|
Alan Kaminsky
|
|
•
|
|
Department of Computer Science
|
|
•
|
|
Rochester Institute of Technology
|
|
•
|
|
4486 +
2220 =
6706
|
|
Home Page
|
|
Advanced Computer Networks
|
|
•
|
|
4005-741-01
|
|
•
|
|
Fall Quarter 2009
|
|
Course Page
|
4005-741-01 Advanced Computer Networks
Research Paper Presentations
Prof. Alan Kaminsky -- Fall Quarter 2009
Rochester Institute of Technology -- Department of Computer Science
Research Paper 1 Presentation
Research Paper 1 Schedule
Research Paper 1 Citations
Research Paper 1 Grading
Research Paper 2 Presentation
Research Paper 2 Schedule
Research Paper 2 Citations
Research Paper 2 Grading
Absences
Late Submissions
Plagiarism
Research Paper 1 Presentation
You must do the following:
-
Do a literature search
and identify an original research paper of interest to you
in the general topic area of
defense against malicious routers.
The paper must be dated 1999 or later
(i.e., within the past ten years).
The paper must be published
in a refereed archival research journal
or conference proceedings --
that is, in a publication aimed at researchers.
For help with your literature search,
take a look at the
"Information Sources for Primary Research,"
use the resources on the Wallace Library's
web site
for the Golisano College of Computing and Information Sciences,
or contact the College's specialist reference librarian,
Roman Koshykar (see the web site).
Not every magazine published by the IEEE or ACM
carries original research papers.
Publications titled Transactions on ...
or Proceedings of the Conference on ...
generally do carry original research papers.
Publications titled Journal of ...
may or may not carry original research papers.
ACM Computing Surveys does not carry original research papers,
rather it carries articles that survey others' work.
Magazines like IEEE Computer, IEEE Network,
and Communications of the ACM
do not carry original research papers.
While these magazines' articles
superficially resemble research papers in format,
these articles are generally aimed at a broad audience
including practitioners and casual readers,
not primarily researchers.
You may use such articles for background material,
but they are not acceptable
for the original research paper
that you are to analyze for this assignment.
(However, such articles often include original research papers
among their references.)
If you have any question
about whether a certain publication or article is acceptable,
please ask me.
-
Send me an email with the complete citation for the paper.
The citation is due at 11:59pm
one week before your class presentation is scheduled.
See the Research Paper 1 Schedule below.
The citation must include the following information:
Author(s), title, journal or conference, date, page numbers.
The citation must not include
hypertext links of any kind.
If your citation obeys the above requirements,
and if no other student has already chosen the same paper,
I will accept your citation.
If your citation does not obey the above requirements,
or if another student has already chosen the same paper,
I will not accept your citation,
and you will have to choose another paper.
I will send an email back to you
telling whether I accepted your citation.
As students send their citations,
I will post them under
Research Paper 1 Citations below.
If I receive your citation before the deadline
and I accept it,
your citation will receive full credit,
otherwise your citation will receive zero credit.
There will be no extensions for the citations.
See Research Paper 1 Grading below.
-
Analyze the paper and present your analysis in class
on the date shown in the
Research Paper 1 Schedule below.
You will have 20 minutes for your presentation.
You must prepare electronic slides
(using Microsoft PowerPoint, OpenOffice Impress, or the like)
and project the slides during your presentation.
Your presentation must cover the following information:
-
Paper.
Give the author(s), title, journal or conference, date, and page numbers.
-
Introduction and background.
Give a general introduction
to the paper's topic area,
and give any general information
needed to understand the paper.
-
Problems addressed.
Describe the specific problem or problems
the authors are trying to solve.
-
Solutions proposed.
Describe how the authors solved the problem or problems.
Describe what is new and/or unique about the author's solution.
Note that you must not present
merely a condensed summary of the paper.
You must achieve a deep understanding of what is in the paper,
identify what is important and novel in the paper,
and convey your understanding to the audience.
-
Send me an email with an attached file
containing the electronic slides from your presentation.
The slides must be in the form of a PDF file.
The slides are due at 11:59pm
on the day your class presentation is scheduled.
See the Research Paper 1 Schedule below.
If I receive a PDF file with your slides before the deadline,
your slides will receive full credit,
otherwise your slides will receive zero credit.
There will be no extensions for the slides.
See Research Paper 1 Grading below.
Research Paper 1 Schedule
| Student |
|
Citation Due |
|
Presentation in Class |
| |
|
|
|
|
| Georgiades, Valentinos |
|
11:59pm 23-Sep-2009 |
|
30-Sep-2009 |
| Parkar, Dhawal |
|
11:59pm 23-Sep-2009 |
|
28-Sep-2009 |
| Patel, Nishad |
|
11:59pm 23-Sep-2009 |
|
30-Sep-2009 |
| Pillai, Abhijit |
|
11:59pm 23-Sep-2009 |
|
28-Sep-2009 |
| |
|
|
|
|
| Rao, Sudarshan |
|
11:59pm 30-Sep-2009 |
|
07-Oct-2009 |
| Risi, Adam |
|
11:59pm 30-Sep-2009 |
|
07-Oct-2009 |
| Solt, Paul |
|
11:59pm 30-Sep-2009 |
|
07-Oct-2009 |
| Thangaraj, Barath |
|
11:59pm 30-Sep-2009 |
|
07-Oct-2009 |
Research Paper 1 Citations
-
Valentinos Georgiades (vag0971)
A. Mizrak, S. Savage, and K. Marzullo.
Detecting malicious packet losses.
IEEE Transactions on Parallel and Distributed Systems,
20(2):191-206, February 2009.
— Presentation [PDF]
-
Dhawal Parkar (ddp7607)
X. Yang, H. Hu, and X. Chen.
SFMD: A secure data forwarding and malicious routers detecting protocol.
In 3rd International Conference on Availability, Reliability, and Security (ARES 08),
pages 484-490, March 2008.
— Presentation [PDF]
-
Nishad Patel (nxp3932)
S. Lee, T. Wong, and H. Kim.
Secure split assignment trajectory sampling: a malicious router detection system.
In International Conference on Dependable Systems and Networks (DSN 2006),
pages 333-342, June 2006.
— Presentation [PDF]
-
Abhijit Pillai (ahp1252)
Z. Zhang, Y. Zhang, Y. Hu, and Z. Mao.
Practical defenses against BGP prefix hijacking.
In 2007 ACM International Conference on Emerging Networking Experiments and Technologies (CoNEXT 2007),
2007.
— Presentation [PDF]
-
Sudarshan Rao (sdr3491)
S. Tang, K. Wong, and K. Yeung.
Path analysis: detection of triangle routing attacks in IPv6.
In 11th International Conference on Parallel and Distributed Systems (ICPADS 2005),
pages 250-254, July 2005.
— Presentation [PDF]
-
Adam Risi (ajr7708)
A. Mizrak, Y. Cheng, K. Marzullo, and S. Savage.
Fatih: detecting and isolating malicious routers.
In International Conference on Dependable Systems and Networks (DSN 2005),
pages 538-547, July 2005.
— Presentation [PDF]
-
Paul Solt (pds2352)
J. Karlin, S. Forrest, and J. Rexford.
Pretty Good BGP: improving BGP by cautiously adopting routes.
In 14th IEEE International Conference on Network Protocols (ICNP 2006),
pages 290-299, 2006.
— Presentation [PDF]
-
Barath Thangaraj (bxt4564)
M. Goodrich.
Leap-frog packet linking and diverse key distributions for improved integrity in network broadcasts.
In IEEE Symposium on Security and Privacy,
pages 196-207, May 2005.
— Presentation [PDF]
Research Paper 1 Grading
- [5 points] Citation
5 = Citation submitted by the deadline and accepted
0 = Otherwise
- [5 points] Presentation -- Paper
5 = All information listed
3 = Some information missing
0 = Unsatisfactory
- [10 points] Presentation -- Introduction and background
10 = Satisfactory
8 = Needs minor improvements
6 = Needs major improvements
0 = Unsatisfactory
- [10 points] Presentation -- Problems addressed
10 = Satisfactory
8 = Needs minor improvements
6 = Needs major improvements
0 = Unsatisfactory
- [10 points] Presentation -- Solutions proposed
10 = Satisfactory
8 = Needs minor improvements
6 = Needs major improvements
0 = Unsatisfactory
- [5 points] Slides
5 = Slides submitted by the deadline and accepted
0 = Otherwise
- [45 points] Total
After I have evaluated your presentation,
I will add your grade for the presentation
and any comments I have
to your encrypted grade file.
See the Course Policies
and the Encrypted Grades
for further information.
Research Paper 2 Presentation
You must do the same as the
Research Paper 1 Presentation,
except identify an original research paper of interest to you
in the general topic area of
defense against denial of service (DOS) attacks.
Research Paper 2 Schedule
| Student |
|
Citation Due |
|
Presentation in Class |
| |
|
|
|
|
| Georgiades, Valentinos |
|
11:59pm 21-Oct-2009 |
|
28-Oct-2009 |
| Parkar, Dhawal |
|
11:59pm 21-Oct-2009 |
|
28-Oct-2009 |
| Patel, Nishad |
|
11:59pm 21-Oct-2009 |
|
28-Oct-2009 |
| Pillai, Abhijit |
|
11:59pm 21-Oct-2009 |
|
28-Oct-2009 |
| |
|
|
|
|
| Rao, Sudarshan |
|
11:59pm 28-Oct-2009 |
|
04-Nov-2009 |
| Risi, Adam |
|
11:59pm 28-Oct-2009 |
|
04-Nov-2009 |
| Solt, Paul |
|
11:59pm 28-Oct-2009 |
|
04-Nov-2009 |
| Thangaraj, Barath |
|
11:59pm 28-Oct-2009 |
|
04-Nov-2009 |
Research Paper 2 Citations
-
Valentinos Georgiades (vag0971)
J. Xu and W. Lee.
Sustaining availability of Web services under distributed denial of service attacks.
IEEE Transactions on Computers,
52(2):195-208, February 2003.
— Presentation [PDF]
-
Dhawal Parkar (ddp7607)
F. Lau, S. Rubin, M. Smith, and L. Trajkovic.
Distributed denial of service attacks.
In 2000 IEEE International Conference on Systems, Man, and Cybernetics,
Volume 3, pages 2275-2280, October 2000.
— Presentation [PDF]
-
Nishad Patel (nxp3932)
C. Lin, J. Liu, H. Huang, and T. Yang.
Using adaptive bandwidth allocation approach to defend DDoS attacks.
In International Conference on Multimedia and Ubiquitous Engineering (MUE 2008),
pages 176-181, April 2008.
— Presentation [PDF]
-
Abhijit Pillai (ahp1252)
H. Beitollahi and G. Deconinck.
FOSeL: filtering by helping an overlay security layer to mitigate DOS attacks.
In 7th IEEE International Symposium on Network Computing and Applications (NCA '08),
pages 19-28, July 2008.
— Presentation [PDF]
-
Sudarshan Rao (sdr3491)
A. Kuzmanovic and E. Knightly.
Low-rate TCP-targeted denial of service attacks and counter strategies.
IEEE/ACM Transactions on Networking,
14(4):683-696, August 2006.
— Presentation [PDF]
-
Adam Risi (ajr7708)
D. Yau, J. Lui, F. Liang, and Y. Yam.
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles.
IEEE/ACM Transactions on Networking,
13(1):29-42, February 2005.
— Presentation [PDF]
-
Paul Solt (pds2352)
V. Pappas, D. Massey, and L. Zhang.
Enhancing DNS resilience against denial of service attacks.
In 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '07),
pages 450-459, June 2007.
— Presentation [PDF]
-
Barath Thangaraj (bxt4564)
S. Seufert and D. O'Brien.
Machine learning for automatic defence against distributed denial of service attacks.
In IEEE International Conference on Communications (ICC '07),
pages 1217-1222, June 2007.
— Presentation [PDF]
Research Paper 2 Grading
Same as Research Paper 1 Grading.
Absences
If you are absent from class
when your research paper presentation is scheduled,
you will receive a grade of zero for the presentation
unless on or before the date of the presentation
you make an alternate arrangement with me.
I am normally willing to permit this
only for absences due to illness or unforeseen personal emergency.
However, if you feel you have
a valid reason for your absence,
please discuss it with me.
Late Submissions
I will not accept a citation or slides after the deadline.
Late citations and slides will receive a grade of zero.
Plagiarism
The research paper presentations
must be entirely your own work.
I will not tolerate plagiarism.
If in my judgment
the presentation
is not entirely your own work,
you will automatically receive, as a minimum,
a grade of zero for the assignment.
See the Course Policies for my
policy on plagiarism.
The following are examples of plagiarism.
These are not the only examples of plagiarism.
-
A sentence, paragraph, or section of text
that is identical to or almost the same as
text written somewhere else.
-
A sentence, paragraph, or section of text
that is identical to or almost the same as
text written somewhere else,
with quotation marks.
-
A sentence, paragraph, or section of text
that is identical to or almost the same as
text written somewhere else,
with quotation marks and a citation to the original source.
(Yes, I do consider this plagiarism.
It also indicates
that you do not have a deep understanding of the material,
since you are unable to express it in your own words.)
-
A figure or diagram written somewhere else
without a citation to the original source.
(It's okay to quote figures and diagrams, if cited.
It's not okay to quote text.)
|
Advanced Computer Networks
|
|
•
|
|
4005-741-01
|
|
•
|
|
Fall Quarter 2009
|
|
Course Page
|
|
Alan Kaminsky
|
|
•
|
|
Department of Computer Science
|
|
•
|
|
Rochester Institute of Technology
|
|
•
|
|
4486 +
2220 =
6706
|
|
Home Page
|
Copyright © 2009 Alan Kaminsky.
All rights reserved.
Last updated 05-Nov-2009.
Please send comments to ark@cs.rit.edu.