learnintsec
learnintsec
  • 53
  • 177 154
DNS Security - DNSSEC and DDOS attacks
DNS Security - DNSSEC and DDOS attacks
Переглядів: 1 322

Відео

PKI part 5
Переглядів 4724 роки тому
This video is part of the University of Twente MOOC on Internet Security
PKI part 4
Переглядів 4484 роки тому
This video is part of the University of Twente MOOC on Internet Security
PKI part 3
Переглядів 5424 роки тому
This video is part of the University of Twente MOOC on Internet Security
PKI part 2
Переглядів 5144 роки тому
This video is part of the University of Twente MOOC on Internet Security
PKI part 1
Переглядів 5944 роки тому
This video is part of the University of Twente MOOC on Internet Security
DDoS explained
Переглядів 1,2 тис.4 роки тому
Explanation for dummies on how a Distributed (Reflection) Denial of Service (DDoS) attacks work.
How to write a scientific paper
Переглядів 2,4 тис.4 роки тому
In this tutorial we discuss how to write scientific papers. We give some general guidelines, such as including research questions, and discuss possible structures for such paper. We distinguish between measurement, design and survey papers. We conclude with some common mistakes. The tutorial is intended for (BSc, MSc and PhD) students that have to start writing papers. This project has received...
IPsec security associations
Переглядів 17 тис.7 років тому
This tutorial explains what IPsec security associations (SAs) are. It shows that SAs store the parameters needed to encrypt and authenticate IPsec packets flowing from a sender to a receiver. Both sender and receiver use a Security Parameter Index (SPI) to identify which parameters belong to which association. The SPI is included in each IPsec packet.
IPsec Replay
Переглядів 8 тис.7 років тому
This tutorial explains how IPsec performs protection against replay attacks. The general idea of a replay attack has been explained by us in an earlier movie; this movie focuses on IPsec. It shows how IPsec uses sequence numbers and a window mechanism to detect such attacks. It also touches the difference between the IPsec window mechanism and that of TCP.
IPsec (recorded lecture)
Переглядів 3 тис.8 років тому
Lecture recorded on October 7, 2015 at the University of Twente, the Netherlands. The lecture starts with providing an overview of IPsec, some numbers regarding IPsec usage as well as IPsec standardization. It explains the difference between transport mode and tunnel mode. It goes into details regarding the two IPsec main protocols: AH and ESP. It expalins that IPsec is one of the possible VPN ...
TLS (recorded lecture)
Переглядів 2,5 тис.8 років тому
The lecture explains the difference between TLS and SSL. It presents the TLS protocol architecture, the TLS handshake protocol as well as the TLS record protocol. It discusses certificates and explains the relationship between TLS and HTTPS. The lecture was recorded on October 14, 2015 at the University of Twente, the Netherlands.
SSH (recorded lecture)
Переглядів 2,8 тис.8 років тому
The lecture explains the SS protocol architecture, the SSH trasnsport protocol, the SSH user authentication protocol as well as SSH connection protocol. The lecture was recorded on October 14, 2015 at the University of Twente, the Netherlands.
Advanced Persistent Threats - Conclusions
Переглядів 1818 років тому
Advanced Persistent Threats - Conclusions
Advanced Persistent Threats - Data Exiltration
Переглядів 8228 років тому
Advanced Persistent Threats - Data Exiltration
Advanced Persistent Threats - APT Concepts
Переглядів 7 тис.8 років тому
Advanced Persistent Threats - APT Concepts
Advanced Persistent Threats - Introduction
Переглядів 5608 років тому
Advanced Persistent Threats - Introduction
Firewalls and NATs - Conclusion
Переглядів 3578 років тому
Firewalls and NATs - Conclusion
Firewalls and NATs - NAT
Переглядів 12 тис.8 років тому
Firewalls and NATs - NAT
Firewalls and NATs - Firewalls
Переглядів 1,5 тис.8 років тому
Firewalls and NATs - Firewalls
Firewalls and NATs - Introduction
Переглядів 5588 років тому
Firewalls and NATs - Introduction
Intrusion Detection Systems - Conclusions
Переглядів 3518 років тому
Intrusion Detection Systems - Conclusions
Intrusion Detection Systems - SSHCure
Переглядів 8448 років тому
Intrusion Detection Systems - SSHCure
Intrusion Detection Systems - IDS performance tuning
Переглядів 1,8 тис.8 років тому
Intrusion Detection Systems - IDS performance tuning
Intrusion Detection Systems - IDS concepts and taxonomy
Переглядів 1,7 тис.8 років тому
Intrusion Detection Systems - IDS concepts and taxonomy
Intrusion Detection Systems - Introduction
Переглядів 3,7 тис.8 років тому
Intrusion Detection Systems - Introduction
DNS Security - Conclusion
Переглядів 6258 років тому
DNS Security - Conclusion
DNS Security - DDOS against DNS
Переглядів 1,7 тис.8 років тому
DNS Security - DDOS against DNS
DNS Security - Cache Poisoning
Переглядів 8 тис.8 років тому
DNS Security - Cache Poisoning
DNS Security - Introduction
Переглядів 3,1 тис.8 років тому
DNS Security - Introduction

КОМЕНТАРІ

  • @Huberto-x7p
    @Huberto-x7p Місяць тому

    note: DRDoS (Distributed Reflexion Denial of Service) can be successfully blocked by a state firewall by targeting syn/ack packets

    • @AikoPrasTrains
      @AikoPrasTrains Місяць тому

      @@Huberto-x7p Syn/ACM filtering works for TCP attacks. DNS is UDP.

  • @nothing-b2n
    @nothing-b2n 6 місяців тому

    It is being done to me,,and my family,,I have there names

  • @nothing-b2n
    @nothing-b2n 6 місяців тому

    This hacker knows me and will do anything to sabotage me in eyes of anyone I know now to drive a wedge

  • @nothing-b2n
    @nothing-b2n 6 місяців тому

    My hacker is sending bad stuff to a person I know,,pretending it's me

  • @tourmaline-5864
    @tourmaline-5864 7 місяців тому

    Very helpful thank you

  • @patrykp8460
    @patrykp8460 8 місяців тому

    Didn’t expect to see Quake 3 there…😊

  • @chiragsharma8905
    @chiragsharma8905 9 місяців тому

    This video is underrated. Thanks :)

  • @steveshawcross
    @steveshawcross Рік тому

    Good job !!

  • @christech82
    @christech82 Рік тому

    You need to work on your English.

  • @amilasamaraweera6209
    @amilasamaraweera6209 Рік тому

    Very informative! Thankyou!

  • @anamikaalung
    @anamikaalung Рік тому

    well explained.

  • @0xRashid
    @0xRashid Рік тому

    wubba lubba dub dub dub ~ rick sanchez

  • @yingwu5192
    @yingwu5192 2 роки тому

    Thanks for sharing this video, it's very useful. But I have a question here: in your example of out of sequence packets, suppose packet 5 was intercepted by the attacker and was retransmitted to the destination before the real packet arrived at the destination. Maybe the receiver will receive the replayed packet 5 and it will pass the authentication first and mark the window that 5 is received. After that, if the real packet 5 arrives at the receiver, it will discard the packet. Will this happen?

    • @learnintsec
      @learnintsec 2 роки тому

      If an attacker intercepts a packet and subsequently modifies that packet, the hash function will detect such modification and the modified packet will be discarded. So attackers can not change any contents (provided the security parameters are used in the right way by the sender and receiver). What is possible, however, is to DDoS the IPsec packet stream, so at the end the receiver doesn't see any real packet anymore. But that is a different type of attack.

  • @rajatgoyal3386
    @rajatgoyal3386 2 роки тому

    「こんなにいいとは思えない」、

  • @rakib4443
    @rakib4443 2 роки тому

    dot dot dot................. :D

  • @5699_spacex
    @5699_spacex 2 роки тому

    Nice video

  • @Preaizy
    @Preaizy 2 роки тому

    Symmetric or full cone better for gaming?

    • @iRivasTV
      @iRivasTV 2 роки тому

      Full cone

    • @Preaizy
      @Preaizy 2 роки тому

      @@iRivasTV thank u

  • @aa-bu6xn
    @aa-bu6xn 3 роки тому

    Amazing video! Helped a lot. Thank you very much. :)

  • @sanaabranner8426
    @sanaabranner8426 3 роки тому

    Very good and funny videos bring a great sense of entertainment!

  • @q8tech108
    @q8tech108 3 роки тому

    I can't hear anything 0 ,, so could you tell me which better for PPOE

    • @camorra1
      @camorra1 3 роки тому

      which better u find ! ?

    • @samuraiwarrior96
      @samuraiwarrior96 Рік тому

      this is depends on your ISP u cant says which one is better you have to contact them and ask them!

  • @AswaniKumarCherukuri
    @AswaniKumarCherukuri 3 роки тому

    ua-cam.com/video/C_ZPCUHwHc8/v-deo.html

  • @smolweebo
    @smolweebo 3 роки тому

    very helpful for my project thank you!

  • @ebrimajaw7106
    @ebrimajaw7106 3 роки тому

    Great lectures and many thanks for sharing. I am very interesting in your area of specialty and it would be great if we could collaborate and learn from one another. Also, would you kindly share the PPT for this video for me please. I am currently doing my research in IDS with regards to Machine Learning and was kind of confused with the evaluation metrics and your lectures has helped me a lot. Thank you so much.

  • @ManeshThankappan
    @ManeshThankappan 3 роки тому

    Excellent presentation

  • @Aldiggy2000
    @Aldiggy2000 3 роки тому

    Can these attacks slow down our internet? My roommate zoom calls get choppy/disconnect or has low internet speed on internet speed test. I'm using ESET. This is the message "Network threat blocked. TCP Port Scanning attack. A computer on the network is sending malicious traffic. This can be an attempt to attack your computer. The threat was blocked."

    • @fp7flamingo
      @fp7flamingo 3 роки тому

      In theory yes, but it is unlikely that you will notice this in practice

    • @TheTruthWholeTruthNothingButTh
      @TheTruthWholeTruthNothingButTh 3 роки тому

      i have eset and i get the tcp port scanning attack blocked every couple weeks.. i feel like its fucking up my internet too i lag just enough for it to make my csgo stutter its so annoying i want to get rid of this shit

  • @malashris1479
    @malashris1479 4 роки тому

    *k

  • @maxidudi6731
    @maxidudi6731 4 роки тому

    Hey is it normal to be attacked

    • @fp7flamingo
      @fp7flamingo 4 роки тому

      Unfortunately yes. Network scans are continuously active

    • @maxidudi6731
      @maxidudi6731 4 роки тому

      @@fp7flamingo Ok thx can it damage your computer or something make it slower. Or only now what you are searching on the internet?

  • @1UniverseGames
    @1UniverseGames 4 роки тому

    How do you design those diagram, which software do u use for this

  • @anachronic-vibes
    @anachronic-vibes 4 роки тому

    Thank you very much. Great video !

  • @pradohimself
    @pradohimself 4 роки тому

    Thanks for uploading this video!

  • @PanPshemko
    @PanPshemko 4 роки тому

    Are you native DeutschSprecher? I like your accent :D Good video, thanks.

    • @learnintsec
      @learnintsec 4 роки тому

      Thanks :-). Dutch, but my German is better than English :-)

  • @Cocobear3
    @Cocobear3 4 роки тому

    Great video

  • @fhlix1239
    @fhlix1239 4 роки тому

    ua-cam.com/video/A50R-Q8dKAM/v-deo.html

  • @brandur75
    @brandur75 4 роки тому

    Hopeless audio

    • @learnintsec
      @learnintsec 4 роки тому

      Sorry, but I don't understand what you mean. The quality should be OK (good mike). However, if you mean with quality our "accent", sorry, can't change that.

    • @learnintsec
      @learnintsec 4 роки тому

      Sorry, I confused this video with the others on IPSec. Yes, you are right, audio of this video is not very good.

  • @mohammadalihassan4677
    @mohammadalihassan4677 4 роки тому

    Awesome video. Like the others, I agree that no one really explains security associations in detail like you have. Thanks

  • @phamtang7897
    @phamtang7897 4 роки тому

    ?

  • @CharleyCheno
    @CharleyCheno 4 роки тому

    De eerste zin die ik hoor denk ik gelijk aan een Nederlander.

  • @MohamedMohamed-uf4el
    @MohamedMohamed-uf4el 4 роки тому

    Thank you and continue providing us with such videos. Good luck.

  • @hughmungus1572
    @hughmungus1572 4 роки тому

    very good explanation, thank you

  • @asphyxth3663
    @asphyxth3663 4 роки тому

    I have been attacked for the last 2 month . They really want our info so had

    • @maxidudi6731
      @maxidudi6731 4 роки тому

      Hey do you also get port scanned my antivirus says it everyday one time

    • @maxidudi6731
      @maxidudi6731 4 роки тому

      But do you know if it its normal?

    • @asphyxth3663
      @asphyxth3663 4 роки тому

      @@maxidudi6731 i do not know how its normal . Everytime the router went red lights i always check the system reports . The speed seem to go down too

  • @coreystoker8014
    @coreystoker8014 4 роки тому

    I already understand NAT completely, but I was looking for easier ways to explain it to people who don’t. This is the best video I’ve seen by far in looking tonight! Great job!

  • @jamestonderaimatswani778
    @jamestonderaimatswani778 5 років тому

    The best video i have watched explaining IPSec, good job man keep it up!!!

  • @DIYsober
    @DIYsober 6 років тому

    Very good professor!

  • @younus3374
    @younus3374 6 років тому

    It's good but please speak LOUDLY. 😃

  • @tHaH4x0r
    @tHaH4x0r 6 років тому

    I have found this to be a fairly mediocre lecture. Especially the second half seems more like a talk selling a certain paper, than a lecture explaining how it works.

  • @jakman85
    @jakman85 6 років тому

    Any way I could get the presentation slides? Thank you for the great video!

  • @krishnak4045
    @krishnak4045 6 років тому

    suprbbbb

  • @liyunliu7609
    @liyunliu7609 6 років тому

    Thank you.

  • @warhammernerd52Daxx-Lorenzo898
    @warhammernerd52Daxx-Lorenzo898 6 років тому

    How do you block/cope with these port attacks, and are they any threat to your computer at all? I've NEVER had any Network Attacks/Port Scanning on any of my previous computers, so why now on Windows 10? This whole thing started in 2009 (not 2012, my mistake) and is currently ongoing, any assistance would be helpful

    • @learnintsec
      @learnintsec 6 років тому

      If your computer does not have a public IP address, for example because you are behind a NAT, you will not see any scans. If your network setup has been changed, for example your computer is now directly reachable via IPv6, it may be that you experience scans now. Seeing scans or not is not depending on your OS.

  • @tarangsrivastava3273
    @tarangsrivastava3273 6 років тому

    Great Job Man !! This is one of the very few videos which explains about SPi Number Keep up the good work..