datengarten thumbnails & new folder structure
This commit is contained in:
parent
1055074233
commit
e9b3014b9d
185 changed files with 8015 additions and 1 deletions
87
content/datengarten/89/feature-dg-standard-logo.svg
Normal file
87
content/datengarten/89/feature-dg-standard-logo.svg
Normal file
File diff suppressed because one or more lines are too long
After Width: | Height: | Size: 46 KiB |
21
content/datengarten/89/index.md
Normal file
21
content/datengarten/89/index.md
Normal file
|
@ -0,0 +1,21 @@
|
|||
---
|
||||
categories: ["Datengarten"]
|
||||
tags: ["Security", "SDN", "Datengarten"]
|
||||
series: "Datengarten"
|
||||
title: "Datengarten 89"
|
||||
no: 89
|
||||
subtitle: (In)Security in Software-Defined Networks
|
||||
speaker: Kashyap Thimmaraju
|
||||
# Twitter, homepage, mail (use mailto:foo@example.com)
|
||||
#speaker_url:
|
||||
date: 2018-06-11T21:01:19+02:00
|
||||
event:
|
||||
start: 2018-06-12T20:00:00+02:00
|
||||
end: 2018-06-12T22:00:00+02:00
|
||||
location: CCCB
|
||||
language: en
|
||||
streaming: true
|
||||
recording: https://media.ccc.de/v/dg-89
|
||||
---
|
||||
|
||||
Computer networking is currently undergoing a transformation: Network control is being consolidated into a centralized “controller” by separating the so-called data plane and control plane. This transformation is what is popularly known as Software-Defined Networking. In this talk we will see how Software-Defined Networks can be exploited by attackers, and on the flip-side, how they can be leveraged to detect network attacks. For example, we will look at topology spoofing attacks, software switch exploitation in the cloud and attacks arising from malicious switches, we will also see novel techniques to detect malicious switches and hosts.
|
Loading…
Add table
Add a link
Reference in a new issue