Spring 2009

Clay Shields


front | classes | research | personal | contact

Network Security

Topics and Readings

back to class page
Date
Topic
Background
Required
Related
Jan 8
Course overview,
Networking review
 
 
 
Jan 15
Security Principles,
Cryptographic tools
TCP/IP Tutorial and Technical Overview.pdf (local PDF). Sections: 1.1, 1.2.5, 3.1, 4.1, 4.2 (intro and 4.2.1 only), 4.3 (intro and 4.3.1, 4.3.3 only)
Information Systems Security - A Comprehensive Model (local copy)

An Overview of Cryptography

Chapter 1 of Handbook of Applied Cryptography (local copy)
Jan 22
Authentication protocols,
Protocol testing
TCP/IP Tutorial and Technical Overview.pdf (local PDF). Sections:22.11, 22.12
Using Encryption for Authentication in Large Networks of Computers (local copy)
Clay

Designing an Authentication System: a Dialogue in Four Scenes (local copy)
Morton

A Logic of Authentication(through section 5) (local copy) Clay

Prudent Engineering Practice for Cryptographic Protocols (local copy)
Clay

The Scope of a Logic of Authentication (relates to "A Logic of Authentication")

Jan 29
SSL, and attacks on SSL,
Security problems in IP
TCP/IP Tutorial and Technical Overview.pdf (local PDF). Sections:22.7, 22.4
or IP Security (IPSec) Protocols
IP

Problem Areas for the IP Security Protocols (postscript) (local pdf copy)
Steckman

IP Covert Timing Channels: Design and Detection
Nagle

SSL

Analysis of the SSL 3.0 protocol (local copy)
Mike

Remote Timing Attacks are Practical (local copy)
Pete

 
Feb 5
TCP Security Problems
 
A Weakness in the 4.2BSD Unix TCP/IP Software (local copy)
together with
Security Problems in the TCP/IP Protocol Suite (local copy)
Ben

Embedding Covert Channels into TCP/IP (local copy)
Morton

A Simple Active Attack Against TCP (local copy)
Pete

TCP Congestion Control with a Misbehaving Receiver (local copy)

Detecting Forged TCP Reset Packets (local copy)
Nagle

A Look Back at Security Problems in the TCP/IP Protocol Suite(local copy)
Feb 12
DNS security problems and DNS security
TCP/IP Tutorial and Technical Overview.pdf (local PDF). Sections:12.1
Using the Domain Name System for System Break-ins (local copy)
Ben

A New Approach to DNS Security (DNSSEC) (local copy)
Steckman

DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks (local copy)
Jeremy

An Illustrated Guide to the Kaminsky DNS Vulnerability

 
Feb 19
Denial of Service attacks
What do we Mean by Network Denial of Service?
Inferring Internet Denial-of-Service Activity (local copy)
Mike

Implementing Pushback: Router-Based Defense Against DDoS Attacks (local copy)
Cafaro

Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks (postscript) (local copy in pdf)
Pete

Denial of Service via Algorithmic Complexity Attacks (local copy)
Jeremy

Low-Rate TCP-Targeted Denial of Service Attacks and Counter Strategies (local copy)
Ben

Recent DNS Reflector Attacks From the Victim and the Reflector POV (local copy)
Feb 21
Firewalls and secure network architecture,
Intrusion detection
TCP/IP Tutorial and Technical Overview.pdf (local PDF). Sections:22.3
Firewalls

Network (In)Security Through IP Packet Filtering (local copy)
along with
The Design of a Secure Internet Gateway (local copy)
Cafaro

Intrusion Detection

Intrusion and intrusion detection (local copy)
Nagle

Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection (local copy)
Clay

Robust TCP Stream Reassembly In the Presence of Adversaries (local copy)
Morton

 
Mar 5
Routing security,
Inter-domain routing security
TCP/IP Tutorial and Technical Overview.pdf (local PDF). Sections:5.1, 5.2, 5.3, 5.8
Securing Distance-Vector Routing Protocols (local copy)
Jeremy

Detecting Disruptive Routers: A Distributed Network Monitoring Approach (local copy)
Cafaro

Secure Border Gateway Protocol (local copy)
Steckman

PHAS: A Prefix Hijack Alert System (local copy)
Mike

 
Mar 12
Spring Break
 
 
 
Mar 19
Multicast security, Wireless Security
TCP/IP Tutorial and Technical Overview.pdf (local PDF). Sections:6.1 through 6.4,10.1 through 10.3
Multicast

Secure Group Communications Using Key Graphs (local copy)

Iolus: A Framework for Scalable Secure Multicasting (local copy)

Wireless

Intercepting Mobile Communications: The Insecurity of 802.11 (local copy)
David

Practical attacks against WEP and WPA (local copy)
Frank

 
Mar 26
Wireless Security, Flash Worms
 
Wireless

802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions (local copy)
Steckman

802.11 User Fingerprinting (local copy)
Mike

Flash Worms

How to 0wn the Internet in Your Spare Time (local copy)
Morton

Self-Stopping Worms (local copy)

Very Fast Containment of Scanning Worms (local copy)
Ben

 
Apr 2
Botnets and Spam
 
A Multifaceted Approach to Understanding the Botnet Phenomenon (local copy)
Pete

Automating Analysis of Large-Scale Botnet Probing Events (local copy)
Mike

Spamscatter: Characterizing Internet Scam Hosting Infrastructure (local copy)
Morton

Spamalytics: An Empirical Analysis of Spam Marketing Conversion (local copy)
Frank

An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants (local copy)
Jeremy

 
Apr 9
Easter Break
 
 
 
Apr 16
Anonymity
 
Crowds: Anonymity for Web Transactions (local copy)
Ben

Tor: The Second-Generation Onion Router (local copy)
Mike

The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems
Clay

Hot or Not: Revealing Hidden Services by their Clock Skew (local copy)
Steckman

 
Apr 23
Attack Traceback
 
Detecting Stepping Stones (local copy)
David

Network Support for IP Traceback (local copy)
Jeremy

Hash-Based IP Traceback (local copy)
Pete

Holding the Internet Accountable (local copy)
Ben