CS 395/495: Advanced Networking: Schedule


You can evaluate the class using the CTEC Online system which will be open from Monday, May 23, 2005 to Sunday, June 12, 2005. Your feedback is highly appreciated.




Lecture Topics

Speakers & Notes


Tu 3/29




W 3/30

BGP and routing anomalies

(pres. with CS450)



BGP tutorial from Cisco, please read the “BGP fundamental” part and this simplified tutorial of BGP. (I will go over the slides in the class.


Delayed Internet Routing Convergence, by C. Labovitz et al., in SIGCOMM ‘00. (slides of their NANOG 19 talk)

M 4/4

Network architecture I

(debate with CS450)





Towards an Active Network Architecture, by D. Tennenhouse and D. Wetherall

In CCR ‘96


[Reference] Active network vision and reality: lessons from a capsule-based system, by D. Werherall, in SOSP ‘99

W 4/6

Network architecture II


Justin (part 1 and part 2)



Internet Indirection Infrastructure, by I. Stoica et al., in SIGCOMM ‘02

M 4/11

Fast worm propagation

(pres. with CS450)


Chi Yin

The Top Speed of Flash Worms, by S. Staniford et al., in WORM ‘04.


[Reference] How to 0wn the Internet in Your Spare Time, by S. Staniford et al.,

in Usenix Security Symposium ‘02

W 4/13

Prevalence of global intrusions

(debate with CS450)





Internet Intrusions: Global Characteristics and Prevalence, by Y. Vinod et al.


M 4/18

Congestion control

Defense: Chi Yin

Offense: Justin

Buffer Sizing for Congested Internet Links, by A. Dhamdhere et al., in INFOCOM ‘05

Sizing Router Buffers, by G. Appenzeller et al., in SIGCOMM ‘04

W 4/20

Ad-hoc networks

Defense: Sausan

Offense: Sam

Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness, by X. Yu, in MOBICOM ‘05

M 4/25

Worm signature generation II

(pres. with CS450)



Automated Worm Fingerprinting, by S. Singh et al., in OSDI ‘04


Polygraph: Automatically Generating Signatures For Polymorphic Worms, by
James Newsome et al., in Security Syposium ‘05

W 4/27

Overlay routing

Defense: Jeffrey

Offense: Chi Yin

Resilient Overlay Networks, by D. Anderson et al., in SOSP ‘01

M 5/2

Denial-of-Service attacks

(pres. with CS450)



A Taxonomy of DDoS Attacks and Defense Mechanisms, J. Mirkovic and P. Reiher,

in CCR, Apr. 2004.

[References] Inferring Internet DoS attacks.

W 5/4

DoS attacks II

(debate with CS450)

Defense: Sam

Offense: Gao

Controlling High-Bandwidth Flows at a Congested Router, by R. Mahajan et al.,

in ICNP 2001

M 5/9

DoS attacks vs. flash crowds

(debate with CS450)

Defense: Manan

Offense: Sausan

Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds, by S. Kandula et al., in NSDI 2005


[Reference] Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites (PS version), by J. Jung et al., in WWW 2002

W 5/11

DoS in P2P

(debate with CS450)

Defense: Gao

Offense: Justin & Paul

Denial-of-Service Resilience in Peer-to-Peer File Sharing Systems, by D. Dumitiru et al., in SIGMETRICS ‘05

M 5/16

DoS in ad-hoc wireless networks (debate with CS450)

Defense: Yao

Offense: David

Denial-of-Service Resilience in Ad-Hoc Networks, by I. Aad et al..

in MOBICOM 2005

W 5/18

Network fault diagnostics (presentation with CS450)



User-level Internet Path Diagnosis, by R. Mahajan et al., in SOSP 2003


Server-based Inference of Internet Performance, by V. N. Padmanabhan et al.,

in INFOCOM 2003

M 5/23

Network inference I

Defense: David

Offense: Sam

Locating Internet Bottlenecks, by N. Hu et al., in SIGCOMM ‘04

W 5/25

Network inference II

Defense: John

Offense: Jeffrey

Measuring ISP Topologies with Rocketfuel, by N. Spring et al., in SIGCOMM ‘02

M 5/30

No class



W 6/1

Project presentations





         How to read papers: Efficient reading of papers in Science and Technology by Michael J. Hanson, 1990, revised 2000 Dylan McNamee.


March, 2005, Aleksandar Kuzmanovic