- 53
- 177 154
learnintsec
Netherlands
Приєднався 12 лип 2016
This channel holds a set of videos that explain core aspects of internet security, including security protocols, attacks and defence. These videos are used for the Massive Open Online Course (MOOC) called "Learn Internet Security" (learnintsec) which is provided by the Internet Security and Privacy group of the University of Twente (UT), the Netherlands. The MOOC is offered twice a year, starting in September and in January; the URL is: learnintsec.org. For questions contact the MOOC coordinators: Anna Sperotto and Aiko Pras.
Відео
PKI part 5
Переглядів 4724 роки тому
This video is part of the University of Twente MOOC on Internet Security
PKI part 4
Переглядів 4484 роки тому
This video is part of the University of Twente MOOC on Internet Security
PKI part 3
Переглядів 5424 роки тому
This video is part of the University of Twente MOOC on Internet Security
PKI part 2
Переглядів 5144 роки тому
This video is part of the University of Twente MOOC on Internet Security
PKI part 1
Переглядів 5944 роки тому
This video is part of the University of Twente MOOC on Internet Security
DDoS explained
Переглядів 1,2 тис.4 роки тому
Explanation for dummies on how a Distributed (Reflection) Denial of Service (DDoS) attacks work.
How to write a scientific paper
Переглядів 2,4 тис.4 роки тому
In this tutorial we discuss how to write scientific papers. We give some general guidelines, such as including research questions, and discuss possible structures for such paper. We distinguish between measurement, design and survey papers. We conclude with some common mistakes. The tutorial is intended for (BSc, MSc and PhD) students that have to start writing papers. This project has received...
IPsec security associations
Переглядів 17 тис.7 років тому
This tutorial explains what IPsec security associations (SAs) are. It shows that SAs store the parameters needed to encrypt and authenticate IPsec packets flowing from a sender to a receiver. Both sender and receiver use a Security Parameter Index (SPI) to identify which parameters belong to which association. The SPI is included in each IPsec packet.
IPsec Replay
Переглядів 8 тис.7 років тому
This tutorial explains how IPsec performs protection against replay attacks. The general idea of a replay attack has been explained by us in an earlier movie; this movie focuses on IPsec. It shows how IPsec uses sequence numbers and a window mechanism to detect such attacks. It also touches the difference between the IPsec window mechanism and that of TCP.
IPsec (recorded lecture)
Переглядів 3 тис.8 років тому
Lecture recorded on October 7, 2015 at the University of Twente, the Netherlands. The lecture starts with providing an overview of IPsec, some numbers regarding IPsec usage as well as IPsec standardization. It explains the difference between transport mode and tunnel mode. It goes into details regarding the two IPsec main protocols: AH and ESP. It expalins that IPsec is one of the possible VPN ...
TLS (recorded lecture)
Переглядів 2,5 тис.8 років тому
The lecture explains the difference between TLS and SSL. It presents the TLS protocol architecture, the TLS handshake protocol as well as the TLS record protocol. It discusses certificates and explains the relationship between TLS and HTTPS. The lecture was recorded on October 14, 2015 at the University of Twente, the Netherlands.
SSH (recorded lecture)
Переглядів 2,8 тис.8 років тому
The lecture explains the SS protocol architecture, the SSH trasnsport protocol, the SSH user authentication protocol as well as SSH connection protocol. The lecture was recorded on October 14, 2015 at the University of Twente, the Netherlands.
Advanced Persistent Threats - Conclusions
Переглядів 1818 років тому
Advanced Persistent Threats - Conclusions
Advanced Persistent Threats - Data Exiltration
Переглядів 8228 років тому
Advanced Persistent Threats - Data Exiltration
Advanced Persistent Threats - APT Concepts
Переглядів 7 тис.8 років тому
Advanced Persistent Threats - APT Concepts
Advanced Persistent Threats - Introduction
Переглядів 5608 років тому
Advanced Persistent Threats - Introduction
Intrusion Detection Systems - Conclusions
Переглядів 3518 років тому
Intrusion Detection Systems - Conclusions
Intrusion Detection Systems - SSHCure
Переглядів 8448 років тому
Intrusion Detection Systems - SSHCure
Intrusion Detection Systems - IDS performance tuning
Переглядів 1,8 тис.8 років тому
Intrusion Detection Systems - IDS performance tuning
Intrusion Detection Systems - IDS concepts and taxonomy
Переглядів 1,7 тис.8 років тому
Intrusion Detection Systems - IDS concepts and taxonomy
Intrusion Detection Systems - Introduction
Переглядів 3,7 тис.8 років тому
Intrusion Detection Systems - Introduction
note: DRDoS (Distributed Reflexion Denial of Service) can be successfully blocked by a state firewall by targeting syn/ack packets
@@Huberto-x7p Syn/ACM filtering works for TCP attacks. DNS is UDP.
It is being done to me,,and my family,,I have there names
This hacker knows me and will do anything to sabotage me in eyes of anyone I know now to drive a wedge
My hacker is sending bad stuff to a person I know,,pretending it's me
Very helpful thank you
Didn’t expect to see Quake 3 there…😊
This video is underrated. Thanks :)
Good job !!
You need to work on your English.
Very informative! Thankyou!
well explained.
wubba lubba dub dub dub ~ rick sanchez
Thanks for sharing this video, it's very useful. But I have a question here: in your example of out of sequence packets, suppose packet 5 was intercepted by the attacker and was retransmitted to the destination before the real packet arrived at the destination. Maybe the receiver will receive the replayed packet 5 and it will pass the authentication first and mark the window that 5 is received. After that, if the real packet 5 arrives at the receiver, it will discard the packet. Will this happen?
If an attacker intercepts a packet and subsequently modifies that packet, the hash function will detect such modification and the modified packet will be discarded. So attackers can not change any contents (provided the security parameters are used in the right way by the sender and receiver). What is possible, however, is to DDoS the IPsec packet stream, so at the end the receiver doesn't see any real packet anymore. But that is a different type of attack.
「こんなにいいとは思えない」、
dot dot dot................. :D
Nice video
Symmetric or full cone better for gaming?
Full cone
@@iRivasTV thank u
Amazing video! Helped a lot. Thank you very much. :)
Very good and funny videos bring a great sense of entertainment!
I can't hear anything 0 ,, so could you tell me which better for PPOE
which better u find ! ?
this is depends on your ISP u cant says which one is better you have to contact them and ask them!
ua-cam.com/video/C_ZPCUHwHc8/v-deo.html
very helpful for my project thank you!
Great lectures and many thanks for sharing. I am very interesting in your area of specialty and it would be great if we could collaborate and learn from one another. Also, would you kindly share the PPT for this video for me please. I am currently doing my research in IDS with regards to Machine Learning and was kind of confused with the evaluation metrics and your lectures has helped me a lot. Thank you so much.
Excellent presentation
Can these attacks slow down our internet? My roommate zoom calls get choppy/disconnect or has low internet speed on internet speed test. I'm using ESET. This is the message "Network threat blocked. TCP Port Scanning attack. A computer on the network is sending malicious traffic. This can be an attempt to attack your computer. The threat was blocked."
In theory yes, but it is unlikely that you will notice this in practice
i have eset and i get the tcp port scanning attack blocked every couple weeks.. i feel like its fucking up my internet too i lag just enough for it to make my csgo stutter its so annoying i want to get rid of this shit
*k
Hey is it normal to be attacked
Unfortunately yes. Network scans are continuously active
@@fp7flamingo Ok thx can it damage your computer or something make it slower. Or only now what you are searching on the internet?
How do you design those diagram, which software do u use for this
Thank you very much. Great video !
Thanks for uploading this video!
Are you native DeutschSprecher? I like your accent :D Good video, thanks.
Thanks :-). Dutch, but my German is better than English :-)
Great video
ua-cam.com/video/A50R-Q8dKAM/v-deo.html
Hopeless audio
Sorry, but I don't understand what you mean. The quality should be OK (good mike). However, if you mean with quality our "accent", sorry, can't change that.
Sorry, I confused this video with the others on IPSec. Yes, you are right, audio of this video is not very good.
Awesome video. Like the others, I agree that no one really explains security associations in detail like you have. Thanks
?
De eerste zin die ik hoor denk ik gelijk aan een Nederlander.
Thank you and continue providing us with such videos. Good luck.
very good explanation, thank you
I have been attacked for the last 2 month . They really want our info so had
Hey do you also get port scanned my antivirus says it everyday one time
But do you know if it its normal?
@@maxidudi6731 i do not know how its normal . Everytime the router went red lights i always check the system reports . The speed seem to go down too
I already understand NAT completely, but I was looking for easier ways to explain it to people who don’t. This is the best video I’ve seen by far in looking tonight! Great job!
The best video i have watched explaining IPSec, good job man keep it up!!!
Very good professor!
It's good but please speak LOUDLY. 😃
I have found this to be a fairly mediocre lecture. Especially the second half seems more like a talk selling a certain paper, than a lecture explaining how it works.
Any way I could get the presentation slides? Thank you for the great video!
suprbbbb
Thank you.
How do you block/cope with these port attacks, and are they any threat to your computer at all? I've NEVER had any Network Attacks/Port Scanning on any of my previous computers, so why now on Windows 10? This whole thing started in 2009 (not 2012, my mistake) and is currently ongoing, any assistance would be helpful
If your computer does not have a public IP address, for example because you are behind a NAT, you will not see any scans. If your network setup has been changed, for example your computer is now directly reachable via IPv6, it may be that you experience scans now. Seeing scans or not is not depending on your OS.
Great Job Man !! This is one of the very few videos which explains about SPi Number Keep up the good work..