Date & Time
Monday, Oct 19, 2020 12:00 PM - 1:00 PM
Presented by Gonzaga's Institute of Electrical and Electronics Engineers (IEEE) student professional chapter.
Event Type & Tags
About This Event
This Week's Speaker (Oct. 19)
Mudit Tyagi is a Strategic Architect with the F5 Product Management team. He has 20 years of experience in Software Engineering and System Architecture design for delivery of secure applications.
Topic: In June 2018 ProtonMail suffered rapidly morphing sustained DDOS attacks that included Syn Floods, TCP handshake violations, TCP Zero Sequence, ACK floods, NTP non-standard port floods, reflection attacks on SSDP, NTP, Chargen, LDAP and Memcache protocols. We created an attack toolkit that mimics the ProtonMail attacks, and used it to study the efficacy of various defenses against an attack like ProtonMail suffered. We discovered that using standard techniques to fight off rapidly changing bursting attacks is near impossible for SOC operators, as speed of human action to understand the attack and apply well known mitigation is too slow. We found that a combination of an unsupervised Machine Learning algorithm to determine a baseline, perform anomaly detection and mitigation, and another Machine Learning algorithm to tune the performance of the first, yielded the most effective defense.
IEEE Spokane and the Gonzaga Student Chapter are pleased to present this very current virtual event series, where an F5 team of 8 security specialists will offer one talk per week -- each Monday at noon for 45 minutes -- on exciting topics ranging from careers in security to morphing attacks, machine learning utilization, and many more.
F5 Networks is a cutting-edge regional technology company that specializes in application services using both software and state of the art hardware development. F5's technologies focus on the delivery, security, performance, and availability of web applications, including the availability of computing, storage, and network resources.
As security issues become more pervasive and attacks more frequent and varied, F5 has focused increasingly on information security, especially high-speed attacks, and rapidly changing attack mechanisms.