This is by no mean an absolute schedule. Check back here weekly as we
go along, ...
Last updated on
Monday, November 28, 2005 3:53 AM
- (*) indicates
a reading assignment. Remeber to submit a one-page (font size at least
10pt) summary for each assigned paper. The summaries are due on the
first class of the following week.
- The assignments for future weeks shall be
put up as we go along. Please make sure that you come back here often
and read the assigned papers accordingly.
- (!) indicates
a highly recommended reading, although not required.
|Week 1: Aug 29, 31, Sep 02
aspects of CSE 620, The design of the Internet: Past and Present. 3 required
- History and philosophy:
- Design of the Internet, e2e argument and studies
- V. Cerf and R. Kahn, A
Protocol for Packet Network Interconnection. IEEE Transactions
on Communications COM-22, pp. 637-641 , 1974.
- H. Zimmermann, OSI Reference Model - The ISO Model of Architecture
for Open Systems Interconnection, IEEE Transactions on Communications
COM-28, No. 4, April 1980.
791: Internet Protocol: DARPA Internet Program Protocol Specification
J. Postel, Sept. 1981
793: Internet Control Message Protocol, J. Postel, Sept. 1981
- J. Saltzer, D. Reed, and D. Clark, End-to-end
Arguments in System Design. ACM Transactions on Computer Systems
(TOCS), Vol. 2, No. 4, pp. 195-206, 1984.
- (*) D. Clark, Design
Philosophy of the DARPA Internet Protocols, In Proc. SIGCOMM
- (*) D. Clark and D. Tennenhouse,
Consideration for a New Generation of Protocols, In Proc. ACM
SIGCOMM '90 (Philadelphia, PA, September 1990).
1180: A TCP/IP Tutorial, T. Socolofsky and C. Kale, Jan., 1991
1519: Classless Inter-Domain Routing (CIDR): An Address Assignment
and Aggregation Strategy, V. Fuller, T. Li, J. Yu and K. Varadhan
- (*) J.-C. Bolot, End-to-End
Packet Delay and Loss Behavior in the Internet. In Proceedings
of SIGCOMM '93 (San Francisco, CA, August, 1993).
1884: IP Version 6: Addressing Architecture, R.Hinden, S. Deering,
2463: Internet Control Message Protocol (ICMPv6) for the Internet
Protocol Version 6 (IPv6), A. Conta and S. Deering, Dec., 1998
- Chuck Semeria, Understanding IP Addressing: Everything
You Ever Wanted To Know,: Part
1 (pp 1-21) | Part
2 (pp 22-43) | Part
3 (pp 44-65)
|Week 2: Sep 05, 07, 09
|Topics: Rethinking the design of the Internet.
4 required papers.
- No class on Mon, Sep 05: Labor Day.
- Sep 09: Each team registers for 1 or 2 research
topics, i.e. talk to me!
- Rethinking the design of the Internet
- S. Shenker, Fundamental
Design Issues for the Future Internet, IEEE Journal on Selected
Areas in Communications, Vol. 13, No. 7, pp. 1176-1188, September
- D. Isenberg, Computer Telephony, The
Rise of the Stupid Network, August 1997, pg 16-26.
- A. M. Odlyzko, Smart
and stupid networks: Why the Internet is like Microsoft, ACM
netWorker, 2(5) (Dec. 1998), pp. 38-46.
- David P. Reed, Jerome H. Saltzer, and David D. Clark, Active
Networking and End-To-End Arguments, Proc. ICNP `97, Atlanta,
GA, Oct. 1997.
- David Reed, The
end of end-to-end arguments, Reed's Locus, Apr 2000.
- (*) M. Blumenthal and D. Clark,
Rethinking the design
of the Internet: The end to end arguments vs. the brave new world,
ACM Transactions on Internet Technology, 1(1), August 2001.
- (*) Pablo Molinero-Fernadez,
Nick McKeown, Hui Zhang, Is
IP going to take over the world?, ACM HotNets 2002.
- Tim Moors, A
critical review of End-to-end arguments in system design, ICC
- Pablo Molinero-Fernández, Nick McKeown, TCP
switching: Exposing Circuits to IP, IEEE Micro, Vol. 22, No.
1, Jan/Feb 2002
- R. Bush and D. Meyer, Some
Internet Architectural Guidelines and Philosophy (RFC 3439),
- (*) David D. Clark, John Wroclawski,
Karen Sollins and Robert Braden, Tussle
in Cyberspace: Defining Tomorrow's Internet, SIGCOMM 2002
- (*) Clark, D., Sollins, K.,
Wroclawski, J., and Faber, T., Addressing
Reality: An Architectural Response to Real-World Demands on the
Evolving Internet, ACM SIGCOMM FDNA Workshop, Karlsruhe, August
- (!) A. M. Odlyzko, Data
networks are lightly utilized, and will stay that way, Review
of Network Economics, 2 (no. 3), September 2003, pp. 210-237
- Jon Crowcroft, Steven Hand, Richard Mortier, Timothy Roscoe,
Andrew Warfield, Plutarch:
An Argument for Network Pluralism,Computer Communication Review
(ACM SIGCOMM), Volume 33, Jan 2003.
- Kevin Fall, A
Delay-Tolerant Network Architecture for Challenged Internets,
Proc. SIGCOMM 2003, Aug. 2003
- Antonio Carzaniga and Alexander Wolf, Forwarding
in a Content-Based Network. SIGCOMM 2003.
- D. Clark et al, A
Knowledge Plane for the Internet. SIGCOMM 2003
- D. Oppenheimer, A. Ganapathi, and D. A. Patterson, Why
do Internet services fail, and what can be done about it?, Proc.
USENIX Symposium on Internet Technologies and Systems, 2003.
- Pablo Molinero-Fernández, Nick McKeown, The
performance of circuit switching in the Internet, OSA Journal
of Optical Networking, Vol. 2, No. 4, March 2003
- J. Mogul and L. Brakmo and D. Lowell and D. Subhraveti and J.
Moore, Unveiling the Transport,
HotNets-II, Nov. 2003.
on Future Directions in Network Architectures
- (!) J Crowcroft, T Uzuner,
A Warfield, Zen
and the art of networking research.
- (!) Andrew
Odlyzko: Complete publications list
- Some research projects
|Week 3: Sep 12, 14, 16
|Topics: Internet routing. 4 required papers
- Intra-domain routing protocols
- Inter-domain routing protocols
- A. Khanna and J. Zinky,
A Revised ARPANET Routing Metric, ACM SIGCOMM 1989.
- (*) T. Griffin and G. Wilfong.
An Analysis of BGP Convergence
Properties. ACM SIGCOMM 1999.
- (*) Craig Labovitz, Abha Ahuja,
Abhijit Bose and Farnam Jahanian, Delayed
Internet Routing Convergence, by Proceedings of ACM SIGCOMM, Stockholm,
Sweden, August 2000.
- (*) Aman Shaikh, Lampros Kalampoukas,
Rohit Dube, and Anujan Varma, Routing
Stability in Congested Networks: Experimentation and Analysis, ACM
- Timothy G. Griffin and Gordon Wilfong, A
Safe Path Vector Protocol, INFOCOM 2000.
- Lixin Gao and Jennifer Rexford, Stable
Internet routing without global coordination, IEEE/ACM Transactions
on Networking, 2001. (Earlier version appeared SIGMETRICS 2000).
- (*) David G. Andersen, Hari Balakrishnan,
M. Frans Kaashoek, Robert Morris, Resilient
Overlay Networks, SOSP 2001. [See their project
- A Basu, CHL Ong, A Rasala, FB Shepherd, G Wilfong, Route
oscillations in I-BGP with route reflection, SIGCOMM 2002.
- Ratul Mahajan, David Wetherall, Tom Anderson, Understanding
BGP Misconfiguration, SIGCOMM 2002.
- S. Iyer and S. Bhattacharyya and N. Taft and N. McKeown and C. Diot,
Approach to Alleviate Link Overload as Observed on an IP Backbone,
- Nick Feamster, Hari Balakrishnan, Jennifer Rexford, Aman Shaikh,
Kobus van der Merwe, "The
Case for Separating Routing from Routers", FDNA 2004.
- J Feigenbaum, C Papadimitriou, R Sami, S Shenker, A
BGP-based mechanism for lowest-cost routing, Distributed Computing,
- L. Subramanian, M. Caesar, C. Tien Ee, M. Handley, M. Mao, S. Shenker,
I. Stoica, “HLP: A Next Generation Interdomain Routing Protocol,” SIGCOMM’05.
|Week 4: Sep 19, 21, 23
|Topics: Mapping the Internet. 4 required
- Mapping the Internet, Topology Inference
- (*) Lixin Gao, On
Inferring Autonomous System Relationships in the Internet, Proceedings
of IEEE GLOBECOM, San Francisco, CA, November 2000.
- William B. Norton, Internet
Service Providers and Peering Draft paper, last modified (05/30/2001)
- (*) Lakshminarayanan Subramanian,
Sharad Agarwal, Jennifer Rexford, and Randy H. Katz, Characterizing
the Internet hierarchy from multiple vantage points, in Proc.
IEEE INFOCOM, June 2002. [ .pdf
] [ see also their research
- Neil Spring, Ratul Mahajan, David Wetherall, Measuring
ISP Topologies with Rocketfuel, ACM SIGCOM 2002.
- (!) Thomas Erlebach, Alexander
Hall and Thomas Schank, Classifying Customer-Provider Relationships
in the Internet, CCN 2002. [ .pdf
- David G. Andersen, Nick Feamster, Steve Bauer, and Hari Balakrishnan,
Inference from BGP Routing Dynamic, 2nd SIGCOMM Internet Measurement
Workshop, Marseille, France, November 2002.
- (*) G. Di Battista and M.
Patrignani and M. Pizzonia, Computing the Types of the Relationships
between Autonomous Systems, in INFOCOM 2003. [ .pdf
] [ see also their
research page ]
- (*) Z. M. Mao, J. Rexford,
J. Wang, and R. H. Katz, "Towards an Accurate AS-Level Traceroute
Tool," Proceeding of ACM SIGCOMM, August 2003. [ .pdf
- J Xia, L Gao, On the evaluation of AS relationship inferences,
GLOBECOM 2004 [ .pdf
- ZM Mao, L Qiu, J Wang, Y Zhang, On AS-Level Path Inference,
SIGMETRICS 2005 [ .ps
- Internet Topology Projects, Routing Tables, and Related Links
|Week 5: Sep 26, 28, 30
|Topics: Discrete Time Markov Chain, Exponential
Distribution, Poisson Process. NO required reading for this week
|Week 6: Oct 03, 06, 07
|Topics: Continuous Time Markov Chain, Queueing
Theory. NO required reading for this week
- Oct 03: Research proposal due (5 pages max).
Remember to make a website for your research project. Give links to
2, 3 representative papers on the subject you intend to study.
Queueing Theory Books. I recommend the following
|Week 7: Oct 10, 12, 14
|Topics: Some algorithmic tools for doing
research in networking. NO required reading for this week
|Week 8: Oct 17, 19, 21
|Topics: (Distributed) Denial of Service -
3 required papers
- Oct 21: Proposal review report due.
- Current security architecture
- Generic view of computer/internet security
- Overview of Attack
Trends by CERT
Taxonomy of Computer and Network Attacks, Chapter 6 in John
Howard Ph.D Thesis An Analysis of Security Incidents on the
- Carl E. Landweher, et al, A
taxonomy of computer program security flaws, ACM Computing Surveys,
Vol 26, Issue 3, Sept 1994.
- Crispin Cowan, Calton Pu, and Heather Hinton, Death,
Taxes, and Imperfect Software: Surviving the Inevitable, Presented
at the New Security Paradigms Workshop 1998.
- Crispin Cowan and Calton Pu, Survivability
From a Sow's Ear: The Retrofit Security Requirement, Presented
at the 2nd Information Survivability Workshop, 1998.
- Yegneswaran, Vinod; Barford, Paul; Ullrich, Johannes, Internet
Intrusions: Global Characteristics and Prevalence, In Proceedings
of ACM SIGMETRICS, June, 2003.
in Virus and Worms: a collection of research papers by Wenke
- DoS and DDoS
- (!) Distributed
Denial of Service (DDoS) Attacks/tools
- (!) Results
of the [CERT sponsored] Distributed-Systems Intruder Tools Workshop
- Kihong Park, Heejo Lee (Purdue University). "On
the Effectiveness of Route-Based Packet Filtering for Distributed
DoS Attack Prevention in Power-Law Internets," SIGCOMM
- Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis,
Vern Paxson, Scott Shenker, Controlling
High Bandwidth Aggregates in the Network, SIGCOMM 2001.
- J. Mirkovic, G. Prier and P. Reiher, Attacking
DDoS at the Source, ICNP 2002.
- Jaeyeon Jung, Balachander Krishnamurthy, and Michael Rabinovich.,
Flash Crowds and
Denial of Service Attacks: Characterization and Implications for
CDNs and Web Sites, WWW 2002
- J. Ioannidis and S. Bellovin. "Implementing
Pushback: Router-Based Defense Against DDoS Attacks," Proceedings
of Network and Distributed System Security Symposium, February 2002.
- D. Keromytis, V. Misra, D., Runbenstein, SOS:
Secure Overlay Services, ACM SIGCOMM 2002
- Avi Yaar, Adrian Perrig, and Dawn Song. Pi:
A Path Identification Mechanism to Defend against DDoS Attacks,
IEEE SSP 2003
- (*) Cheng Jin, Caltech, Haining
Wang and Kang Shin, Hop-Count
Filtering: An Effective Defense Against Spoofed DDoS Traffic,
ACM CCS 2003.
- Aleksandar Kuzmanovic and Edward W. Knightly. "Low-Rate
TCP-Targeted Denial of Service Attacks (The Shrew vs. the Mice and
Elephants)," SIGCOMM 2003
- (*) J. Mirkovic, J. Martin,
P. Reiher. "A
Taxonomy of DDoS Attacks and DDoS Defense Mechanisms,"
- TCP/IP fingerprinting
|Week 9: Oct 24, 26, 28
- Oct 24: term project progress presentations
(15 minutes each - be very brief!). Progress reports are due.
- Please come to class 20 minutes before 4pm.
- Monday (Oct 24): group 3 (Nguyen, Ha, Tran), group 2 (Varanasi),
group 6 (Arunachalam, Modi, Balachandran)
- Wednesday (Oct 26): group 8 (Baig, Dogra), group 4 (Yang, He)
- Friday (Oct 28): group 1 (Chakraborty), group 7 (Kodukula) group
5 (Patil, Phatak, Sivadasan),
- David Moore, Colleen Shannon, Geoffrey Voelker, Stefan Savage,
Internet Quarantine: Req
uirements for Containing Self-Propagating Codes, INFOCOM 2003.
- A Taxonomy of Computer
Worms by N. Weaver, V. Paxson, S. Staniford and R. Cunningham
at WORM workshop
- How to 0wn the Internet in Your Spare Time, by Stuart Staniford, Vern
Paxson, Nicholas Weaver
- Peter Reiher, Jun Li, and Geoff Kuenning. " Midgard Worms: Sudden Nasty Surprises from a Large Resilient
Zombie Army a>", UCLA Computer Science Department Technical
Report UCLA-CSD-040019, April, 2004.
- Brent N. Chun, Jason Lee and Hakim Weatherspoon. "
Netbait: A Distributed Worm Detection
Service" Intel Research Berk eley Technical Report IRB-TR-03-033,
- Cliff C. Zou, Nick Duffield, Don Towsley, and Weibo Gong. Adaptive Defense Against Various Network Attacks,
- Adaptive Detection Of Worms/viruses In Firewalls,
by InSeon Yoo and Ulr ich Ultes-Nitsche.
- The worm blog
|Week 10: Oct 31, Nov 02, 04
|Topics: Buffer Overflow Bug. No reading assignment
this week. However, there is a small programming
assignment. No class on Friday Nov 04,
I'm out for a meeting in NJ
- Buffer overflow (the bug)
- D. Wagner, J. Foster, E. Brewer, and A. Aiken, A
First Step Towards Automated Detection of Buffer Overrun Vulnerabilities,
- Sandeep Grover, Buffer
Overflow Attacks and Their Countermeasures, Monday, March 10,
2003 by Linux Journal Article
- Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan
Walpole, Buffer Overflows:
Attacks and Defenses for the Vulnerability of the Decade, Appeared
at the DARPA Information Survivability Conference and Expo (DISCEX)
contains a bunch of interesting articles and papers on buffer overflow
and other exploits, and protection techniques, etc.
|Week 11: Nov 07, 09, 11
|Topics: IP Spoofing, Intrusion Detection,
DNS Attacks. There will be 2 assigned readings for this week.
Check back here on Wednesday.
- IP Spoofing, IP Traceback
- (!) ICMP
Traceback Messages, draft-bellovin-itrace-00.txt, 2000
- (!) Stefan Savage, David Wetherall,
Anna Karlin, Tom Anderson (University of Washington). "Practical
Network Support For IP Traceback ," SIGCOMM 2000.
- (*) Alex C. Snoeren (MIT),
Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio,
Stephen T. Kent, W. Timothy Strayer (BBN Technologies). "Hash-Based
IP Traceback," SIGCOMM 2001.
- Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter Reiher, Lixia Zhang.
Address Validity Enforcement Protocol," INFOCOM 2002.
- A Belenky, N Ansari, IP traceback with deterministic packet marking,
IEEE Communications Letters, 2003
- H Aljifri, IP traceback:
A new denial-of-service deterrent?, IEEE Security & Privacy
- (!) Micah Adler, Tradeoffs
in Probabilistic Packet Marking for IP Traceback, STOC 2002.
[Also: In Journal of the ACM, Volume 52 , Issue 2 (March 2005).
Pages: 217 - 244.]
- (*) J Li, M Sung, J Xu, L
Li, Q Zhao, Large-Scale
IP Traceback in High-Speed Internet: Practical Techniques and Theoretical
Foundation, Proceedings of the IEEE Symposium on Security and
- (!) Micah Adler, Jeff Edmonds,
and Jiri Matousek, Towards Asymptotic Optimality
in Probabilistic Packet Marking, STOC 200
|Week 12: Nov 14, 16, 18
|Topics: Same as last week
|Week 13: Nov 21, 23, 25
- No class this week: Thanksgiving!
|Week 14: Nov 28, 30, Dec 02
|Topics: One Week on Cryptography.
Two required readings
|Week 15: Dec 05, 07, 09
- Friday is the last day of classes
- Term project presentations all week. We will
spend 4 nights in Bell 242. Two hours each night - two group presentations
of one hour for each group.
- Make sure that your presentation lasts for
45 minutes, leaving at minutes for questions.
|Week 16: Dec 12, 14, 16
- Dec 12: term project reports due, research
review reports due. These are hard deadlines!
I'm going out of town on Dec 14.