Course Lecture Plan

Date

Lectures Topics

Speakers & Notes

Reading

Tu 3/28

Class overview, Internet measurement roadmap, project assignment

Yan [ppt]

Reverse-Engineering the Internet,
Neil Spring, David Wetherall, and Thomas Anderson, HotNets 2003

Ch. 2 Internet Architecture

Th 3/30

Large-scale Internet and security measurement projects and systematic modeling

Yan [ppt]

Ch 10 and

Tu 4/4

Analytical background: probability and its special issues in the Internet

Zhichun Li [ppt]

Ch. 3.2

Th 4/6

Analytical background: statistics and its special issues in the Internet

Yan Gao [ppt]

Ch. 3.3 and Ch 3.6

Tu 4/11

Analytical background: graphs and Internet topology: state of the art

Yao Zhao [ppt]

Ch. 3.4, and Ch 5.4

Th 4/13

Internet infrastructure: active and passive measurements and tools

Prasad Narayana [ppt]

Ch 5.2 - 5.3

Tu 4/18

Application measurement: Web

Dave Raffensperger [ppt]

Ch. 7.3

Th 4/20

Application measurement: P2P

Mike Smathers [ppt]

Ch. 7.4

M 4/24

Network failure measurements

Joint class with CS395/495 of Prof. Kuzmanovic

Defense: Mike Smathers & Usman Jafarey

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services, by M. Zhang et al.

Th

4/27

Application measurement: DNS

Guest Lecture by John Kristoff of UltraDNS

Ch. 7.2

Tu

5/2

Midterm project presentation

Th

5/4

Application measurement: Games

Usman Jafarey [ppt]

Ch. 7.5

Tu 5/9

Collaborated attacks

Defense: Zhichun Li [ppt]

Offense: Yan Chen [ppt]

Collaborating Against Common Enemies, Sachin Katti, Balachander Krishnamurthy, Dina Katabi, Proc. of ACM SIGCOMM IMC 2005.

Th 5/11

Darknet

Defense: Dave Raffensperger

[ppt] (courtesy of Michael Bailey @ U Michigan)

Offense: Yao Zhao

Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic, Michael Bailey, Evan Cooke, Farnam Jahanian, Niels Provos, Karl Rosaen, and David Watson, Proc. of Internet Measurement Conference (IMC) 2005.

Ref: Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm, In proc. of SOSP 2005. [slides from U Texas]

Tu 5/16

Botnet

Defense: Usman Jafarey [ppt]

Offense:

Yan Chen

[ppt]

The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets, Evan Cooke, Farnam Jahanian, and Danny McPherson in Proc. of Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), 2005. [talk by the authors]

Ref: An Inside Look at Botnets, Paul Barford and Vinod Yegneswaran, in Series: Advances in Information Security, Springer, 2006.

Th 5/18

Spyware

Defense: Yao Zhao [ppt]

Offense: Prasad Narayana

A Crawler-based Study of Spyware in the Web, Alex Moshchuk , Tanya Bragin, Steven D. Gribble, Henry Levy, NDSS 2006. [talk by the authors]

M 5/22

DoS attacks

Joint class with CS395/495 of Prof. Kuzmanovic

Offense: David Raffensperger

A DoS-limiting Network Architecture, by X. Yang et al., in ACM SIGCOMM 2005

 

Th 5/25

Web vulnerability

Defense: Zhichun Li [ppt]

Offense: Mike Smathers [ppt]

Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities, Y. Wang etc., NDSS 2006

Tu 5/30

Wrap-up: Symantec Internet Threat Report (Mar. 2006)

Th 6/1

Final project presentation

 

Notes:

  1. You may find the brochure (suggested by Fabián E. Bustamante) useful: Efficient reading of papers in Science and Technology by Michael J. Hanson, 1990, revised 2000 Dylan McNamee.