CSCI 8260 - Computer Network Attacks and Defenses

Fall 2014

This is the course calendar for the Fall 2014 semester. Please notice that the schedule is not definitive and will be updated as the course progresses. Students are responsible for visiting this page often to stay informed on the latest reading assignments and other information. Of course, I will also inform you of significant changes during the lectures, but this page is the one place you should refer to for all the details.

Date
Topic
Lecture / Reading Assignments
Other Assignments
8/19
Syllabus
CSCI-8260 Syllabus [slides]
Subscribe to mailing list
CSCI8260-F14@listserv.cc.uga.edu

Introduce yourself via email.
8/20
Intro
Introduction to Computer and Network Security

8/21
Intro
Introduction to Computer and Network Security [slides]

8/26
Intro
Introduction to Computer and Network Security  Choose 3 papers from the following list
8/27
Topics Introduction to Computer and Network Security
8/28
Topics
Overview of Research Topics
9/2
Topics
Overview of Research Topics
9/3
Topics
Overview of Research Topics [slides]

9/4
Networks
Networking concepts (HTTP)
Prepare short presentation of your reseaerch project (by 9/10); Send me the slides!
9/9
Networks
Networking concepts (SMTP, DNS) [slides]
Refer to project presentation guidelines
9/10
Networks Networking concepts (DNS)
9/11
ML Brief introduction to Pattern Recognition/Machine Learning concepts
9/16
ML Brief introduction to Pattern Recognition/Machine Learning concepts
9/17
ML Brief introduction to Pattern Recognition/Machine Learning concepts [slides]


9/18
ML Brief introduction to Pattern Recognition/Machine Learning concepts
Student research project presentations.

9/23
Projects Student research project presentations.
9/24
Botnets
G. Gu, R. Perdisci, J. Zhang, W. Lee. BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection. USENIX'08: Proceedings of the 17th conference on Security symposium. Presenter: Prof. Perdisci [slides] Read the papers before presentation!
9/25
Malware detection
R. Perdisci, W. Lee, and N. Feamster. Behavioral Clustering of HTTP-based Malware and Signature Generation using Malicious Network Traces. USENIX Symposium on Networked Systems Design and Implementation, NSDI 2010. Presenter: Prof. Perdisci [slides]
9/30
DNS-based malware detection
Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, David Dagon. "From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware". USENIX Security Symposium, 2012. Prof. Perdisci [slides]
10/1
Malware downlaod defenses
P. Vadrevu, B. Rahbarinia, R. Perdisci, K. Li, M. Antonakakis. "Measuring and Detecting Malware Downloads in Live Network Traffic." 18th European Symposium on Research in Computer Security, ESORICS 2013. Presenter: Prof. Perdisci [slides]
10/2
Search Poisoning L. Lu, R. Perdisci, W. Lee. SURF: Detecting and Measuring Search Poisoning. ACM Conference on Computer and Communications Security, ACM CCS 2011 Presenter: Prof. Perdisci [slides]

10/7
Botnet takedown
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, G.  Vigna.
Your botnet is my botnet: analysis of a botnet takeover.
CCS '09: Proceedings of the 16th ACM conference on Computer and communications security.
PRESENTER: David

10/8
Android Malware
Yajin Zhou, Xuxian Jiang
Dissecting Android Malware: Characterization and Evolution
IEEE Symposium on Security and Privacy 2012
PRESENTER: Sneha

10/9
Android security
Adrienne Porter Felt et al.
Android Permissions Demystified
ACM conference on Computer and communications security, 2011
PRESENTER: Collin
Write a short review (2 pages) for one of the papers discussed this week.
(deadline 10/13)
10/14
Passwords
Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano
The quest to replace passwords: a framework for comparative evaluation of Web authentication schemes
IEEE Symposium on Security and Privacy 2012
PRESENTER: Michael

10/15

Guest Lecture: Prof. Kyu Hyung Lee
10/16

Guest Lecture: Prof. Kang Li

10/21

Guest Lecture: Chris Neasbitt -- WebCapsule

10/22

Guest Lecture: Prof. Kyu Hyung Lee

10/23

Guest Lecture: Chris Neasbitt -- ClickMiner

10/28
Network attacks
Z. Qian and Z. Morley Mao
Off-Path TCP Sequence Number Inference Attack -- How Firewall Middleboxes Reduce Security
IEEE Symposium on Security and Privacy 2012
PRESENTER: Jienan

10/29

Student research project presentations (progress report).
10/30
Spam
K. Levchenko et al.
Click Trajectories: End-to-End Analysis of the Spam Value Chain
IEEE Symposium on Security and Privacy 2011
PRESENTER: Brandon
Write a short review (2 pages) for one of the papers discussed this week.
(deadline 11/04)
11/4

Guest Lecture: Babak Rahabarinia -- PeerRush
11/5

Guest Lecture: Babak Rahabarinia -- Segugio
11/6

Guest Lecture: Babak Rahabarinia -- WiFi Attacks

11/11
Spam
Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song
Design and Evaluation of a Real-Time URL Spam Filtering Service
IEEE Symposium on Security and Privacy 2011
PRESENTER: Sneha

11/12
Botnets
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov.
Spamming Botnets: Signatures and Characteristics.
SIGCOMM'08.
PRESENTER: David

11/13
Data privacy
R. Geambasu, T. Kohno, A. Levy, H. M. Levy.
Vanish: Increasing Data Privacy with Self-Destructing Data.
In Proceedings of the USENIX Security Symposium 2009.
PRESENTER: Collin
Write a short review (2 pages) for one of the papers discussed this week.
(deadline 11/18)
11/18
Systems security
C. Cowan, P. Wagle, C. Pu, S. Beattie, J. Walpole.
Buffer overflows: attacks and defenses for the vulnerability of the decade.
Foundations of Intrusion Tolerant Systems, 2003
PRESENTER: Brandon

11/19
Malware analysis
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda.
Panorama: capturing system-wide information flow for malware detection and analysis.
CCS '07: Proceedings of the 14th ACM conference on Computer and communications security.
PRESENTER: Jienan

11/20
Side channels
S. Jana et al.
Memento: Learning Secrets from Process Footprints
IEEE Symposium on Security and Privacy 2012
PRESENTER: Michael
Write a short review (2 pages) for one of the papers discussed this week.
(deadline 11/25)
12/2

Final Student Research Project Presentations

12/3

Final Student Research Project Presentations
12/4

Final Student Research Project Presentations Submit final research paper by 11:59pm on December 11, 2014. Important: Use LaTeX!
Participate to Student Course Evaluations
(December 1 at 9:00am to December 10, at 11:59pm)