Previously on Logs and Tactical Defence (
https://youtu.be/f48lOuHmVxI), we outlined a few simple recipes to detect questionable activity, determine the attackers' intent, and respond in traditional and novel ways. In this presentation, we will detail some new recipes, show some interesting failure modes for some of the old ones, and discuss the operational overhead of running such a system.
Тэги:
#BSides #BsidesTO #2015 #infosec #security #Toronto