Date |
Lectures Topics |
Speakers & Notes |
|
Tu 3/28 |
Class overview, Internet measurement roadmap, project assignment |
Yan [ppt] |
Reverse-Engineering the Internet,
|
Th 3/30 |
Large-scale Internet and security measurement projects and systematic modeling |
Yan [ppt] |
Ch 10 and |
Tu 4/4 |
Analytical background:
probability and its special issues in the Internet |
Zhichun Li [ppt] |
|
Th 4/6 |
Analytical background: statistics and its special issues in the Internet |
Yan Gao [ppt] |
|
Tu 4/11 |
Analytical background: graphs and Internet topology: state of the art |
|
|
Th 4/13 |
Internet infrastructure: active and passive measurements and tools |
Prasad
Narayana [ppt] |
Ch 5.2 - 5.3 |
Tu 4/18 |
Application measurement: Web |
Dave Raffensperger
[ppt] |
|
Th 4/20 |
Application measurement: P2P |
Mike Smathers
[ppt] |
|
M 4/24 |
Network failure measurements |
Joint class with CS395/495 of Prof. Kuzmanovic Defense: Mike Smathers & Usman Jafarey |
PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services, by M. Zhang et al. |
Th 4/27 |
Application measurement: DNS |
Guest Lecture by John Kristoff of UltraDNS |
|
Tu 5/2 |
Midterm project presentation |
||
Th 5/4 |
Application measurement: Games |
Usman Jafarey
[ppt] |
|
Tu 5/9 |
Collaborated attacks |
Defense: Zhichun Li [ppt] Offense: Yan Chen [ppt] |
Collaborating
Against Common Enemies, Sachin Katti, Balachander
Krishnamurthy, Dina Katabi, Proc.
of ACM SIGCOMM IMC 2005. |
Th 5/11 |
Darknet |
Defense: Dave Raffensperger [ppt] (courtesy of Michael Bailey @ U
Michigan) Offense:
|
Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic, Michael Bailey, Evan Cooke, Farnam Jahanian, Niels Provos, Karl Rosaen, and David Watson, Proc. of Internet Measurement Conference (IMC) 2005. Ref: Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm, In proc. of SOSP 2005. [slides from U Texas] |
Tu 5/16 |
Botnet |
Defense:
Usman Jafarey [ppt] Offense: Yan Chen [ppt] |
The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets, Evan Cooke, Farnam Jahanian, and Danny McPherson in Proc. of Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), 2005. [talk by the authors] Ref: An Inside Look at Botnets, Paul Barford and Vinod Yegneswaran, in Series: Advances in Information Security, Springer, 2006. |
Th 5/18 |
Spyware |
Defense:
Offense:
Prasad Narayana |
A Crawler-based Study of Spyware in the Web, Alex Moshchuk , Tanya Bragin, Steven D. Gribble, Henry Levy, NDSS 2006. [talk by the authors] |
M 5/22 |
DoS attacks |
Joint class with CS395/495 of Prof. Kuzmanovic Offense: David Raffensperger |
A DoS-limiting Network
Architecture, by X. Yang et al., in ACM SIGCOMM 2005
|
Th 5/25 |
Web vulnerability |
Defense: Zhichun Li [ppt] Offense:
Mike Smathers
[ppt] |
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities, Y. Wang etc., NDSS 2006 |
Tu 5/30 |
Wrap-up: Symantec Internet Threat Report (Mar. 2006) |
||
Th 6/1 |
Final project presentation |
Notes: