Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
SDN Final Report
Search
adr
June 21, 2019
Technology
500
0
Share
SDN Final Report
adr
June 21, 2019
More Decks by adr
See All by adr
Skrull Like A King: 從重兵看守的天眼防線殺出重圍
aaaddress1
3
1.6k
Rebuild The Heaven's Gate: from 32 bit Hell back to Heaven Wonderland
aaaddress1
0
1.3k
重建天堂之門:從 32bit 地獄一路打回天堂聖地
aaaddress1
0
480
Reversing In Wonderland: Neural Network Based Malware Detection Techniques
aaaddress1
2
760
CYBERSEC: 唉唷,你的簽章根本沒在驗啦。
aaaddress1
1
4.2k
SITCON: Playing Win32 Like a K!NG ;)
aaaddress1
2
1.2k
NTUST [2019]: Windows Reversing
aaaddress1
0
1.2k
Duplicate Paths Attack: Get Elevated Privilege from Forged Identities
aaaddress1
0
1.8k
Computer Security 資安實務: Windows Reversing [Dark Art]
aaaddress1
8
1.8k
Other Decks in Technology
See All in Technology
最近の技術系の話題で気になったもの色々(IoT系以外も) / IoTLT 花見予定会(たぶんBBQ) @都立潮風公園バーベキュー広場
you
PRO
1
240
「責任あるAIエージェント」こそ自社で開発しよう!
minorun365
9
2k
扱える不確実性を増やしていく - スタートアップEMが考える「任せ方」
kadoppe
0
300
「誰一人取り残されない」 AIエージェント時代のプロダクト設計思想 Product Management Summit 2026
mizushimac
0
140
コードや知識を組み込む / Incorporate Code and Knowledge
ks91
PRO
0
150
Introduction to Sansan, inc / Sansan Global Development Center, Inc.
sansan33
PRO
0
3.1k
国内外の生成AIセキュリティの最新動向 & AIガードレール製品「chakoshi」のご紹介 / Latest Trends in Generative AI Security (Domestic & International) & Introduction to AI Guardrail Product "chakoshi"
nttcom
2
900
ネットワーク運用を楽にするAWS DevOps Agent活用法!! / 20260421 Masaki Okuda
shift_evolve
PRO
2
210
Bill One 開発エンジニア 紹介資料
sansan33
PRO
6
18k
みんなの「データ活用」を支えるストレージ担当から持ち込むAWS活用/コミュニティー設計TIPS 10選~「作れる」より、「続けられる」設計へ~
yoshiki0705
0
250
プラットフォームエンジニアリングの実践 - AWS コンテナサービスで構築する社内プラットフォーム / AWS Containers Platform Meetup #1
literalice
1
170
AI駆動1on1〜AIに自分を育ててもらう〜
yoshiakiyasuda
0
120
Featured
See All Featured
The Cult of Friendly URLs
andyhume
79
6.8k
Design and Strategy: How to Deal with People Who Don’t "Get" Design
morganepeng
133
19k
Amusing Abliteration
ianozsvald
1
150
Building AI with AI
inesmontani
PRO
1
910
The Invisible Side of Design
smashingmag
303
52k
HU Berlin: Industrial-Strength Natural Language Processing with spaCy and Prodigy
inesmontani
PRO
0
320
GraphQLの誤解/rethinking-graphql
sonatard
75
12k
What’s in a name? Adding method to the madness
productmarketing
PRO
24
4k
Performance Is Good for Brains [We Love Speed 2024]
tammyeverts
12
1.6k
Building a Modern Day E-commerce SEO Strategy
aleyda
45
9k
Pawsitive SEO: Lessons from My Dog (and Many Mistakes) on Thriving as a Consultant in the Age of AI
davidcarrasco
0
120
Principles of Awesome APIs and How to Build Them.
keavy
128
17k
Transcript
SDN-Based Intrusion Prevention System Software-Defined Networking and Function Virtualization
>_SDN? Host A ... Switch A Service Flow Table Host
B Host C Host N Switch B Service Flow Table
>_SDN Host A ... Switch A Service Flow Table Host
B Host C Host N Switch B Service Flow Table Controller Service Ctrl Srv
>_SDN? Host A ... Switch A Service Flow Table Host
B Host C Host N Switch B Service Flow Table External Network Controller Service Ctrl Srv
>_Issue Host A ... Switch A Service Flow Table Host
B Host C Host N Switch B Service Flow Table Controller Service Ctrl Srv Hacking Behavior Packets Packets DDoS, Telnet/SSH Brutforce, Ransomware, etc.
>_Issue Host A ... Switch A Service Flow Table Host
B Host C Host N Switch B Service Flow Table Controller Service Ctrl Srv Hacking Behavior Packets Packets DDoS, Telnet/SSH Brutforce, Ransomware, etc.
>_Issue Host A ... Switch A Service Flow Table Host
B Host C Host N Switch B Service Flow Table Controller Service Ctrl Srv Hacking Behavior Packets Packets DDoS, Telnet/SSH Brutforce, Ransomware, etc.
>_Issue Host A ... Switch A Service Flow Table Manager
Host C Emploee Switch B Service Flow Table Controller Service Ctrl Srv Hacking Behavior Packets Packets DDoS, Telnet/SSH Brutforce, Ransomware, etc. $>/bin/sh Bingo! Get Shell.
>_IDS Host A Switch Service Flow Table Host B Host
C IDS Srv Packets Packets Packets Intrusion Detection System
>_ Host A Switch Service Flow Table Host B Host
C IDS Srv Packets Packets Packets IDS Intrusion Detection System Tcpdump
>_IDS Host A Switch Service Flow Table Host B Host
C IDS Srv Intrusion Detection System Hacked Bruteforce credentials (Telnet/SSH/RDP/AD) SMTP (Email) Godmode
>_IDS Host A Switch Service Flow Table Host B Host
C IDS Srv Intrusion Detection System Hacked Bruteforce credentials (Telnet/SSH/RDP/AD) SMTP (Email) Godmode Marked As Pwned Devices
>_SDN Host A Switch A Service Flow Table Host B
Hacked Controller Service Ctrl Srv IDS Srv Scouting Updating Flow
>_SDN Host A Switch A Service Flow Table Host B
Hacked Controller Service Ctrl Srv IDS Srv Isolating Hacked Host
>_SDN Host A Switch A Service Flow Table Host B
Hacked Controller Service Ctrl Srv IDS Srv Isolating Hacked Host
>_SDN? Host A ... Switch A Service Flow Table Host
B Host C Host N Switch B Service Flow Table Controller Service Ctrl Srv IDS Srv IDS Srv
Demo
SDN-Based Intrusion Prevention System Thanks.