Flocon 2017 Jan. 8, 2017 to Jan. 12, 2017, san diego,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Linux Command Line for Network Traffic Analysis Timothy J. Shimeall New to flow analysis and command-line interfaces? Most tools that help you work with flow, ...
Offsite Training Session: Security Onion in the Classroom Chris Simpson Security Onion is a well known linux distribution used for network security monitoring. It includes ...
Morning Training Session, Track I: Network Traffic Analysis - SILK Matthew Heckathorn , Paul Krystosek This course introduces you to network flow analysis using the CERT open source SiLK tool ...
Morning Training Session, Track II: Suricata Eric Leblond Suricata, the world’s leading IDS/IPS engine, provides the most versatile network security tool available today. ...
Afternoon Training Session, Track I: Network Traffic Analysis - SILK Matthew Heckathorn , Paul Krystosek This course introduces you to network flow analysis using the CERT open source SiLK tool ...
Afternoon Training Session, Track II: Bro Liam Randall Bro is a stateful, protocol-aware, open source, high-speed network monitor with applications such as a ...
Conference Introduction Ron Bandes , Ken Slaght A brief welcome from our Conference Chair, Ron Bandes, and Ken Slaght of the San ...
Finding the Needle in the Haystack Jonzy Jones With all the information available via NetFlows, finding the "Needle in the Haystack" (the bad ...
Monetizing Malware - A Case Study in Network Traffic Analysis Steve Santorelli We look at how a high-anonymity socks vpn service that was running in over 132 ...
SilkWeb - Analyzing Silk Data through API and Javascript Frameworks Vijay Sarvepali SilkWeb demo will showcase the SilkWeb tool built with API's and some modern Javascript frameworks ...
Challenges and Opportunities in Protecting the World's Largest Network Sandra J. Radesky Sandra J. Radesky of DISA Global will provide a Keynote address.
Backbone Network DRDoS Attack Monitoring and Analysis Yang Xu DRDoS (Distributed Reflection Denial of Service) now is the most popular and powerful DDoS method. ...
DDoS Defense with a Community of Peers (3DCoP) Jem Berkes Distributed Denial of Service (DDoS) attacks have grown dramatically in size over the last few ...
Netflow Collection and Analysis at an Internet Peering Fred Stringer Analysis of IP flow records from Internet peering points provides some interesting challenges. The total ...
DISA Cyclops Program Alan Fraser , Greg Virgin , Sylvia Mapes In an IT environment where more and more enterprise IT is located outside the physical ...
Using flow for realtime traffic management in 100G networks John Gerth , Johan Van Reijendam Enterprise networks with speeds up to 100 gigabits per second are now moving into wide-scale ...
Metrics-Focused Analysis of Network Flow Data Timothy J. Shimeall This presentation discusses the use of network management metrics, and how these metrics may influence, ...
Running Reliable Network Security Monitoring Infra @ Facebook Sereyvathana Ty Packet monitoring for threat detection is a seemingly simple concept, but effective implementation is not. ...
A Network Flows Visualization Framework and API for Network Forensics and Analytics in the Web Ian Dávila , Julio Natera , José Ortiz Ubarri High performance data networks such as Science DMZ networks are being deployed in research institutions ...
Mothra: A Large-Scale Data Processing Platform for Network Security Analysis Anthony Cebzanov Netflow was designed to retain the key attributes of network conversations between TCP/IP endpoints on ...
Low Hanging Fruit Tastes Just as Good Emily Sarneso , Dan Ruef We often hear as some network security tasks as being "low hanging fruit." There are ...
Next Generation Incident Response: Tools and Methods for Hunting and Responding to Advanced Threats Casey Kahsen , David P Zito The cyber threat landscape is constantly shifting. Attackers continually develop new tactics, tools, and procedures ...
Delivering Cyber Warfighting Capability from Seabed to Space Pat Sullivan Pat Sullivan of SPAWAR will be providing a Keynote Presentation
Flow-Based Monitoring, Troubleshooting and Security using nProbe Luca Deri Flow-based network traffic monitoring plays a crucial role when it comes to troubleshoot application problems, ...
Navigating the Pitfalls and Promises of Network Security Monitoring Scott B Miserendino Network security monitoring has been around for decades, but the data generated from high volume ...
echo 'PCAP cant scale'| sed 's/cant/does/ Erik Waher Companies need reliable packet capture to maintain an accurate source of truth for what happened ...
Flow Collection and Analytics at Verizon Dennis Marti Verizon Network Security Services collects netflow from internal devices, edge routers and the Internet backbone. ...
Uncovering Beacons Using Behavioral Analytics and Information Theory Joseph Mosby A beacon, or a heartbeat, is machine-generated traffic leaving the network to confirm availability to ...
Discovering Deep Patterns in Large-scale Network Flows using Tensor Decompositions James Ezick We present an approach to a cyber security workflow based on ENSIGN, a high-performance implementation ...
Scalable Temporal Analytics to Detect Automation and Coordination Lauren Deason Temporal analysis of cyber data can be leveraged in a number of ways to identify ...
Lions and Tigers and Bears, Mirai!': Tracking IoT-Based Malware w//Netflow Kevin Breeden The Mirai malware rose to prominence in late 2016 with record-breaking Distributed Denial of Service ...
Incorporating Network Flow Analysis Into an Insider Threat Program Dan Costa In recent years, many organizations across government, industry, and academia have recognized the need to ...
Developing Insider Threat Indicators from Netflow Dan Costa Insider threat analysts look for anomalous behavior and activity across a wide array of data ...
Assessing Targeted Attacks in Incident Response Threat Correlation Jamison Day , Allan Thomson The current number of active cyber threats is astounding. Do you know which threats are ...
Detecting Threats, Not Sandboxes: Characterizing Network Environments to Improve Malware Classification David Mcgrew , Blake Anderson Applying supervised machine learning to network data features is increasingly common; it is well suited ...