Conveners
DDoS: Oops - I Secured It Again!
- Ewgenij Brin (DFN-CERT)
Description
Have you ever spent countless hours securing your systems, only to stumble upon yet another unexpected issue? You're not alone. Join us for three honest, detailed accounts of applied security from those who've lived it. We'll kick things off with eye-opening findings from security code reviews within GÉANT. Next, we'll talk practical strategies and real tactics we use to defend networks that can't afford downtime. Finally, we’ll take a deep dive into the challenge of sophisticated residential proxy abuse, showcasing a year-long battle filled with lessons learned. Expect authentic stories, actionable advice, and some memorable takes on issues we won’t soon forget.
-
Mr Jarosław Wieczorek (PCSS), Marcin Wolski (PSNC)09/04/2025, 13:30PresentationSingle Presentation (25 min)
The presentation topics will include but not be limited to:
- Various approach for software reviews – the software reviews portfolio comprises several types of a software analysis (such as automated or manual review) and detailed review methodologies, taking into account peculiarities of particular specific programming languages used in the project.
- An overview of typical issues and...
-
Wim Biemolt09/04/2025, 14:00PresentationSingle Presentation (25 min)
I will discuss our experience with various types of DDoS attacks, including recent relative large and impactful attacks. I also will try to convince the audience that we should participate in exercises within the production environment. To be better prepared for the next, even bigger and potentially more impactful, DDoS attack. Especially together we can better protect what matters most to us:...
Go to contribution page -
Mr Jérôme Meyer (Nokia)09/04/2025, 14:30PresentationSingle Presentation (25 min)
This presentation will offer a detailed, data-driven exploration of the recent surge in successful DDoS attacks, focusing on the advanced techniques employed by the NoName campaign. By sharing flow- level analysis and demonstrating effective mitigation strategies, we aim to provide actionable intelligence that can enhance the resilience of CSPs and security vendors alike. Attendees will leave...
Go to contribution page