CS 395/495: Advanced
Networking: Schedule
You can evaluate
the class using the CTEC
Online system which will be open from Monday, May 23, 2005 to Sunday, June
12, 2005. Your feedback is highly appreciated.
Schedule
Date
|
Lecture Topics
|
Speakers & Notes
|
|
Tu 3/29
|
Intro
|
Aleksandar
|
|
W 3/30
|
BGP and routing anomalies
(pres. with CS450) |
Yan
|
BGP
tutorial from Cisco, please read the “BGP fundamental” part
and this
simplified tutorial of BGP. (I
will go over the slides in the class. Delayed
Internet Routing Convergence, by C. Labovitz et al., in SIGCOMM ‘00.
(slides
of their NANOG 19 talk) |
M 4/4
|
Network architecture I
(debate with CS450) |
Defense: Offense: |
Towards an Active Network
Architecture, by D. Tennenhouse and D. Wetherall In CCR ‘96 [Reference] Active network
vision and reality: lessons from a capsule-based system, by D. Werherall,
in SOSP ‘99 |
W 4/6
|
Network architecture II
|
Defense:
Offense: |
Internet
Indirection Infrastructure, by
|
M 4/11
|
Fast worm propagation (pres. with CS450) |
Presentation:
|
The Top Speed of
Flash Worms, by S. Staniford et al.,
in WORM ‘04. [Reference] How to 0wn the Internet
in Your Spare Time, by S.
Staniford et al., in Usenix Security Symposium ‘02 |
W 4/13
|
Prevalence of global intrusions (debate with CS450) |
Defense: Offense: |
Internet Intrusions: Global Characteristics and Prevalence, by Y. Vinod et al. in SIGMETRICS ‘03 |
M 4/18
|
Congestion control
|
Defense: Chi Yin Offense: Justin
|
Buffer
Sizing for Congested Internet Links, by A. Dhamdhere et al., in INFOCOM ‘05
Sizing
Router Buffers, by G. Appenzeller et
al., in SIGCOMM ‘04
|
W 4/20
|
Ad-hoc networks
|
Defense: Sausan Offense: Sam
|
Improving
TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer
Information Awareness, by X. Yu, in MOBICOM ‘05
|
M 4/25
|
Worm signature generation II (pres. with CS450) |
Presentation:
Manan
|
Automated Worm Fingerprinting,
by S. Singh et al., in OSDI
‘04 Polygraph:
Automatically Generating Signatures For Polymorphic Worms, by |
W 4/27
|
Overlay routing
|
Defense: Jeffrey Offense: Chi Yin
|
Resilient
Overlay Networks, by D. Anderson et
al., in SOSP ‘01
|
M 5/2
|
Denial-of-Service attacks (pres. with CS450) |
Presentation:
Sausan
|
A Taxonomy of
DDoS Attacks and Defense Mechanisms, J. Mirkovic and P. Reiher, in CCR, Apr. 2004. [References] Inferring Internet
DoS attacks.
|
W 5/4
|
DoS attacks II (debate with CS450) |
Defense: Sam Offense: Gao
|
Controlling High-Bandwidth
Flows at a Congested Router, by R. Mahajan et al., in ICNP 2001 |
M 5/9
|
DoS attacks vs. flash crowds (debate with CS450) |
Defense: Manan Offense: Sausan
|
Botz-4-Sale: Surviving Organized
DDoS Attacks That Mimic Flash Crowds, by S. Kandula et al., in NSDI 2005 [Reference] Flash Crowds
and Denial of Service Attacks: Characterization and Implications for CDNs and
Web Sites (PS
version), by J. Jung et al., in
WWW 2002 |
W 5/11
|
DoS in P2P (debate with CS450) |
Defense: Gao Offense: Justin & Paul
|
Denial-of-Service
Resilience in Peer-to-Peer File Sharing Systems, by D. Dumitiru et al., in SIGMETRICS ‘05
|
M 5/16
|
DoS in ad-hoc wireless networks (debate with CS450) |
Defense: Offense: David
|
Denial-of-Service
Resilience in Ad-Hoc Networks, by
|
W 5/18
|
Network fault diagnostics (presentation with CS450) |
Presentation:
Yao
|
User-level
Internet Path Diagnosis, by R.
Mahajan et al., in SOSP 2003 Server-based Inference of
Internet Performance, by V. N. Padmanabhan et al., in INFOCOM 2003 |
M 5/23
|
Network inference I
|
Defense: David Offense: Sam
|
Locating
Internet Bottlenecks, by N. Hu et
al., in SIGCOMM ‘04
|
W 5/25
|
Network inference II
|
Defense: John Offense: Jeffrey
|
Measuring
ISP Topologies with Rocketfuel, by N. Spring et al., in SIGCOMM ‘02
|
M 5/30
|
No class
|
|
|
W 6/1
|
Project presentations
|
|
|
·
How to read papers: Efficient
reading of papers in Science and Technology by Michael J. Hanson, 1990, revised
2000 Dylan McNamee.
March,
2005, Aleksandar Kuzmanovic