Date |
Topic |
Background |
Required |
Related |
Jan 8 |
Course overview, Networking review |
  |
 
|  
|
Jan 15 |
Security Principles, Cryptographic tools |
TCP/IP Tutorial and Technical Overview.pdf (local PDF). Sections: 1.1, 1.2.5, 3.1, 4.1, 4.2 (intro and 4.2.1 only), 4.3 (intro and 4.3.1, 4.3.3 only) |
Information Systems Security - A Comprehensive Model (local copy) An Overview of Cryptography
| Chapter 1 of Handbook of Applied Cryptography (local copy)
|
Jan 22 |
Authentication protocols, Protocol testing |
TCP/IP Tutorial and Technical Overview.pdf (local PDF). Sections:22.11, 22.12 |
Using Encryption for Authentication in Large Networks of Computers (local copy) Clay
Designing an Authentication System: a Dialogue in Four Scenes (local copy) Morton
A Logic of Authentication(through section 5) (local copy) Clay
Prudent Engineering Practice for Cryptographic Protocols (local copy) Clay
| The Scope of a Logic of Authentication (relates to "A Logic of Authentication")
|
Jan 29 |
SSL, and attacks on SSL, Security problems in IP |
TCP/IP Tutorial and Technical Overview.pdf (local PDF). Sections:22.7, 22.4 or IP Security (IPSec) Protocols |
IP
Problem Areas for the IP Security Protocols (postscript) (local pdf copy) Steckman
IP Covert Timing Channels: Design and Detection Nagle
SSL
Analysis of the SSL 3.0 protocol (local copy) Mike
Remote Timing Attacks are Practical (local copy) Pete
|  
|
Feb 5 |
TCP Security Problems |
  |
A Weakness in the 4.2BSD Unix TCP/IP Software (local copy)
together with
Security Problems in the TCP/IP Protocol Suite (local copy) Ben
Embedding Covert Channels into TCP/IP (local copy) Morton
A Simple Active Attack Against TCP (local copy) Pete
TCP Congestion Control with a Misbehaving Receiver (local copy)
Detecting Forged TCP Reset Packets (local copy) Nagle
| A Look Back at Security Problems in the TCP/IP Protocol Suite(local copy)
|
Feb 12 |
DNS security problems and DNS security |
TCP/IP Tutorial and Technical Overview.pdf (local PDF). Sections:12.1 |
Using the Domain Name System for System Break-ins (local copy) Ben
A New Approach to DNS Security (DNSSEC) (local copy) Steckman
DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks (local copy) Jeremy
An Illustrated Guide to the Kaminsky DNS Vulnerability
|  
|
Feb 19 |
Denial of Service attacks |
What do we Mean by Network Denial of Service? |
Inferring Internet Denial-of-Service Activity (local copy) Mike
Implementing Pushback: Router-Based Defense Against DDoS Attacks (local copy) Cafaro
Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks (postscript) (local copy in pdf) Pete
Denial of Service via Algorithmic Complexity Attacks (local copy) Jeremy
Low-Rate TCP-Targeted Denial of Service Attacks and Counter Strategies (local copy) Ben
| Recent DNS Reflector Attacks From the Victim and the Reflector POV (local copy)
|
Feb 21 |
Firewalls and secure network architecture, Intrusion detection |
TCP/IP Tutorial and Technical Overview.pdf (local PDF). Sections:22.3 |
Firewalls
Network (In)Security Through IP Packet Filtering (local copy)
along with
The Design of a Secure Internet Gateway (local copy) Cafaro
Intrusion Detection
Intrusion and intrusion detection (local copy) Nagle
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection (local copy) Clay
Robust TCP Stream Reassembly In the Presence of Adversaries (local copy) Morton
|  
|
Mar 5 |
Routing security, Inter-domain routing security |
TCP/IP Tutorial and Technical Overview.pdf (local PDF). Sections:5.1, 5.2, 5.3, 5.8 |
Securing Distance-Vector Routing Protocols (local copy) Jeremy
Detecting Disruptive Routers: A Distributed Network Monitoring Approach (local copy) Cafaro
Secure Border Gateway Protocol (local copy) Steckman
PHAS: A Prefix Hijack Alert System (local copy) Mike
|  
|
Mar 12 |
Spring Break |
  |
 
|  
|
Mar 19 |
Multicast security, Wireless Security |
TCP/IP Tutorial and Technical Overview.pdf (local PDF). Sections:6.1 through 6.4,10.1 through 10.3 |
Multicast
Secure Group Communications Using Key Graphs (local copy)
Iolus: A Framework for Scalable Secure Multicasting (local copy)
Wireless
Intercepting Mobile Communications: The Insecurity of 802.11 (local copy) David
Practical attacks against WEP and WPA (local copy) Frank
|  
|
Mar 26 |
Wireless Security, Flash Worms |
  |
Wireless
802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions (local copy) Steckman
802.11 User Fingerprinting (local copy) Mike
Flash Worms
How to 0wn the Internet in Your Spare Time (local copy) Morton
Self-Stopping Worms (local copy)
Very Fast Containment of Scanning Worms (local copy) Ben
|  
|
Apr 2 |
Botnets and Spam |
  |
A Multifaceted Approach to Understanding the Botnet Phenomenon (local copy) Pete
Automating Analysis of Large-Scale Botnet Probing Events (local copy) Mike
Spamscatter: Characterizing Internet Scam Hosting Infrastructure (local copy) Morton
Spamalytics: An Empirical Analysis of Spam Marketing Conversion (local copy) Frank
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants (local copy) Jeremy
|  
|
Apr 9 |
Easter Break |
  |
 
|  
|
Apr 16 |
Anonymity |
  |
Crowds: Anonymity for Web Transactions (local copy) Ben
Tor: The Second-Generation Onion Router (local copy) Mike
The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems Clay
Hot or Not: Revealing Hidden Services by their Clock Skew (local copy) Steckman
|  
|
Apr 23 |
Attack Traceback |
  |
Detecting Stepping Stones (local copy) David
Network Support for IP Traceback (local copy) Jeremy
Hash-Based IP Traceback (local copy) Pete
Holding the Internet Accountable (local copy) Ben
|  
|