Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Home
  • Attend
    • Registration
    • Discounts
    • Venue, Hotel, and Travel
    • Why Attend?
    • Students and Grants
  • Program
    • Program at a Glance
    • Conference Program
    • Training Program
      • Training Program - Details
    • Workshops
    • Conference Topics
      • Systems and Network Engineering
      • Monitoring and Metrics
      • SRE and Software Engineering
      • Culture
    • UCMS '15
    • URES '15
    • Puppet Camp DC
  • Activities
    • Birds-of-a-Feather
    • LISA Build
    • LISA Lab
  • Sponsors and Expo
    • LISA15 Expo
    • Sponsor and Exhibitor List
    • Exhibitor Services
  • Participate
    • Call for Participation
    • Call for Research Papers and Posters
      • Submitting Papers and Posters
    • Speaker Resources
  • About
    • Conference Organizers
    • Help Promote
    • Services
    • Code of Conduct
    • Past Conferences

connect with us


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

Why Attend LISA?

"In a world where technology changes rapidly, it's hard to find great resources for in-depth expertise. LISA has a terrific combination of people who create the technology and people who implement it effectively for their companies."

Matt Simmons, Northeastern University

"I like seeing where the industry is heading, how SysAdmins/engineers are evolving, tools they are using, common problems and solutions across the world."

LISA14 Attendee

"Great sessions, great presenters, great community. I feel like I can make up a year of following news and forums on the subject in a week."

LISA14 Attendee

"This was my first LISA. It was great attending a conference that focused on my role without trying to shoehorn every challenge into a specific vendor's solution. The same mix of awesome sessions, speakers, and other attendees will bring me back every year."

LISA14 Attendee

"If you're a sysadmin slaving away in a metaphorical basement and re-inventing the wheel every time your employer's business goals change slightly, LISA will help pull you into the light."

Marc Chiarini, Long-Time IT Admin and Researcher, MarkLogic Corp

"No matter if you are dealing with the latest tech or trying to maintain something from the dark ages of the ‘90s, there are people at LISA who are experienced with it. Heck, many of the people who _developed_ this tech attend. This is a great place to get answers and ideas."

Lee Damon, University of Washington

"LISA is the home of ops people who do ops correctly. I’m always motivated by the conference content and hallway conversations to be better, and I take home the knowledge needed to move closer to that goal. "

Tony Del Porto, Cisco Systems, Inc.

"LISA is the best mix of training, talks, and networking of any events I've been to. That's the reason I've been to 11 of them.”

LISA14 Attendee

help promote

LISA16 CFP button

Get more
Help Promote graphics!

sponsors

Gold Sponsor
Gold Sponsor
Gold Sponsor
Gold Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
General Sponsor
General Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner
Industry Partner
Industry Partner
Industry Partner
Industry Partner
Industry Partner

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

twitter

Tweets by @LISAConference

You are here

Home » Open-Source DoS Testing and Defense
Tweet

connect with us

Open-Source DoS Testing and Defense

Invited Talk
Thursday, November 12, 2015 - 11:00am-11:45am

Christian Ternus, Akamai

Abstract: 

Denial of Service attacks are becoming more and more common. Whether it’s chaotic actors doing it “for the lulz,” hacktivists looking to make a political point, or economically-motivated adversaries out to cost you money, DoS attacks are disruptive and costly.

In this talk, Christian Ternus will draw on his expertise as an adversarial security researcher for Akamai to talk about these attacks. We’ll touch on:

  • Knowing your weak points
  • Common types of attack
  • Open-source tools for testing
  • Easy defensive measures
  • The harder tradeoffs

Defending against attacks needn’t be complicated or expensive: a few simple measures can make you much safer. Let’s talk about how.

Christian Ternus, Akamai

Christian Ternus is a security architect with Akamai's Adversarial Resilience team, working on system design, threat analysis, and human factors in security. He graduated from MIT and previously worked in kernel security and mobile health-tech. He's spoken at industry conferences including OSCON and SOURCE Boston, and organized Akamai’s Humanity in Security miniconference. In 2014, he rode a motorcycle 20,000 miles overland from Boston to the tip of South America.

BibTeX
@conference {208744,
author = {Christian Ternus},
title = {Open-Source DoS Testing and Defense},
year = {2015},
address = {Washington, D.C.},
publisher = {{USENIX} Association},
month = nov,
}
Download
  • Log in or    Register to post comments

Gold Sponsors

Silver Sponsors

Bronze Sponsors

General Sponsors

Media Sponsors & Industry Partners

© USENIX

LISA is a registered trademark of the USENIX Association.

  • Privacy Policy
  • Conference Policies
  • Contact Us