Cloud Computing, a Weapon of Mass Destruction?

DEF CON 18

Presented by: Mike Anderson, David Bryan (Videoman)
Date: Friday July 30, 2010
Time: 11:00 - 11:50
Location: Royale 1
Track: Track 2

Using cloud computing to attack systems allows for the testing of a company's incident response and recovery program. We have been using the cloud computing environment to test real world scenarios for different types of attacks, such as Distributed Denial of Service, Flooding, and Packet Fragmentation. The presentation will review some of the common attack types, what they are, and how they can be used to disrupt service. I will also review the steps that led us to choose the cloud computing environment, why these environments are good for most, but also why they may not meet your regulatory requirements. And lastly, I will review mitigation strategies and response programs that can reduce the operational risks when responding to these events.

David Bryan

David M. N. Bryan has been working to keep the lights and utilities paid with the DC612 Group.

Mike Anderson

Mike Anderson currently works as a security consultant for NetSPI, in Minneapolis, MN. He studied computer sciences and Japanese at the University of Minnesota, and worked as a systems operator and technician, supporting 2,000 concurrent users.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats