BipinMistry

About Bipin Mistry

Mistry brings more than 26 years of industry experience in the enterprise and telecommunications industries to his role with Corero. Most recently, Mistry served as the Chief Architect Mobility for Juniper Networks. In this role, he worked with the CSN’s globally to help define their service and security needs in a rapidly evolving mobile environment. Previously, Mistry drove the Service Provider architecture and strategy for Cisco Systems, and ran then Voice over IP (VoIP) line for 3Com. He holds a number of patents, including one in API structure and interfaces specifically tie to mobile monetization.

Posts by Bipin Mistry

Does Artificial Intelligence Apply to Network Security and DDoS Attacks?

Human intervention alone is no longer sufficient to stop cyberattacks. However, it’s important to recognize that not all software techniques that are automatic or reactive should be classified as Artificial Intelligence.

Read more

Key Components of Our DDoS Monitoring Tool for Virtual Machines

Corero’s latest product, the SmartWall® Threat Defense - Virtual Edition (vNTD Monitor), allows service providers who are looking to scale out their security analytics environment to simply “drop” security visibility into any part of their network to analyze the nature of a threat.

Read more

Researchers Discover New Vector for DDoS Amplification Attacks

Researchers in Scotland have found a new vector for DDoS amplification attacks: the TFTP protocol (Trivial File Transfer Protocol). Thus far it appears that hackers have not relied heavily on the TFTP protocol; however, you can be sure it will become popular with DDoS attackers.

Read more

How Corero Protects Against Blended DDoS Attacks

DDoS attacks come in various forms, and hackers have become more sophisticated by launching blended attacks that combine three, four or five types of attacks at the same time. Fortunately, the Corero SmartWall Threat Defense System (TDS) defends against all of them. A recent 75Gbps combined ACK and SYN flood attack on a Corero customer illustrates this point.

Read more

A Security Guide for Next Generation Service Provider Network Architecture

In the typical service provider network today, security is often an afterthought; after building the network, engineers typically add encryption and firewalls, neither of which is sufficient to protect against the increasing malware and DDoS attacks that plague networks and service functions.

Read more

DDoS Impact on Mobile Networks – Radio Congestion

Most CSP’s and Mobile Carriers have deployed some form of DDoS scrubbing complex in their network to clean large, long duration DDoS attacks. While this is a necessary first step in proactively working to defeat the DDoS challenge, the threat landscape is constantly changing and requires a more modern approach to protection. Based on...

Read more

Optimizing Carrier DDoS Mitigation Scenarios - Part 1

In a large Carrier environment, DDoS attacks have escalated from a nuisance, to a sophisticated threat, and now to a revenue opportunity. Scrubbing DDoS traffic at a centralized location, after attacks have been detected has become a commonplace approach to reducing the amount of DDoS traffic transiting Carrier networks, and sent to downstream...

Read more

DDoS Attack left “Sweden not Working”

The recent DDoS attacks impacting Swedish cable, Internet and mobile service provider, TeliaSonera is another grim reminder of the impact a DDoS attack can have not only on the business itself, but the 5 million subscribers that were left without service, and left "Sweden not working", as TeliaSonera’s CEO Johan Dennelind has...

Read more

“It’s not you, it’s the Internet” – Time to break up with DDoS

Lizard Squad said it best in the recent Sony PlayStation DDoS attacks, rocking the online gaming industry, and leaving players denied from logging into the gaming community. Fact: DDoS attack tools are easy to come by, and cheap to execute, and the motivations for targeting victims are endless. Myth: “I’m not susceptible to...

Read more

Increased use of Intelligent, Adaptive DDoS Attack Techniques

Many equate DDoS with only one type of attack vector – volumetric. It is not surprising, as these high bandwidth consuming attacks seem to frequent the headlines most often. Volumetric DDoS attacks are easier to identify, and defend against with on-premises or cloud anti-DDoS solutions, or a combination of both. Recently, Corero Network...

Read more