Skip to main content
USENIX
  • Conferences
  • Students
Sign in

connect with us


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

twitter

Tweets by @LISAConference

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » Network Black Ops: Extracting Unexpected Functionality from Existing Networks
Tweet

connect with us

Network Black Ops: Extracting Unexpected Functionality from Existing Networks

Abstract: 

This talk was originally scheduled for Wednesday, and has been rescheduled for Thursday, December 8, 1:00 p.m.–2:00 p.m. It will take place in the San Diego room. You're welcome to pick up lunch and bring it to the talk.

 

There is the set of functionality we expect from our network. There's the set of functionality your network is capable of. These two sets are not identical. This talk will explore security risks you may not even be aware your network is exposed to and will demonstrate new techniques for managing those risks. Mechanisms will be discussed for:

  • Establishing video-capable tunnels over DNS (and detecting such tunnels)
  • Evading intrusion detection systems by exploiting IP's lack of statelessness
  • Reliably auditing Internet-scale networks
  • Visualizing complex network activity

Dan Kaminsky, DoxPara Research

Open Access Media

USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.

BibTeX
@conference {269134,
author = {Dan Kaminsky},
title = {Network Black Ops: Extracting Unexpected Functionality from Existing Networks },
year = {2005},
address = {San Diego, CA},
publisher = {{USENIX} Association},
month = dec,
}
Download

Presentation Video

Presentation Audio

MP3 Download OGG Download

Download Audio

Links

Slides: 
http://usenix.org/event/lisa05/tech/kaminsky.pdf
  • Log in or    Register to post comments

© USENIX

  • Privacy Policy
  • Conference Policies
  • Contact Us