{"id":3372,"date":"2015-08-31T16:06:17","date_gmt":"2015-08-31T23:06:17","guid":{"rendered":"http:\/\/blog.caida.org\/best_available_data\/?p=3372"},"modified":"2016-01-13T12:56:32","modified_gmt":"2016-01-13T19:56:32","slug":"dhs-st-ddos-defense-pi-meeting","status":"publish","type":"post","link":"https:\/\/blog.caida.org\/best_available_data\/2015\/08\/31\/dhs-st-ddos-defense-pi-meeting\/","title":{"rendered":"DHS S&#038;T DDoS Defense PI Meeting"},"content":{"rendered":"<p>Earlier this month, Marina and I went to our first Principal Investigators meeting for a new DHS program on distributed denial of service defense (DDoS Defense), lead by DHS S&#038;T Cybersecurity Division Program Manager <a href=\"http:\/\/www.dhs.gov\/science-and-technology\/dr-dan-massey-program-manager\">Dan Massey<\/A>.  Dan is one of <a href=\"http:\/\/www.dhs.gov\/science-and-technology\/dr-douglas-maughan-csd-director\">Doug Maughan&#8217;s<\/a> team, and he seems to have picked up Doug&#8217;s impressive talent for running effective meetings.  I presented <a href=\"http:\/\/www.caida.org\/publications\/presentations\/2015\/software_systems_surveying_spoofing_dhs\/\">these slides<\/A> on our new <a href=\"http:\/\/www.caida.org\/funding\/spoofer\/\">spoofer project<\/a>, a collaboration with <a href=\"http:\/\/www.caida.org\/~mjl\/\">Dr. Matthew Luckie<\/a>, now a senior lecturer at <a href=\"http:\/\/www.cms.waikato.ac.nz\/people\/mluckie\">U. Waikato<\/a>, and <a href=\"http:\/\/rbeverly.net\">Rob Beverly<\/a> at <a href=\"http:\/\/cmand.org\">NPS<\/A>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Earlier this month, Marina and I went to our first Principal Investigators meeting for a new DHS program on distributed denial of service defense (DDoS Defense), lead by DHS S&#038;T Cybersecurity Division Program Manager Dan Massey. Dan is one of Doug Maughan&#8217;s team, and he seems to have picked up Doug&#8217;s impressive talent for running [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1,38],"tags":[],"coauthors":[26],"_links":{"self":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/3372"}],"collection":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/comments?post=3372"}],"version-history":[{"count":7,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/3372\/revisions"}],"predecessor-version":[{"id":3381,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/3372\/revisions\/3381"}],"wp:attachment":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/media?parent=3372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/categories?post=3372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/tags?post=3372"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/coauthors?post=3372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}