1 - Computer Science and Engineering

advertisement

References

1 Next Generation Internet Architecture Requirements

[1] NSF Workshop on Overcoming Barriers to Disruptive Innovation in Networking, January, 2005.

[2] NSF Workshop on Network Research Testbeds, November, 2002, Directorate for Computer and

Information Science and Engineering (CISE), Advanced Networking Infrastructure & Research

Division, November, 2002. http://gaia.cs.umass.edu/testbed_workshop

[3] President Information Technology Advisory Committee (PITAC) has Cyber Security: A Crisis of

Prioritization http://www.nitrd.gov/pitac/reports/20050301_cybersecurity/cybersecurity.pdf

[4]

Requirements for the Format for INcident information Exchange (FINE)

(24444 bytes)

[5]

Incident Handling: Real-Time Inter-Network Defense

(180879 bytes)

[6]

Extension to IODEF-Document Class for Phishing, Fraud, and Other Non-Network Layer

Reports

(72816 bytes)

[7] http://www.ietf.org/internet-drafts/draft-ietf-opsec-efforts-01.txt

[8] http://www.ietf.org/internet-drafts/draft-ietf-opsec-current-practices-01.txt

[9]

http://www.cs.cmu.edu/~hzhang/Talks/CleanSlate.pdf

2 Worm Propogation

 S. Staniford, V. Paxson, and N. Weaver, “How to own internet in your spare time” in

Proceedings of the USENIX Security Symposium ,pp. 149–167, August 2002.

 D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, “The spread of the sapphire worm.” http://cs.berkely.edu/ nweaver/sapphire.

 M. M. Williamson, “Throttling viruses: Restricting propagation to defeat malicious mobile code,” in 18 th Annual Computer Security Applications Conference , pp. 61–68, December 2002.

 P. Porras, L. Briesemeister, K. Skinner, K. Levitt, J. Rowe, and A. Ting, “A hybrid quarentine defense,” in 2nd Workshop on Rapid Malcode (WORM) , ACM SIGSAC, October 2004.

 C. Wong, S. Bielski, J. M. McCune, and C. Wangi, “A study of mass-mailing worms” in 2nd

Workshop on Rapid Malcode (WORM) ,ACM SIGSAC, October 2004.

 “Dynamic Control of Worm Propagation” R. Dantu, J. Cangussu, and A. Yelimeli

Ram Dantu, João W. Cangussu: “An Architecture for Network Security Using Feedback

Control”. ISI 2005: 636-637

 Analyzing Cooperative Containment of Fast Scanning Worms” Jayanthkumar Kannan,

Lakshminarayanan Subramanian, Ion Stoica, and Randy H. Katz, University of California,

Berkeley

, SRUTI ‘05 - Steps to Reducing Unwanted Traffic on the Internet Workshop

3 DOS Attack

Overview and Problem Definition

 J. Mirkovic and P. Reiher, “A taxonomy of DDoS attacks and DDoS defense mechanisms”, ACM

Computer Communications Review, 34(2):39--54, April 2004

Christoph L. Schuba, Ivan V. Krsul, Markus G. Kuhn, Eugene H. Spafford, Aurobindo

Sundaram, Diego Zamboni, “Analysis of a Denial of Service Attack on TCP”, Proceedings of the

1997 IEEE Symposium on Security and Privacy

Pars Mutaf, “Defending against a Denial-of-Service Attack on TCP” , pars@likya.iyte.edu.tr

,

Department of Computer Engineering Izmir, Recent Advances in Intrusion Detection

Methods

Adam Greenhalgh, Mark Handley, and Felipe Huici, University College London, “Using

Routing and Tunneling to Combat DoS Attacks”, SRUTI ’05 - Steps to Reducing Unwanted

Traffic on the Internet Workshop

Brennen Reynolds and Dipak Ghosal, Felix Wu, “Vulnerability Analysis and Security

Architectures for IP Telephony” University of California-Davis, Davis, California

 D. Moore, G. Voelker, and S. Savage, “Inferring Internet denial-of-service activity”, In

Proceedings of USENIX, 2001

 V. Yegneswaran, P. Barford, and J. Ullrich, “Internet intrusions: Global characteristics and prevalence”, In Proceedings of ACM SIGMETRICS, 2003

CAIDA. http://www.caida.org/

 T. M. Gil and M. Poletto, “MULTOPS: a data-structure for denial-of-service attack detection”, In

Proceedings of USENIX Security Symposium, 2001

 J. Ioannidis and S. M. Bellovin, “Implementing pushback: Router-based defense against DDoS attacks”, In Network and Distributed System Security Symposium, Feb 2002

 Garg and A. Reddy, “Mitigation of DoS attacks through QoS regulation”, In Proceedings of IEEE

International Workshop on Quality of Service (IWQoS), May 2002

 Jin, H. Wang, and K. G. Shin “Hop-count filtering: An effective defense against spoofed DoS traffic”, In Proceedings of 10th ACM International Conference on Computer and

Communications Security (CCS), pages 30-41, Oct 2003

 S. Kandula, D. Katabi, M. Jacob, and A. Burger, “Botz-4-sale: Surviving DDoS attacks that mimic flash crowrds”, In Proceedings of USENIX NSDI, May 2005

Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen, “Sketch-based change detection: Methods, evaluation, and applications”, In Proc. of ACM/USENIX Internet Measurement Conference

(IMC), 2003

 K. Park and H. Lee, “On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets”, In Proceedings of ACM SIGCOMM, August 2001

 H. Sun, J. Lui, and D. Yau, “Defending against low-rate TCP attacks: Dynamic detection and protection”, In Proceedings of ICNP, Oct 2004

Yaar, A. Perrig, and D. Song. SIFF, “A stateless internet flow filter to mitigate DDoS flooding attacks”, In IEEE Symposium on Security and Privacy, May 2004.

 R. Chertov, S. Fahmy, N. B. Shroff, “An experimental study of TCP-targeted denial of service attacks”, Submitted, 2005

4 IP Traceback

 A. Belenky and N. Ansari, “On IP Traceback”, IEEE Communications Magazine, July 2003

T. Baba and S. Matsuda. Tracing Network Attacks to Their Sources , IEEE Internet Computing ,

March 2002.

S. Matsuda, T. Baba, A. Hayakawa, and T. Nakamura. Design and Implementation of

Unauthorized Access Tracing System , In Proceedings of the 2002 Symposium on Applications and the Internet , 2002.

Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio,

Beverly Schwartz, Stephen T. Kent, and W. Timothy Strayer. Single-Packet IP Traceback , in

IEEE/ACM Transactions on Networking , Vol. 10, No. 6, Dec. 2002, pp. 721-734.

Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio,

Stephen T. Kent, and W. Timothy Strayer. Hash-Based IP Traceback , ACM SIGCOMM , 2001, pp. 3-14.

H. Burch and B. Cheswick, “Tracing anonymous packets to their approximate source,” in

Proc. of the 14th USENIX Systems Administration Conferrence , December 2000

J. Li, M. Sung, J. Xu, L. Li, and Q. Zhao, “Large-scale IP traceback in high-speed Internet:

Practical techniques and theoretical foundation,” in

Proc. of IEEE Symposium on Security and

Privacy , May 2004. http://www.utdallas.edu/~kxs028100/research/publications/ICC05.pdf#search='IP%20traceback ' http://www-cse.ucsd.edu/~savage/papers/Sigcomm00.pdf#search='IP%20traceback ' http://www.isoc.org/isoc/conferences/ndss/01/2001/papers/dean01.pdf#search='IP%20traceback http://www.ece.cmu.edu/~adrian/projects/iptraceback/triptrace.pdf#search='IP%20traceback ' http://www.ietf.org/html.charters/inch-charter.html

5 Multicast Security

Jean-Pierre Avognon, Huazhong University of Science and Technology, New Multicast Technology

“Survey and Security Concerns”, Information Technology Journal 3 (1): 95-105, 2004.

The Multicast Security Architecture (RFC 3740)

MIKEY: Multimedia Internet KEYing (RFC 3830)

Multicast Security (MSEC) Group Key Management Architecture (RFC 4046) http://www.ietf.org/internet-drafts/draft-ietf-msec-gsakmp-sec-10.txt

6 Identity Management

http://www.identityblog.com/ http://www.identityblog.com/stories/2004/12/09/thelaws.html

http://www.identityblog.com/stories/2005/07/05/IdentityMetasystem.htm

http://www.networkworld.com/newsletters/dir/2005/0718id2.html

A. Bhargav-Spantzel, A. C. Squicciarini, E. Bertino, “Integrating Federated Digital Identity

Management and Trust Negotiation”, to appear in

IEEE Security & Privacy , 2005

A. Bhargav-Spantzel, A. C. Squicciarini, E. Bertino, “Establishing and Protecting Digital Identity in

Federation Systems”,

ACM CCS2005 Workshop on Digital Identity Management , November 11,

2005, Fairfax, VA (in press)

 J.W. Byun, E. Bertino, N. Li, “Purpose Based Access Control of Complex Data for Privacy Protection”,

Proc. of 10th ACM Symposium on Access Control Models and Methodologies , Stockholm (Sweden),

June 1-3, 2005, ACM Press

 http://secnet.csci.unt.edu/IdentityManagement_WhitePaper.pdf

7 Emergency Services

 H. Tschofenig, H. Schulzrinne, M. Shanmugam, “Security Threats and Requirements for Emergency

Calling”, IETF Internet Draft, July 2005.

H. Schulzrinne and R. Marshall, "Requirements for Emergency Context Resolution with Internet

Technologies”, IETF Internet Draft, May2005 ( draft-schulzrinne-ecritrequirements-01.txt)

Framework for Supporting Emergency Telecommunications Service (ETS) in IP Telephony

(68414 bytes)

A Framework for Supporting Emergency Telecommunications Services (ETS) Within a Single

Administrative Domain

(43505 bytes)

Internet Emergency Preparedness (IEPREP)Telephony Topology Terminology (RFC 3523)

(10190 bytes)

IP Telephony Requirements for Emergency Telecommunication Service (RFC 3690)

(13919 bytes)

General Requirements for Emergency Telecommunication Service (RFC 3689)

(21680 bytes)

8 Spam filtering

Plan for Spam http://www.paulgraham.com/spam.html

Statistics and the war on spam http://www.stat.rutgers.edu/~madigan/PAPERS/sagtu.pdf

IP addresses in email clients http://www.ceas.cc/papers-2004/162.pdf

Beyond Identity: Addressing Problems that Persist in an Electronic Mail System with Reliable Sender

Identification http://www.ceas.cc/papers-2004/140.pdf

Spam Filtering Using Contextual Networking Graphs www.cs.tcd.ie/courses/csll/dkellehe0304.pdf

R. Dantu, P. Kolan, “Detecting Spam in VoIP Networks”, Proceedings of USENIX, SRUTI (Steps for

Reducing Unwanted Traffic on the Internet) workshop, July 05(accepted)

 M. Sahami, S. Dumais, D. Heckerman, and E. Horvitz. 1998, “A Bayesian Approach to Filtering Junk

E-Mail”, Learning for Text Categorization – Papers from the AAAI Workshop , pages 55–62, Madison

Wisconsin. AAAI Technical Report WS-98-05

 J. Golbeck, J. Hendler, ”Reputation Network Analysis for Email Filtering”, IEEE conference on Email and Anti Spam, August 2004

R. Dantu, J. Cangussu, A. Yelimeli, “Dynamic Control of Worm Propagation”, IEEE International

Conference on Information Technology ITCC April 04

N. Soonthornphisaj, K. Chaikulseriwat, P Tang-On, “Anti-Spam Filtering: A Centroid Based

Classification Approach”, IEEE proceedings ICSP 02

 G. Sakkis, I. Androutsopoulos, G. Paliouras, V. Karkaletsis, C.D. Spyropoulos, P. Stamatopoulos, “A memory based approach to anti-spam filtering for mailing lists”, Information Retrieval 2003

 W.W. Cohen, “Learning Rules that Classify e-mail”, In Proceedings of the AAAI Spring Symposium on Machine Learning in Information Access, 1996

 P.O. Boykin, V. Roychowdhury, “Personal email networks: an effective anti-spam tool”. Preprint, http://www.arxiv.org/abs/cond-mat/0402143, (2004)

9 Trust

9.1 Introductory or Informative

1. Formalising Trust as a Computational Concept http://www.cs.stir.ac.uk/research/publications/techreps/pdf/TR133.pdf

2. Supporting Trust in Virtual Communities http://www.cs.ucl.ac.uk/staff/F.AbdulRahman/docs/hicss33.pdf

3. Hardin, Russell. 2002. Trust & Trustworthiness, New York: Russell Sage

Foundation.

4. Cook, Karen (e.d.). 2001. Trust in Society, New York: Russell Sage

Foundation.

9.2 Surveys or Techniques

1. A Computational Model of Trust and Reputation http://csdl2.computer.org/comp/proceedings/hicss/2002/1435/07/14350188.pdf

2. Bayesian Network-Based Trust Model in Peer-to-Peer Networks http://bistrica.usask.ca/madmuc/Pubs/yao880.pdf

9.3 Metrics

1. Inferring Trust Relationships in Web-based Social Networks http://trust.mindswap.org/papers/toit.pdf

2. COMPUTING AND APPLYING TRUST IN WEB-BASED SOCIAL NETWORKS http://secnet.csci.unt.edu/acn/Golbeck.pdf

3. Trust and Reputation Model in Peer-to-Peer Networks http://www.cs.usask.ca/grads/yaw181/publications/120_wang_y.pdf

10 Reputation

10.1 Introductory or Informative

1. Closure, Trust and Reputation http://secnet.csci.unt.edu/acn/Closure_Trust_Reputation.pdf

2. The Friend-Of-A-Friend (FOAF) Project (2004). http://foaf-project.org

.

3. Simulated Social Control for Secure Internet Commerce http://www.sics.se/~sverker/public/papers/nsp96lra.pdf

10.2 Survey or Techniques

1. A Computational Model of Trust and Reputation http://csdl2.computer.org/comp/proceedings/hicss/2002/1435/07/14350188.pdf

2. Collaborative Reputation Mechanisms in Electronic Marketplaces http://csdl2.computer.org/comp//proceedings/hicss/1999/0001/08/00018026.PDF

10.3 Metrics

1. Trust and Reputation Model in Peer-to-Peer Networks http://www.cs.usask.ca/grads/yaw181/publications/120_wang_y.pdf

2. Computational Models of Trust and Reputation: Agents, Evolutionary

Games, and Social Networks http://secnet.csci.unt.edu/acn/computation.pdf

3. Accuracy of Metrics for Inferring Trust and Reputation in Semantic

Web-based Social Networks http://www.mindswap.org/papers/GolbeckEKAW04.pdf

11 Social Networks

 http://moloko.itc.it/trustmetricswiki/moin.cgi/AnalyzedTrustMetrics

 http://www.fbi.gov/majcases/fraud/fraudschemes.htm

 http://www.cs.washington.edu/homes/mattr/doc/iswc2003/iswc2003.pdf

 References regarding social networks http://www.socialnetworks.org/

 The Social Network and Relationship Finder: Social Sorting for Email Triage http://ceas.cc/papers-2005/149.pdf

 Extracting social networks and contact information from email and the Web http://ceas.cc/papers-2004/176.pdf

 Introduction to social network methods http://faculty.ucr.edu/~hanneman/nettext/

 Models of social networks based on social distance attachment http://citebase.eprints.org/cgibin/fulltext?format=application/pdf&identifier=oai:arXiv.org:nlin/0507021

 Inferring Trust Relationships in Web-based Social Networks http://trust.mindswap.org/papers/toit.pdf

 COMPUTING AND APPLYING TRUST IN WEB-BASED SOCIAL NETWORK http://secnet.csci.unt.edu/acn/Golbeck.pdf

 Reputation Network Analysis for Email Filtering www.ceas.cc/papers-2004/177.pdf

 Trust and Reputation Model in Peer-to-Peer Networks http://www.cs.usask.ca/grads/yaw181/publications/120_wang_y.pdf

 Computational Models of Trust and Reputation: Agents, Evolutionary

 Games, and Social Networks http://secnet.csci.unt.edu/acn/computation.pdf

Accuracy of

Metrics for Inferring Trust and Reputation in Semantic Web-based Social Networks http://www.mindswap.org/papers/GolbeckEKAW04.pdf

 Closure, Trust and Reputation http://secnet.csci.unt.edu/acn/Closure_Trust_Reputation.pdf

 A Computational Model of Trust and Reputation http://csdl2.computer.org/comp/proceedings/hicss/2002/1435/07/14350188.pdf

12 Topology Hiding

Middlebox Communication Architecture and framework (RFC 3303) (91209 bytes)

STUN - Simple Traversal of UDP Through Network Address Translators (RFC 3489) (117562 bytes).

Simple Traversal of UDP Through Network Address Translators (NAT) (STUN) (116303 bytes)

NAT Behavioral Requirements for Unicast UDP (62008 bytes)

IGMP Proxy Behavior (17711 bytes)

 B. Reynolds and D. Ghosal, “Secure IP Telephony using Multi-Layer Protection", The 10th Annual

Network and Distributed System Security Symposium, San Diego, California, February 2003.

 B. Reynolds and D. Ghosal, “STEM: Secure Telephony Enabled Middlebox”, IEEE Communications

Magazine Special Issue on Security in Telecommunication Networks. October 2002.

13 IMS

Look at the www.3gpp.org

. and see TS 23.228, 23.339, TS 24.228, 24.229.

14 Miscellaneous

http://www.dnsstuff.com/

Download