CS680:
Presentation Topics
Instructions:
Chose a paper from the list below
for your presentation in class and send me email with your selection. I
will make the final assignment of papers.
NOTE: More papers will be
added. Keep checking frequntly. You may also suggest papers to me.
- Internet Worms
- Automated
Worm Fingerprinting,
Sumeet Singh, Cristian Estan, George Varghese, and Stefan Savage, Proceedings of the 6th
ACM/USENIX Symposium on Operating System Design and Implementation
(OSDI), San Francisco, CA, December 2004.
- Internet
Quarantine:
Requirements for Containing Self-Propagating Code. David Moore,
Colleen Shannon, Geoffrey Voelker,
Stefan Savage. Infocom 2003.
- How
to 0wn the
Internet in Your Spare Time.
Stuart Staniford, Silicon Defense;
Vern Paxson, ICSI Center for Internet Research; Nicholas Weaver, UC
Berkeley - Usenix Security 2002. [pdf]
- Modeling
the Spread of
Active Worms. Zesheng Chen
(Georgia Institute of Technology),
Lixin Gao (University of Massachusetts at Amherst), Kevin Kwiat (Air
Force Research Lab) Infocom 2003. [pdf]
- DDoS
- Characteristics
of Internet Background Radiation, Ruoming Pang, Vinod
Yegneswaran, Paul Barford, Vern Paxson, Larry Peterson. IMC 2004.
- A
DoS-limiting Network Architecture, Xiaowei Yang,
David Wetherall, Tom Anderson.
- Shield:
Vulnerability-Driven Network Filters for Preventing Known Vulnerability
Exploits, Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, Alf
Zugenmaier. Sigcomm
2004.
- Low-Rate
TCP-Targeted Denial of Service Attacks. (The Shrew vs. the Mice and
Elephants) Aleksandar Kuzmanovic, Edward W. Knightly (Rice
University).
- A Framework for Classifying Denial of Service Attacks. Alefiya Hussain,
John Heidemann, Christos Papadopoulos, (USC/ISI) (pdf).
- DDoS network
attack recognition and defense. Dward.
- Intrusion and Anomaly Detection
- The Bro
Intrusion detection System.
- Snort:
An open source network intrusion detection tool.
- On
Scalable Attack Detection in the
Network, Ramana Rao
Kompella, Sumeet Singh, George
Varghese,
Internet Measurement Conference, October 2004 [pdf]
- Diagnosing
Network-Wide Traffic Anomalies, Anukool
Lakhina, Mark Crovella, Christophe Diot. Sigcomm 2004.
- Network
Anomography, Yin Zhang, Zihui Ge, Albert Greenberg, Matthew
Roughan. IMC 2005.
- NATs and Firewalls
- Application Classification
- Mining Anomalies Using
Traffic Feature Distributions
(paper), Anukool
Lakhina, Mark Crovella, Christophe Diot. Sigcomm 2005.
- BLINC: Multilevel Traffic
Classification in the Dark
(paper), Thomas
Karagiannis, Dina Papagiannaki, Michalis Faloutsos. Sigcomm 2005.
- A First Look
at Modern Enterprise Traffic,
Ruoming Pang,
Mark Allman, Mike Bennett, Jason Lee, Vern Paxson, Brian Tierney.
IMC 2005
- SPAM
- Overlay and P2P Networks
- Operational Issues
- Routing
Design in Operational Networks: A Look from the Inside
David Maltz, Geoff
Xie, Jibin Zhan, Hui Zhang, Gisli Hjalmtysson, Albert Greenberg.
Sigcomm 2004.
- Optimizing
Cost and Performance for Multihoming, David K. Goldenberg, Lili Qiu, Haiyong
Xie, Yang Richard
Yang. Sigcomm 2004.
- Sizing
Router Buffers , Guido Appenzeller, Isaac Keslassy, Nick McKeown.
Sigcomm 2004.
|