses (ÁÂÀå : ±è¼¼Çå) |
| 18:40 - 21:00 | Banquet |
| 9¿ù 30ÀÏ (¼ö¿äÀÏ) |
|---|
| ¼¼¼Ç 5 09:00 - 10:20 | Monitoring DDoS (ÁÂÀå : ±è¼øÅÂ) |
|---|---|
| 09:00 - 09:40 |
Measuring Politically Motivated Denial of Service Attacks |
| 09:40 - 10:20 |
DDoS Monitoring System using Cloud AV |
| 10:20 - 10:40 | ÈÞ½Ä |
| ¼¼¼Ç 6 10:40 - 12:00 | DDoS Self-Defense (ÁÂÀå : ±è±¤Á¶) |
| 10:40 - 11:20 |
DDoS Attack Traceback and Beyond |
| 11:20 - 12:00 |
DDoS Self-Defense |
| 12:00 - 13:00 | Áᫎ |
| 13:00 | Æóȸ |