Network Security

CS 254 - Spring 2022

OverviewSchedule/ReadingsAttack/Tool PresentationsCourse Project

Readings

Paper Response Guidelines

Write a ~400 word critical response and comments to each required paper. Focus on the following:

The more you write about B and C, the better. Your most important task is to demonstrate that you've read the paper and thought carefully about the topic. Feel free to give other original/creative thoughts that are not listed above (and do some research if possible to check their feasibility). No copy and paste of the original paper text --- if detected, lowest possible score will be given automatically!

Paper responses are due before each class (submit on ilearn). A response for each paper will be graded and returned back with a check-, check, or check+.

Be prepared to discuss in the lecture with your notes about what you find interesting and want to know more about (they can be questions, critics, etc.).

Discussion Lead and Extra Points

Please take a look at the papers in each session. If you are interested in leading the discussion of any session, you should sign up on the web sheet published through ilearn and get extra points for doing so. As a discussion lead, two tasks are expected: 1) You will summarize the papers in class (with or without slides) for 10-min each. 2) You should prepare yourself by reading the technical details carefully and coming up with a list of discussion points. The discussion points should be designed to engage students in critical and creative thinking. Think about the points ahead of time and be prepared to answer questions other students may throw at you. Email ahead of time your discussion points to instructor for feedback. Please allow 2 days to receive the feedback. This will be a good opportunity for you to learn to discuss ideas around a research topic and it generally helps your presentation and communication skills.

Reading List

Most papers should be publicly accessible. If any links are broken, please search for them. If any of them require paid subscription, you can access them for free when connecting on campus. For off-campus access, try UCR VPN.

Week 1

Tuesday, Mar 29

Thursday, Mar 31 --- Where we started (one combined response)

 

Week 2 - meet instructor to pick projects - Initial idea due on Friday (by email)

Tuesday, Apr 5 --- Denial-of-Service (separate responses)

 

Thursday, Apr 7 – TCP/IP (one combined response)

Week 3

Tuesday, Apr 12 – Guest lecture (TBD).

       No readings!

Thursday, Apr 14 – Off-Path TCP/UDP Attacks (separate responses)

Week 4 - Proposal report due Friday

Tuesday, Apr 19 – Reconnaissance (one combined response)

Thursday, Apr 21 – Pre-proposal presentation

       No readings!

Week 5

Tuesday, Apr 26 – Crypto intro

  • Lecture.

Thursday, Apr 28 – Public key cryptography (SSL/TLS)

  • Lecture.

Week 6

Tuesday, May 3 – Attack and Tool Presentation

       No readings!

Thursday, May 5 – Attack and Tool Presentation

   No readings!

Week 7

Tuesday, May 10 – Email Security

Thursday, May 12 – Anonimity

Week 8

Tuesday, May 17 – Censorship (separate responses)

Thursday, May 19 – Internet Worm (one combined response)

Week 9

Tuesday, May 24 – Botnet (separate responses)

Thursday, May 26 – Internet-wide measurement

Week 10

Tuesday, May 31 – Underground economy

Thursday, Jun 2 – Network Intrusion Detection (separate responses)

Week 11

Date TBD – Project Presentation

Date TBD, final project report due