{"id":502,"date":"2020-05-06T18:56:03","date_gmt":"2020-05-06T18:56:03","guid":{"rendered":"http:\/\/dcnds.asia\/?page_id=502"},"modified":"2020-05-28T05:46:52","modified_gmt":"2020-05-28T05:46:52","slug":"series-2-botnet-mitigation-best-practices-and-system-evaluation-workshop-in-indonesia","status":"publish","type":"page","link":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/series-2-botnet-mitigation-best-practices-and-system-evaluation-workshop-in-indonesia\/","title":{"rendered":"[Series 2] Botnet Mitigation Best Practices and System Evaluation Workshop in Indonesia"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-441\" src=\"http:\/\/dcnds.asia\/wp-content\/uploads\/2019\/09\/WP4-Diagram.jpg\" alt=\"\" width=\"884\" height=\"531\" \/><\/p>\n<p>A two-day workshop on Botnet Monitoring and Mitigation, addressing:<\/p>\n<ul>\n<li>Principles and best practices for botnet detection, monitoring and mitigation<\/li>\n<li>Best practices for dealing with botnets in an IoT environment<\/li>\n<li>Social Engineering and botnet proliferation<\/li>\n<li>Using Cloud Enabled Security System (CESS) for malware detection\/prevention<\/li>\n<li>A discussion forum with invited stakeholders on malware threats<\/li>\n<\/ul>\n<p>This workshop is conducted as part of the Asi@Connect <em>Distributed and Cloud-based Network Defense System for NRENs<\/em> (DCNDS) Project funded by TEIN* Cooperation Center and the European Union to facilitate capacity building among NOC operators and network engineers, as well as security personnel to support the effective operation of Research and Education Networks in the Asian region.<\/p>\n<h3><span style=\"color: #000000;\">Workshop Presentations:<\/span><\/h3>\n<p><a href=\"http:\/\/dcnds.asia\/wp-content\/uploads\/2020\/05\/Dr.Selva-Introduction-Malware-Botnet-1.pdf\">Dr.Selva-Introduction-Malware-Botnet<\/a><\/p>\n<p><a href=\"http:\/\/dcnds.asia\/wp-content\/uploads\/2020\/05\/Dr.Selva-Malware-Detection-Protection-Windows.pdf\">Dr.Selva-Malware-Detection-Protection-Windows<\/a><\/p>\n<p><a href=\"http:\/\/dcnds.asia\/wp-content\/uploads\/2020\/05\/Intro-to-Mirai-Shankar-Karuppayah.pdf\">Intro to Mirai &#8211; Shankar Karuppayah<\/a><\/p>\n<p><a href=\"http:\/\/dcnds.asia\/wp-content\/uploads\/2020\/05\/0-Network-and-Security-Monitoring.pdf\">Marx &#8211; Network and Security Monitoring<\/a><\/p>\n<p><a href=\"http:\/\/dcnds.asia\/wp-content\/uploads\/2020\/05\/0-Attack-Vectors.pdf\">Marx &#8211; Attack Vectors<\/a><\/p>\n<p><a href=\"http:\/\/dcnds.asia\/wp-content\/uploads\/2020\/05\/Prof.-Dr.-Saiful-Islam_indonesia.pdf\">Prof.Islam-Social_Engineering<\/a><\/p>\n<p><a href=\"http:\/\/dcnds.asia\/wp-content\/uploads\/2020\/05\/Dr.Mustafa-CESS-for-Malware-Detection-Prevention.pdf\">Dr.Mustafa-CESS-for-Malware-Detection-Prevention<\/a><\/p>\n<h3>Target Participants<\/h3>\n<p><span lang=\"EN-GB\">Network and System operators and engineers, as well as Cybersecurity staff from various organisations involved in Malaysian Research &amp; Education Network (MYREN) and other public agencies. Participants are encouraged to bring their own laptops for the Hands-on sessions.<\/span><\/p>\n<h3>Number of Participant Seats<\/h3>\n<p>30 pax<\/p>\n<p><span lang=\"EN-GB\" style=\"color: red;\">The organizers reserve the right to limit the number of participants from each organisation based on available seats.<\/span><\/p>\n<h3>Cost of Participation<\/h3>\n<p><span lang=\"EN-GB\">There are no fees charged to participants for attending the workshop. However, participants will need to make their own arrangements for travel and lodging if needed.<\/span><\/p>\n<h3>Venue<\/h3>\n<p>Golden Tulip Holland Resort<\/p>\n<p>Batu, Indonesia<\/p>\n<h3><span style=\"color: #000000;\">Dates<\/span><\/h3>\n<p>Workshop: 12 &#8211; 13 March, 2020 (with Social Dinner on night of 13 March 2020)<\/p>\n<table style=\"text-align: left; vertical-align: top;\">\n<tbody>\n<tr>\n<td><img loading=\"lazy\" src=\"http:\/\/dcnds.asia\/wp-content\/uploads\/2018\/09\/EU-1.png\" alt=\"\" width=\"150\" height=\"120\" \/><\/td>\n<td style=\"text-align: left; vertical-align: top;\"><strong><em>This workshop has received funding from Asi@Connect project which is the European Union co-funding project under Grant contract ACA 2016-376-562.<\/em><\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>A two-day workshop on Botnet Monitoring and Mitigation, addressing: Principles and best practices for botnet detection, monitoring and mitigation Best practices for dealing with botnets in an IoT environment Social Engineering and botnet proliferation Using Cloud Enabled Security System (CESS) for malware detection\/prevention A discussion forum with invited stakeholders on malware threats This workshop is conducted as part of the Asi@Connect Distributed and Cloud-based Network Defense System for NRENs (DCNDS) Project funded by TEIN* Cooperation Center and the European Union to facilitate capacity building among NOC operators and network engineers, as well as security personnel to support the effective operation of Research and Education Networks in the Asian region. Workshop Presentations: Dr.Selva-Introduction-Malware-Botnet Dr.Selva-Malware-Detection-Protection-Windows Intro to Mirai &#8211; Shankar Karuppayah Marx &#8211; Network and Security Monitoring Marx &#8211; Attack Vectors Prof.Islam-Social_Engineering Dr.Mustafa-CESS-for-Malware-Detection-Prevention Target Participants Network and System operators and engineers, as well as Cybersecurity staff from various organisations involved in Malaysian Research &amp; Education Network (MYREN) and other public agencies. Participants are encouraged to bring their own laptops for the Hands-on sessions. Number of Participant Seats 30 pax The organizers reserve the right to limit the number of participants from each organisation based on available seats. Cost of Participation There are [&#8230;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/pages\/502"}],"collection":[{"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/comments?post=502"}],"version-history":[{"count":8,"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/pages\/502\/revisions"}],"predecessor-version":[{"id":564,"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/pages\/502\/revisions\/564"}],"wp:attachment":[{"href":"https:\/\/dcnds.iict.buet.ac.bd\/index.php\/wp-json\/wp\/v2\/media?parent=502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}