Submit Search
Upload
State of the Internet: Mirai, IOT and History of Botnets
•
Download as PPTX, PDF
•
0 likes
•
767 views
Rahul Neel Mani
Follow
Ashwani Singhal, Head Security Operations Center Akamai
Read less
Read more
Technology
Report
Share
Report
Share
1 of 27
Download now
Recommended
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Rahul Neel Mani
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
jenkoon
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their Tracks
Imperva
Top 5 predictions webinar
Top 5 predictions webinar
Zscaler
Cyber Security 101
Cyber Security 101
Cloudflare
Zenith Live - Security Lab - Phantom
Zenith Live - Security Lab - Phantom
Zscaler
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
APNIC
Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?
Check Point Software Technologies
Recommended
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Rahul Neel Mani
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
jenkoon
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their Tracks
Imperva
Top 5 predictions webinar
Top 5 predictions webinar
Zscaler
Cyber Security 101
Cyber Security 101
Cloudflare
Zenith Live - Security Lab - Phantom
Zenith Live - Security Lab - Phantom
Zscaler
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
APNIC
Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?
Check Point Software Technologies
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
Cisco Enterprise Networks
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
Zscaler
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
Zscaler
Cisco Security Presentation
Cisco Security Presentation
Simplex
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
Cloudflare
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall Webinar
Imperva
Cyber security fundamentals
Cyber security fundamentals
Cloudflare
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
AlgoSec
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
Zscaler
Check Point NGFW
Check Point NGFW
Group of company MUK
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Zscaler
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnect
Robb Boyd
How Zero Trust Changes Identity & Access
How Zero Trust Changes Identity & Access
Ivan Dwyer
Accelerate your digital transformation
Accelerate your digital transformation
Cloudflare
Next Generation Security
Next Generation Security
Cisco Canada
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10
MarketingArrowECS_CZ
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
Zscaler
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
Moti Sagey מוטי שגיא
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
Imperva
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Rahul Neel Mani
ABC of Infosec
ABC of Infosec
Rahul Neel Mani
More Related Content
What's hot
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
Cisco Enterprise Networks
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
Zscaler
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
Zscaler
Cisco Security Presentation
Cisco Security Presentation
Simplex
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
Cloudflare
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall Webinar
Imperva
Cyber security fundamentals
Cyber security fundamentals
Cloudflare
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
AlgoSec
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
Zscaler
Check Point NGFW
Check Point NGFW
Group of company MUK
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Zscaler
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnect
Robb Boyd
How Zero Trust Changes Identity & Access
How Zero Trust Changes Identity & Access
Ivan Dwyer
Accelerate your digital transformation
Accelerate your digital transformation
Cloudflare
Next Generation Security
Next Generation Security
Cisco Canada
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10
MarketingArrowECS_CZ
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
Zscaler
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
Moti Sagey מוטי שגיא
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
Imperva
What's hot
(20)
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
Cisco Security Presentation
Cisco Security Presentation
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall Webinar
Cyber security fundamentals
Cyber security fundamentals
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
Check Point NGFW
Check Point NGFW
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnect
How Zero Trust Changes Identity & Access
How Zero Trust Changes Identity & Access
Accelerate your digital transformation
Accelerate your digital transformation
Next Generation Security
Next Generation Security
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
Viewers also liked
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Rahul Neel Mani
ABC of Infosec
ABC of Infosec
Rahul Neel Mani
Cyber Crime Management
Cyber Crime Management
Rahul Neel Mani
Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom?
Rahul Neel Mani
Get the Basics Right
Get the Basics Right
Rahul Neel Mani
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
Rahul Neel Mani
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
Rahul Neel Mani
Sumit dhar
Sumit dhar
Rahul Neel Mani
MIRAI: What is It, How Does it Work and Why Should I Care?
MIRAI: What is It, How Does it Work and Why Should I Care?
Memoori
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
Inderjeet Singh
ciso-platform-annual-summit-2013-Fgont-ipv6-myths-dynamic
ciso-platform-annual-summit-2013-Fgont-ipv6-myths-dynamic
Priyanka Aash
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Michael Davis
Building an InfoSec RedTeam
Building an InfoSec RedTeam
Dan Vasile
Introduction to Containers and Docker for PHP developers
Introduction to Containers and Docker for PHP developers
Robert McFrazier
Take Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva Kumar
Rahul Neel Mani
CIO Productivity Conclave 2016
CIO Productivity Conclave 2016
Rahul Neel Mani
Introduction of Mirai Translate, Inc.
Introduction of Mirai Translate, Inc.
Osaka University
Avoiding dns amplification attacks
Avoiding dns amplification attacks
Lucas Kauffman
Dns reflection attacks webinar slides
Dns reflection attacks webinar slides
Men and Mice
Drilling Down Into DNS DDoS
Drilling Down Into DNS DDoS
APNIC
Viewers also liked
(20)
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
ABC of Infosec
ABC of Infosec
Cyber Crime Management
Cyber Crime Management
Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom?
Get the Basics Right
Get the Basics Right
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
Sumit dhar
Sumit dhar
MIRAI: What is It, How Does it Work and Why Should I Care?
MIRAI: What is It, How Does it Work and Why Should I Care?
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
ciso-platform-annual-summit-2013-Fgont-ipv6-myths-dynamic
ciso-platform-annual-summit-2013-Fgont-ipv6-myths-dynamic
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Building an InfoSec RedTeam
Building an InfoSec RedTeam
Introduction to Containers and Docker for PHP developers
Introduction to Containers and Docker for PHP developers
Take Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva Kumar
CIO Productivity Conclave 2016
CIO Productivity Conclave 2016
Introduction of Mirai Translate, Inc.
Introduction of Mirai Translate, Inc.
Avoiding dns amplification attacks
Avoiding dns amplification attacks
Dns reflection attacks webinar slides
Dns reflection attacks webinar slides
Drilling Down Into DNS DDoS
Drilling Down Into DNS DDoS
Similar to State of the Internet: Mirai, IOT and History of Botnets
Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15
Liz Bradley
2015 akamai ir_summit_show_file_v6_unanimated
2015 akamai ir_summit_show_file_v6_unanimated
noellefaris
Threat intelligence at the cloud
Threat intelligence at the cloud
Or Katz
DESAYUNO DE TRABAJO AKAMAI
DESAYUNO DE TRABAJO AKAMAI
Cristian Garcia G.
Akamai: From Theory to Practice
Akamai: From Theory to Practice
Liz Bradley
Networks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To Drink
ReadWrite
Closing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
Closing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
Akamai Technologies
Great Expectations - Dr. Tom Leighton, Akamai
Great Expectations - Dr. Tom Leighton, Akamai
Akamai Technologies
Building Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of Business
Rahul Neel Mani
DWS15 - TV & Video Forum - Challenges to delivering a successful future for o...
DWS15 - TV & Video Forum - Challenges to delivering a successful future for o...
IDATE DigiWorld
How to Counter Cybersecurity Attacks - Trust No One
How to Counter Cybersecurity Attacks - Trust No One
Elisabeth Bitsch-Christensen
Akamai in a hyperconnected world
Akamai in a hyperconnected world
magda3695
Akamai in a hyperconnected world
Akamai in a hyperconnected world
magda3695
IoT Deep Dive - Be an IoT Developer for an Hour
IoT Deep Dive - Be an IoT Developer for an Hour
Taisuke Yamada
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
Colin Bendell
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...
PROIDEA
게임 서비스를 위한 클라우드 네트워크 활용
게임 서비스를 위한 클라우드 네트워크 활용
Seung Heun Noh
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
PROIDEA
ClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirements
Aruba, a Hewlett Packard Enterprise company
Replacing recovery with resilience
Replacing recovery with resilience
Akamai Technologies
Similar to State of the Internet: Mirai, IOT and History of Botnets
(20)
Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15
2015 akamai ir_summit_show_file_v6_unanimated
2015 akamai ir_summit_show_file_v6_unanimated
Threat intelligence at the cloud
Threat intelligence at the cloud
DESAYUNO DE TRABAJO AKAMAI
DESAYUNO DE TRABAJO AKAMAI
Akamai: From Theory to Practice
Akamai: From Theory to Practice
Networks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To Drink
Closing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
Closing the Loop on Web Application Vulnerabilities - John Dilley, Akamai
Great Expectations - Dr. Tom Leighton, Akamai
Great Expectations - Dr. Tom Leighton, Akamai
Building Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of Business
DWS15 - TV & Video Forum - Challenges to delivering a successful future for o...
DWS15 - TV & Video Forum - Challenges to delivering a successful future for o...
How to Counter Cybersecurity Attacks - Trust No One
How to Counter Cybersecurity Attacks - Trust No One
Akamai in a hyperconnected world
Akamai in a hyperconnected world
Akamai in a hyperconnected world
Akamai in a hyperconnected world
IoT Deep Dive - Be an IoT Developer for an Hour
IoT Deep Dive - Be an IoT Developer for an Hour
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...
PLNOG 13: James Kretchmar: How Akamai scales to serve the largest events on t...
게임 서비스를 위한 클라우드 네트워크 활용
게임 서비스를 위한 클라우드 네트워크 활용
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
ClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirements
Replacing recovery with resilience
Replacing recovery with resilience
More from Rahul Neel Mani
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
Rahul Neel Mani
TweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital Initiative
Rahul Neel Mani
Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017
Rahul Neel Mani
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
Rahul Neel Mani
CIO Productivity Conclave 2017
CIO Productivity Conclave 2017
Rahul Neel Mani
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Rahul Neel Mani
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Rahul Neel Mani
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Rahul Neel Mani
SMAC in Healthcare: Arvind Sivaramakrishnan, CIO Apollo Hospitals
SMAC in Healthcare: Arvind Sivaramakrishnan, CIO Apollo Hospitals
Rahul Neel Mani
Preparing for the Future Innovation in Digital Healthcare: Manas Tripathi
Preparing for the Future Innovation in Digital Healthcare: Manas Tripathi
Rahul Neel Mani
Mobile First Healthcare: Chris Kozup Aruba (HPE)
Mobile First Healthcare: Chris Kozup Aruba (HPE)
Rahul Neel Mani
IT to IoT: The Journey to Nextgen - By Rajesh Batra
IT to IoT: The Journey to Nextgen - By Rajesh Batra
Rahul Neel Mani
Enabling the Future of Healthcare Through Integration and Interoperability: V...
Enabling the Future of Healthcare Through Integration and Interoperability: V...
Rahul Neel Mani
Can India Really Achieve the Stiff Target of Digital Healthcare?
Can India Really Achieve the Stiff Target of Digital Healthcare?
Rahul Neel Mani
Becoming Future Ready: Building New Capabilities to Thrive
Becoming Future Ready: Building New Capabilities to Thrive
Rahul Neel Mani
Who Will Manage the Growing Web: Growing Internet and Shortfall of Cybersecur...
Who Will Manage the Growing Web: Growing Internet and Shortfall of Cybersecur...
Rahul Neel Mani
Preventing Social Engineering Attacks: The Critical Elements
Preventing Social Engineering Attacks: The Critical Elements
Rahul Neel Mani
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
Rahul Neel Mani
Challenges of Vulnerability Management
Challenges of Vulnerability Management
Rahul Neel Mani
More from Rahul Neel Mani
(19)
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
TweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital Initiative
Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
CIO Productivity Conclave 2017
CIO Productivity Conclave 2017
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
SMAC in Healthcare: Arvind Sivaramakrishnan, CIO Apollo Hospitals
SMAC in Healthcare: Arvind Sivaramakrishnan, CIO Apollo Hospitals
Preparing for the Future Innovation in Digital Healthcare: Manas Tripathi
Preparing for the Future Innovation in Digital Healthcare: Manas Tripathi
Mobile First Healthcare: Chris Kozup Aruba (HPE)
Mobile First Healthcare: Chris Kozup Aruba (HPE)
IT to IoT: The Journey to Nextgen - By Rajesh Batra
IT to IoT: The Journey to Nextgen - By Rajesh Batra
Enabling the Future of Healthcare Through Integration and Interoperability: V...
Enabling the Future of Healthcare Through Integration and Interoperability: V...
Can India Really Achieve the Stiff Target of Digital Healthcare?
Can India Really Achieve the Stiff Target of Digital Healthcare?
Becoming Future Ready: Building New Capabilities to Thrive
Becoming Future Ready: Building New Capabilities to Thrive
Who Will Manage the Growing Web: Growing Internet and Shortfall of Cybersecur...
Who Will Manage the Growing Web: Growing Internet and Shortfall of Cybersecur...
Preventing Social Engineering Attacks: The Critical Elements
Preventing Social Engineering Attacks: The Critical Elements
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
Challenges of Vulnerability Management
Challenges of Vulnerability Management
Recently uploaded
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
2toLead Limited
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Mattias Andersson
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Fwdays
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Enterprise Knowledge
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Wonjun Hwang
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
carlostorres15106
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
hariprasad279825
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Miki Katsuragi
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
SeasiaInfotech2
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Addepto
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Scott Keck-Warren
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Alex Barbosa Coqueiro
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
Recently uploaded
(20)
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
State of the Internet: Mirai, IOT and History of Botnets
1.
State of the
Internet: Mirai, IOT & History of Botnets Ashvini Singhal, Head - Security Operations Center, Akamai
2.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Internet- Threat Lanscape
3.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential DDoS Attack Trends
4.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential What Comes to Mind When your Hear the Word? BotNet
5.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential DDoS Malware Service Disruption Something “Bad”
6.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential A group of internet-connected devices controlled by a central system What does a BotNet Really Mean?
7.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential Lee Enfield No.4 Mk2 Firepower - Then
8.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential Firepower - NOW
9.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential What made it so EASY?
10.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential IOT – Internet of Things
11.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential Large Attacks – Q3 2016
12.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential Large Attacks – Q4 2016
13.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential Botnet Attacks
14.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential Mirai- Botnet
15.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential Mirai (Japanese for “The Future”) What is Mirai? This tool achieved particular notoriety for its specific targeting of IoT devices, such as IP cameras, WiFi-connected refrigerators, unsecured home routers, etc
16.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential 3 Typical Attack Targets: • Datacenter routing • DNS • Application Problem is, if any of the 3 are taken out, the entire enterprise is taken out Unlike many Attack Bots, Mirai can be very specifically aimed at all 3 targets with great accuracy Mirai Baseline
17.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential Mirai – Attack Vector
18.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Command and Control Report server Infection server Manually Infected IoT Device Component's of the Mirai Bot Net
19.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential Life Form
20.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. 1.1.1.1 admin admin✓ 1.1.1.1 admin admin ✓ The IoT Bot scans the internet for other devices and test default username and password combosSuccessful results are sent to the Report server.Report server sends results to the Infection server to infect new bot.Bots come online and connect to the C2 for instructs and maintain heartbeatBots come online and connect to the C2 for instructs and maintain heartbeat and restarts processes. C2 Report Infection BasicAnatomy IoT infection
21.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential Mirai – Scanning
22.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential Mirai Attack – DNS Variant
23.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential Mirai Attack – Broad Spectrum Attack
24.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential What Can You Do? Phase 1 • Strict access controls on your firewall(Datacenter, Web and DNS) Phase 2 • Loosen your Phase I controls to bring secondary services back online Phase 3 • Bring all services back online KNOW YOUR ENVIRONMENT
25.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. A Pervasive Platform: • Every major city • Every major network • One network hop away from 95% users Accelerating: • 5 of the top 5 high tech firms • 3 of the top 3 stock exchanges • 5 of the top 5 M&E firms • 5 of the top 5 ecommerce firms Akamai has 400+ customers in India, including the who’s who of the Indian Enterprise! Akamai in India
26.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. 216,000+ servers 1,500+ networks 650+ cities 120+ countries A GLOBAL PLATFORM All top 60 eCommerce sites All top 30 M&E companies All branches of the U.S. military All top 10 banks DELIVERING 13+ MILLION HOSTNAMES 40+ million hits per second 2+ trillion deliveries per day 30+ terabits per second ACCELERATING DAILY TRAFFIC OF Akamai Today Delivering 15-30+% of All Web Traffic
27.
©2015 AKAMAI |
FASTER FORWARDTM Akamai Confidential Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Thank You!
Download now