[1] NSF Workshop on Overcoming Barriers to Disruptive Innovation in Networking, January, 2005.
[2] NSF Workshop on Network Research Testbeds, November, 2002, Directorate for Computer and
Information Science and Engineering (CISE), Advanced Networking Infrastructure & Research
Division, November, 2002. http://gaia.cs.umass.edu/testbed_workshop
[3] President Information Technology Advisory Committee (PITAC) has Cyber Security: A Crisis of
Prioritization http://www.nitrd.gov/pitac/reports/20050301_cybersecurity/cybersecurity.pdf
[4]
(24444 bytes)
[5]
(180879 bytes)
[6]
(72816 bytes)
[7] http://www.ietf.org/internet-drafts/draft-ietf-opsec-efforts-01.txt
[8] http://www.ietf.org/internet-drafts/draft-ietf-opsec-current-practices-01.txt
[9]
S. Staniford, V. Paxson, and N. Weaver, “How to own internet in your spare time” in
Proceedings of the USENIX Security Symposium ,pp. 149–167, August 2002.
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, “The spread of the sapphire worm.” http://cs.berkely.edu/ nweaver/sapphire.
M. M. Williamson, “Throttling viruses: Restricting propagation to defeat malicious mobile code,” in 18 th Annual Computer Security Applications Conference , pp. 61–68, December 2002.
P. Porras, L. Briesemeister, K. Skinner, K. Levitt, J. Rowe, and A. Ting, “A hybrid quarentine defense,” in 2nd Workshop on Rapid Malcode (WORM) , ACM SIGSAC, October 2004.
C. Wong, S. Bielski, J. M. McCune, and C. Wangi, “A study of mass-mailing worms” in 2nd
Workshop on Rapid Malcode (WORM) ,ACM SIGSAC, October 2004.
“Dynamic Control of Worm Propagation” R. Dantu, J. Cangussu, and A. Yelimeli
Ram Dantu, João W. Cangussu: “An Architecture for Network Security Using Feedback
Control”. ISI 2005: 636-637
Analyzing Cooperative Containment of Fast Scanning Worms” Jayanthkumar Kannan,
Lakshminarayanan Subramanian, Ion Stoica, and Randy H. Katz, University of California,
Berkeley
, SRUTI ‘05 - Steps to Reducing Unwanted Traffic on the Internet Workshop
Overview and Problem Definition
J. Mirkovic and P. Reiher, “A taxonomy of DDoS attacks and DDoS defense mechanisms”, ACM
Computer Communications Review, 34(2):39--54, April 2004
Christoph L. Schuba, Ivan V. Krsul, Markus G. Kuhn, Eugene H. Spafford, Aurobindo
Sundaram, Diego Zamboni, “Analysis of a Denial of Service Attack on TCP”, Proceedings of the
1997 IEEE Symposium on Security and Privacy
Pars Mutaf, “Defending against a Denial-of-Service Attack on TCP” , pars@likya.iyte.edu.tr
,
Department of Computer Engineering Izmir, Recent Advances in Intrusion Detection
Methods
Adam Greenhalgh, Mark Handley, and Felipe Huici, University College London, “Using
Routing and Tunneling to Combat DoS Attacks”, SRUTI ’05 - Steps to Reducing Unwanted
Traffic on the Internet Workshop
Brennen Reynolds and Dipak Ghosal, Felix Wu, “Vulnerability Analysis and Security
Architectures for IP Telephony” University of California-Davis, Davis, California
D. Moore, G. Voelker, and S. Savage, “Inferring Internet denial-of-service activity”, In
Proceedings of USENIX, 2001
V. Yegneswaran, P. Barford, and J. Ullrich, “Internet intrusions: Global characteristics and prevalence”, In Proceedings of ACM SIGMETRICS, 2003
CAIDA. http://www.caida.org/
T. M. Gil and M. Poletto, “MULTOPS: a data-structure for denial-of-service attack detection”, In
Proceedings of USENIX Security Symposium, 2001
J. Ioannidis and S. M. Bellovin, “Implementing pushback: Router-based defense against DDoS attacks”, In Network and Distributed System Security Symposium, Feb 2002
Garg and A. Reddy, “Mitigation of DoS attacks through QoS regulation”, In Proceedings of IEEE
International Workshop on Quality of Service (IWQoS), May 2002
Jin, H. Wang, and K. G. Shin “Hop-count filtering: An effective defense against spoofed DoS traffic”, In Proceedings of 10th ACM International Conference on Computer and
Communications Security (CCS), pages 30-41, Oct 2003
S. Kandula, D. Katabi, M. Jacob, and A. Burger, “Botz-4-sale: Surviving DDoS attacks that mimic flash crowrds”, In Proceedings of USENIX NSDI, May 2005
Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen, “Sketch-based change detection: Methods, evaluation, and applications”, In Proc. of ACM/USENIX Internet Measurement Conference
(IMC), 2003
K. Park and H. Lee, “On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets”, In Proceedings of ACM SIGCOMM, August 2001
H. Sun, J. Lui, and D. Yau, “Defending against low-rate TCP attacks: Dynamic detection and protection”, In Proceedings of ICNP, Oct 2004
Yaar, A. Perrig, and D. Song. SIFF, “A stateless internet flow filter to mitigate DDoS flooding attacks”, In IEEE Symposium on Security and Privacy, May 2004.
R. Chertov, S. Fahmy, N. B. Shroff, “An experimental study of TCP-targeted denial of service attacks”, Submitted, 2005
A. Belenky and N. Ansari, “On IP Traceback”, IEEE Communications Magazine, July 2003
T. Baba and S. Matsuda. Tracing Network Attacks to Their Sources , IEEE Internet Computing ,
March 2002.
S. Matsuda, T. Baba, A. Hayakawa, and T. Nakamura. Design and Implementation of
Unauthorized Access Tracing System , In Proceedings of the 2002 Symposium on Applications and the Internet , 2002.
Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio,
Beverly Schwartz, Stephen T. Kent, and W. Timothy Strayer. Single-Packet IP Traceback , in
IEEE/ACM Transactions on Networking , Vol. 10, No. 6, Dec. 2002, pp. 721-734.
Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio,
Stephen T. Kent, and W. Timothy Strayer. Hash-Based IP Traceback , ACM SIGCOMM , 2001, pp. 3-14.
H. Burch and B. Cheswick, “Tracing anonymous packets to their approximate source,” in
Proc. of the 14th USENIX Systems Administration Conferrence , December 2000
J. Li, M. Sung, J. Xu, L. Li, and Q. Zhao, “Large-scale IP traceback in high-speed Internet:
Practical techniques and theoretical foundation,” in
Proc. of IEEE Symposium on Security and
Privacy , May 2004. http://www.utdallas.edu/~kxs028100/research/publications/ICC05.pdf#search='IP%20traceback ' http://www-cse.ucsd.edu/~savage/papers/Sigcomm00.pdf#search='IP%20traceback ' http://www.isoc.org/isoc/conferences/ndss/01/2001/papers/dean01.pdf#search='IP%20traceback http://www.ece.cmu.edu/~adrian/projects/iptraceback/triptrace.pdf#search='IP%20traceback ' http://www.ietf.org/html.charters/inch-charter.html
Jean-Pierre Avognon, Huazhong University of Science and Technology, New Multicast Technology
“Survey and Security Concerns”, Information Technology Journal 3 (1): 95-105, 2004.
The Multicast Security Architecture (RFC 3740)
MIKEY: Multimedia Internet KEYing (RFC 3830)
Multicast Security (MSEC) Group Key Management Architecture (RFC 4046) http://www.ietf.org/internet-drafts/draft-ietf-msec-gsakmp-sec-10.txt
http://www.identityblog.com/ http://www.identityblog.com/stories/2004/12/09/thelaws.html
http://www.identityblog.com/stories/2005/07/05/IdentityMetasystem.htm
http://www.networkworld.com/newsletters/dir/2005/0718id2.html
A. Bhargav-Spantzel, A. C. Squicciarini, E. Bertino, “Integrating Federated Digital Identity
Management and Trust Negotiation”, to appear in
IEEE Security & Privacy , 2005
A. Bhargav-Spantzel, A. C. Squicciarini, E. Bertino, “Establishing and Protecting Digital Identity in
Federation Systems”,
ACM CCS2005 Workshop on Digital Identity Management , November 11,
2005, Fairfax, VA (in press)
J.W. Byun, E. Bertino, N. Li, “Purpose Based Access Control of Complex Data for Privacy Protection”,
Proc. of 10th ACM Symposium on Access Control Models and Methodologies , Stockholm (Sweden),
June 1-3, 2005, ACM Press
http://secnet.csci.unt.edu/IdentityManagement_WhitePaper.pdf
H. Tschofenig, H. Schulzrinne, M. Shanmugam, “Security Threats and Requirements for Emergency
Calling”, IETF Internet Draft, July 2005.
H. Schulzrinne and R. Marshall, "Requirements for Emergency Context Resolution with Internet
Technologies”, IETF Internet Draft, May2005 ( draft-schulzrinne-ecritrequirements-01.txt)
(68414 bytes)
(43505 bytes)
(10190 bytes)
(13919 bytes)
(21680 bytes)
Plan for Spam http://www.paulgraham.com/spam.html
Statistics and the war on spam http://www.stat.rutgers.edu/~madigan/PAPERS/sagtu.pdf
IP addresses in email clients http://www.ceas.cc/papers-2004/162.pdf
Beyond Identity: Addressing Problems that Persist in an Electronic Mail System with Reliable Sender
Identification http://www.ceas.cc/papers-2004/140.pdf
Spam Filtering Using Contextual Networking Graphs www.cs.tcd.ie/courses/csll/dkellehe0304.pdf
R. Dantu, P. Kolan, “Detecting Spam in VoIP Networks”, Proceedings of USENIX, SRUTI (Steps for
Reducing Unwanted Traffic on the Internet) workshop, July 05(accepted)
M. Sahami, S. Dumais, D. Heckerman, and E. Horvitz. 1998, “A Bayesian Approach to Filtering Junk
E-Mail”, Learning for Text Categorization – Papers from the AAAI Workshop , pages 55–62, Madison
Wisconsin. AAAI Technical Report WS-98-05
J. Golbeck, J. Hendler, ”Reputation Network Analysis for Email Filtering”, IEEE conference on Email and Anti Spam, August 2004
R. Dantu, J. Cangussu, A. Yelimeli, “Dynamic Control of Worm Propagation”, IEEE International
Conference on Information Technology ITCC April 04
N. Soonthornphisaj, K. Chaikulseriwat, P Tang-On, “Anti-Spam Filtering: A Centroid Based
Classification Approach”, IEEE proceedings ICSP 02
G. Sakkis, I. Androutsopoulos, G. Paliouras, V. Karkaletsis, C.D. Spyropoulos, P. Stamatopoulos, “A memory based approach to anti-spam filtering for mailing lists”, Information Retrieval 2003
W.W. Cohen, “Learning Rules that Classify e-mail”, In Proceedings of the AAAI Spring Symposium on Machine Learning in Information Access, 1996
P.O. Boykin, V. Roychowdhury, “Personal email networks: an effective anti-spam tool”. Preprint, http://www.arxiv.org/abs/cond-mat/0402143, (2004)
1. Formalising Trust as a Computational Concept http://www.cs.stir.ac.uk/research/publications/techreps/pdf/TR133.pdf
2. Supporting Trust in Virtual Communities http://www.cs.ucl.ac.uk/staff/F.AbdulRahman/docs/hicss33.pdf
3. Hardin, Russell. 2002. Trust & Trustworthiness, New York: Russell Sage
Foundation.
4. Cook, Karen (e.d.). 2001. Trust in Society, New York: Russell Sage
Foundation.
1. A Computational Model of Trust and Reputation http://csdl2.computer.org/comp/proceedings/hicss/2002/1435/07/14350188.pdf
2. Bayesian Network-Based Trust Model in Peer-to-Peer Networks http://bistrica.usask.ca/madmuc/Pubs/yao880.pdf
1. Inferring Trust Relationships in Web-based Social Networks http://trust.mindswap.org/papers/toit.pdf
2. COMPUTING AND APPLYING TRUST IN WEB-BASED SOCIAL NETWORKS http://secnet.csci.unt.edu/acn/Golbeck.pdf
3. Trust and Reputation Model in Peer-to-Peer Networks http://www.cs.usask.ca/grads/yaw181/publications/120_wang_y.pdf
1. Closure, Trust and Reputation http://secnet.csci.unt.edu/acn/Closure_Trust_Reputation.pdf
2. The Friend-Of-A-Friend (FOAF) Project (2004). http://foaf-project.org
.
3. Simulated Social Control for Secure Internet Commerce http://www.sics.se/~sverker/public/papers/nsp96lra.pdf
1. A Computational Model of Trust and Reputation http://csdl2.computer.org/comp/proceedings/hicss/2002/1435/07/14350188.pdf
2. Collaborative Reputation Mechanisms in Electronic Marketplaces http://csdl2.computer.org/comp//proceedings/hicss/1999/0001/08/00018026.PDF
1. Trust and Reputation Model in Peer-to-Peer Networks http://www.cs.usask.ca/grads/yaw181/publications/120_wang_y.pdf
2. Computational Models of Trust and Reputation: Agents, Evolutionary
Games, and Social Networks http://secnet.csci.unt.edu/acn/computation.pdf
3. Accuracy of Metrics for Inferring Trust and Reputation in Semantic
Web-based Social Networks http://www.mindswap.org/papers/GolbeckEKAW04.pdf
http://moloko.itc.it/trustmetricswiki/moin.cgi/AnalyzedTrustMetrics
http://www.fbi.gov/majcases/fraud/fraudschemes.htm
http://www.cs.washington.edu/homes/mattr/doc/iswc2003/iswc2003.pdf
References regarding social networks http://www.socialnetworks.org/
The Social Network and Relationship Finder: Social Sorting for Email Triage http://ceas.cc/papers-2005/149.pdf
Extracting social networks and contact information from email and the Web http://ceas.cc/papers-2004/176.pdf
Introduction to social network methods http://faculty.ucr.edu/~hanneman/nettext/
Models of social networks based on social distance attachment http://citebase.eprints.org/cgibin/fulltext?format=application/pdf&identifier=oai:arXiv.org:nlin/0507021
Inferring Trust Relationships in Web-based Social Networks http://trust.mindswap.org/papers/toit.pdf
COMPUTING AND APPLYING TRUST IN WEB-BASED SOCIAL NETWORK http://secnet.csci.unt.edu/acn/Golbeck.pdf
Reputation Network Analysis for Email Filtering www.ceas.cc/papers-2004/177.pdf
Trust and Reputation Model in Peer-to-Peer Networks http://www.cs.usask.ca/grads/yaw181/publications/120_wang_y.pdf
Computational Models of Trust and Reputation: Agents, Evolutionary
Games, and Social Networks http://secnet.csci.unt.edu/acn/computation.pdf
Accuracy of
Metrics for Inferring Trust and Reputation in Semantic Web-based Social Networks http://www.mindswap.org/papers/GolbeckEKAW04.pdf
Closure, Trust and Reputation http://secnet.csci.unt.edu/acn/Closure_Trust_Reputation.pdf
A Computational Model of Trust and Reputation http://csdl2.computer.org/comp/proceedings/hicss/2002/1435/07/14350188.pdf
Middlebox Communication Architecture and framework (RFC 3303) (91209 bytes)
STUN - Simple Traversal of UDP Through Network Address Translators (RFC 3489) (117562 bytes).
Simple Traversal of UDP Through Network Address Translators (NAT) (STUN) (116303 bytes)
NAT Behavioral Requirements for Unicast UDP (62008 bytes)
IGMP Proxy Behavior (17711 bytes)
B. Reynolds and D. Ghosal, “Secure IP Telephony using Multi-Layer Protection", The 10th Annual
Network and Distributed System Security Symposium, San Diego, California, February 2003.
B. Reynolds and D. Ghosal, “STEM: Secure Telephony Enabled Middlebox”, IEEE Communications
Magazine Special Issue on Security in Telecommunication Networks. October 2002.
Look at the www.3gpp.org
. and see TS 23.228, 23.339, TS 24.228, 24.229.
http://www.dnsstuff.com/