CSCI 8260 - Computer Network Attacks and DefensesFall 2014 |
This is the course calendar
for the Fall 2014 semester. Please notice that the schedule
is not definitive and will be updated as the course
progresses. Students are responsible for visiting this page
often to stay informed on the latest reading assignments and
other information. Of course, I will also inform you of
significant changes during the lectures, but this page is
the one place you should refer to for all the details. |
Date |
Topic |
Lecture / Reading Assignments |
Other Assignments |
8/19 |
Syllabus |
CSCI-8260
Syllabus [slides] |
Subscribe to mailing list CSCI8260-F14@listserv.cc.uga. Introduce yourself via email. |
8/20 |
Intro |
Introduction
to Computer and Network Security |
|
8/21 |
Intro |
Introduction
to Computer and Network Security [slides] |
|
8/26 |
Intro |
Introduction to Computer and Network Security | Choose 3 papers from the
following list |
8/27 |
Topics | Introduction to Computer and Network Security | |
8/28 |
Topics |
Overview of Research Topics | |
9/2 |
Topics |
Overview of Research Topics | |
9/3 |
Topics |
Overview of Research Topics
[slides] |
|
9/4 |
Networks |
Networking concepts (HTTP) |
Prepare short presentation of your reseaerch project (by 9/10); Send me the slides! |
9/9 |
Networks |
Networking concepts (SMTP,
DNS) [slides] |
Refer to project
presentation guidelines |
9/10 |
Networks | Networking concepts (DNS) | |
9/11 |
ML | Brief introduction to Pattern Recognition/Machine Learning concepts | |
9/16 |
ML | Brief introduction to Pattern Recognition/Machine Learning concepts | |
9/17 |
ML | Brief introduction to
Pattern Recognition/Machine Learning concepts [slides] |
|
9/18 |
ML | Brief introduction to
Pattern Recognition/Machine Learning concepts Student research project presentations. |
|
9/23 |
Projects | Student research project presentations. | |
9/24 |
Botnets |
G. Gu, R. Perdisci, J. Zhang, W. Lee. BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection. USENIX'08: Proceedings of the 17th conference on Security symposium. Presenter: Prof. Perdisci [slides] | Read the
papers before presentation! |
9/25 |
Malware detection |
R. Perdisci, W. Lee, and N. Feamster. Behavioral Clustering of HTTP-based Malware and Signature Generation using Malicious Network Traces. USENIX Symposium on Networked Systems Design and Implementation, NSDI 2010. Presenter: Prof. Perdisci [slides] | |
9/30 |
DNS-based malware detection |
Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, David Dagon. "From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware". USENIX Security Symposium, 2012. Prof. Perdisci [slides] | |
10/1 |
Malware downlaod defenses |
P. Vadrevu, B. Rahbarinia, R. Perdisci, K. Li, M. Antonakakis. "Measuring and Detecting Malware Downloads in Live Network Traffic." 18th European Symposium on Research in Computer Security, ESORICS 2013. Presenter: Prof. Perdisci [slides] | |
10/2 |
Search Poisoning | L. Lu, R. Perdisci, W. Lee.
SURF:
Detecting and Measuring Search Poisoning. ACM
Conference on Computer and Communications Security, ACM CCS
2011 Presenter: Prof. Perdisci [slides]
|
|
10/7 |
Botnet takedown |
B. Stone-Gross, M. Cova, L.
Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C.
Kruegel, G. Vigna. Your botnet is my botnet: analysis of a botnet takeover. CCS '09: Proceedings of the 16th ACM conference on Computer and communications security. PRESENTER: David |
|
10/8 |
Android Malware |
Yajin Zhou, Xuxian Jiang Dissecting Android Malware: Characterization and Evolution IEEE Symposium on Security and Privacy 2012 PRESENTER: Sneha |
|
10/9 |
Android security |
Adrienne Porter Felt et al. Android Permissions Demystified ACM conference on Computer and communications security, 2011 PRESENTER: Collin |
Write a short review (2
pages) for one of the papers discussed this week. (deadline 10/13) |
10/14 |
Passwords |
Joseph Bonneau, Cormac
Herley, Paul C. van Oorschot, Frank Stajano The quest to replace passwords: a framework for comparative evaluation of Web authentication schemes IEEE Symposium on Security and Privacy 2012 |
|
10/15 |
Guest Lecture: Prof. Kyu Hyung Lee | ||
10/16 |
Guest Lecture: Prof. Kang
Li |
||
10/21 |
Guest Lecture: Chris
Neasbitt -- WebCapsule |
||
10/22 |
Guest Lecture: Prof. Kyu
Hyung Lee |
||
10/23 |
Guest Lecture: Chris
Neasbitt -- ClickMiner |
||
10/28 |
Network attacks |
Z. Qian and Z. Morley Mao Off-Path TCP Sequence Number Inference Attack -- How Firewall Middleboxes Reduce Security IEEE Symposium on Security and Privacy 2012 PRESENTER: Jienan |
|
10/29 |
Student research project presentations (progress report). | ||
10/30 |
Spam |
K. Levchenko et al. Click Trajectories: End-to-End Analysis of the Spam Value Chain IEEE Symposium on Security and Privacy 2011 PRESENTER: Brandon |
Write a short review (2
pages) for one of the papers discussed this week. (deadline 11/04) |
11/4 |
Guest Lecture: Babak Rahabarinia -- PeerRush | ||
11/5 |
Guest Lecture: Babak Rahabarinia -- Segugio | ||
11/6 |
Guest Lecture: Babak
Rahabarinia -- WiFi Attacks |
||
11/11 |
Spam |
Kurt Thomas, Chris Grier,
Justin Ma, Vern Paxson, Dawn Song Design and Evaluation of a Real-Time URL Spam Filtering Service IEEE Symposium on Security and Privacy 2011 PRESENTER: Sneha |
|
11/12 |
Botnets |
Y.
Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I.
Osipkov. Spamming Botnets: Signatures and Characteristics. SIGCOMM'08. PRESENTER: David |
|
11/13 |
Data privacy |
R. Geambasu, T. Kohno, A.
Levy, H. M. Levy. Vanish: Increasing Data Privacy with Self-Destructing Data. In Proceedings of the USENIX Security Symposium 2009. PRESENTER: Collin |
Write a short review (2
pages) for one of the papers discussed this week. (deadline 11/18) |
11/18 |
Systems security |
C. Cowan, P. Wagle, C. Pu,
S. Beattie, J. Walpole. Buffer overflows: attacks and defenses for the vulnerability of the decade. Foundations of Intrusion Tolerant Systems, 2003 PRESENTER: Brandon |
|
11/19 |
Malware analysis |
H. Yin, D. Song, M. Egele,
C. Kruegel, and E. Kirda. Panorama: capturing system-wide information flow for malware detection and analysis. CCS '07: Proceedings of the 14th ACM conference on Computer and communications security. PRESENTER: Jienan |
|
11/20 |
Side channels |
S. Jana et al. Memento: Learning Secrets from Process Footprints IEEE Symposium on Security and Privacy 2012 PRESENTER: Michael |
Write a short review (2
pages) for one of the papers discussed this week. (deadline 11/25) |
12/2 |
Final Student Research
Project Presentations |
||
12/3 |
Final Student Research Project Presentations | ||
12/4 |
Final Student Research Project Presentations | Submit final research paper
by 11:59pm on December 11, 2014. Important: Use LaTeX! |
|
Participate to Student Course Evaluations (December 1 at 9:00am to December 10, at 11:59pm) |