Workshop Program
Click here for printable version (PDF)
9¿ù 29ÀÏ (È¿äÀÏ) |
---|
¼¼¼Ç 1 09:00 - 11:00 |
77DDoS (ÁÂÀå : ¼ÛÁØÈ) |
---|---|
09:00 - 09:40 |
Response Activities on 77DDoS Attack by KrCERT |
09:40 - 10:20 |
How 77DDoS Attack Observed in the Japanese Internet |
10:20 - 11:00 |
What was wrong with our DDoS Defense Strategy against 77DDoS Attack in Korea |
11:00 - 11:20 | ÈÞ½Ä |
¼¼¼Ç 2 11:20 - 12:40 |
DDoS Attacks (ÁÂÀå : À̵¿¸¸) |
11:20 - 12:00 |
An Economic View of DDOS Attacks, Defense, and Future Research Investments |
12:00 - 12:40 |
Coremelt: a Powerful New DDoS Attack. Researching Countermeasures |
12:40 - 14:00 | Áᫎ |
¼¼¼Ç 3 14:00 - 15:20 |
Worm and Botnet Detection (ÁÂÀå : ±è¿ë´ë)
|
14:00 - 14:40 |
Botnet Detection and Response |
14:40 - 15:20 |
Detecting DDoS Attacks and Worms Using Randomness Check |
15:20 - 15:30 | ÈÞ½Ä |
¼¼¼Ç 4 15:30 - 16:50 |
Future of Botnets (ÁÂÀå : ¹®¼öº¹) |
15:30 - 16:10 |
Resilient P2P Botnets |
16:10 - 16:50 |
(Im)possibility of Enumerating Zombies in a Botnet |
16:50 - 17:00 | ÈÞ½Ä |
ÆгÎÅäÀÇ 17:00 - 18:20 |
Future DDoS Attacks and Defenses (ÁÂÀå : ±è¼¼Çå) |
18:40 - 21:00 | Banquet |
9¿ù 30ÀÏ (¼ö¿äÀÏ) |
---|
¼¼¼Ç 5 09:00 - 10:20 | Monitoring DDoS (ÁÂÀå : ±è¼øÅÂ) |
---|---|
09:00 - 09:40 |
Measuring Politically Motivated Denial of Service Attacks |
09:40 - 10:20 |
DDoS Monitoring System using Cloud AV |
10:20 - 10:40 | ÈÞ½Ä |
¼¼¼Ç 6 10:40 - 12:00 | DDoS Self-Defense (ÁÂÀå : ±è±¤Á¶) |
10:40 - 11:20 |
DDoS Attack Traceback and Beyond |
11:20 - 12:00 |
DDoS Self-Defense |
12:00 - 13:00 | Áᫎ |
13:00 | Æóȸ |