Network Abuse Source Analyses with Perl
A 10 minute intro into how the Internet tubes work. No more will your eyes glaze over when someone says BGP. Then I blow your mind with the idea of using peering information in the analysis of network abuse source and the Perl tools on the CPAN for doing it.
Attended by: Matthew Wilson (diakopter),