DDoS Attacks and Defenses


Resource | v1 | created by coursera-bot |
Type Course
Created unavailable
Identifier unavailable

Description

In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware and perform source code analysis. you will be provided with a brief overview of DDoS Defense techniques. You learn an Autonomous Anti-DDoS Network called A2D2 for small/medium size organizations to deal with DDoS attacks. A2D2 uses Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types. You learn the new Intrusion tolerance paradigm with proxy-based multipath routing for DDoS defense. By developing and deploying such a new security mechanism, you can improve performance and reliability of the system at the same time and it does not have to be just an overhead. By the end of this course, you should be able to analyze new DDoS malware, collect forensic evidences, deploy firewall features to reduce the impact of DDoS on your system and develop strategies for dealing with future DDoS attacks.

Relations

Currently, no topics are attached.

supervised by University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stag...

Currently, no resources are attached.


Edit resource New resource

0.0 /10
useless alright awesome
from 0 reviews
Write comment Rate resource Tip: Rating is anonymous unless you also write a comment.
Resource level 0.0 /10
beginner intermediate advanced
Resource clarity 0.0 /10
hardly clear sometimes unclear perfectly clear
Reviewer's background 0.0 /10
none basics intermediate advanced expert
Comments 0
Currently, there aren't any comments.