BEGIN:VCALENDAR
VERSION:2.0
PRODID:icalendar-ruby
CALSCALE:GREGORIAN
METHOD:PUBLISH
BEGIN:VTIMEZONE
TZID:Europe/Vienna
BEGIN:DAYLIGHT
DTSTART:20180325T030000
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20181028T020000
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20260406T000454Z
UID:5ad753de22f58546538546@ist.ac.at
DTSTART:20180516T100000
DTEND:20180516T110000
DESCRIPTION:Speaker: Kevin Borgolte\nhosted by Krzysztof Pietrzak\nAbstract
 : The widespread access to the Internet and the ubiquity of web-based serv
 ices has made it easy to communicate and interact globally.Unfortunately\,
  the software and protocols implementing the services' functionality are o
 ften vulnerable to attacks because of software or design bugs\,  legacy co
 de\, not being maintained\, entirely new classes of vulnerabilities\, a di
 sconnect in what they are supposed to do and what they are actually doing\
 , or just evolution in how they are being used.In turn\, attackers can exp
 loit them for their own nefarious purposes\, to turn a profit from crimina
 l enterprises\, or to wreak havoc for fun.Today\, such abuse on the Intern
 et is rampant and Internet users must tread carefully to not be defrauded\
 , scammed\, extorted\, misled\, influenced\, or have their (private) data 
 siphoned off and misused.In my research\, I aim to better understand\, ide
 ntify\, and prevent these attacks.In this talk\, we tour how to identify a
 nd prevent different kinds of Internet abuse\, and we investigate how we c
 an retain the tools we need to understand and analyze large-scale security
  phenomena in tomorrow's Internet.We look at website defacements\, malware
  distribution campaigns\, takeover attacks\, and denial-of-service attacks
 \, all of which have become major challenges for the security research com
 munity\, service operators\, and Internet users alike.Our investigation wi
 ll show how these attacks are possible\, why attackers are launching them\
 , and how we can identify or even prevent them.Then\, we dive into problem
 s that inevitably upcoming Internet protocols\, like IPv6\, have in stock 
 for us.Namely\, they take fundamental tools away from the research communi
 ty\, thus turning us blind when trying to measure and understand Internet-
 wide (security) phenomena\, and\, at the same time\, they introduce additi
 onal attack surface that is ripe for abuse by miscreants.Finally\, I detai
 l research directions to tackle tomorrow's yet unknown large-scale Interne
 t abuse issues.
LOCATION:Big Seminar room Ground floor / Office Bldg West (I21.EG.101)\, IS
 TA
ORGANIZER:pdelreal@ist.ac.at
SUMMARY:Kevin Borgolte: Identifying and Preventing Large-scale Internet Abu
 se
URL:https://talks-calendar.ista.ac.at/events/1236
END:VEVENT
END:VCALENDAR
