Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:

Slides:



Advertisements
Similar presentations
A Flexible Cloud-Computing Platform Focus on solving business problems
Advertisements

Dynamics of Online Scam Hosting Infrastructure
Grand Challenges in Networking Nick Feamster CS 7001.
Path Splicing with Network Slicing
Networking Research Nick Feamster CS Nick Feamster Ph.D. from MIT, Post-doc at Princeton this fall Arriving January 2006 –Here off-and-on until.
Research Summary Nick Feamster. The Big Picture Improving Internet availability by making networks easier to operate Three approaches –From the ground.
Nick Feamster Research Interest: Networked Systems Arriving January 2006 Likely teaching CS 7260 in Spring 2005 Here off-and-on until then. works.
ONR MURI Project Kick-Off
Course Overview and Introduction CS 3251: Computer Networking I Nick Feamster Spring 2013.
Nick Feamster Research: Network security and operations Teaching CS 7260 in Spring 2007 CS 7001 Mini-projects: –
CS 7001 Course Overview Nick Feamster and Alexander Gray College of Computing Georgia Institute of Technology.
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Network Troubleshooting: rcc and Beyond Nick Feamster Georgia Tech (joint with Russ Clark, Yiyi Huang, Anukool Lakhina)
1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.
Toward Better Research: Cross-Threads Nick Feamster, Alex Gray, Charles Isbell College of Computing Georgia Tech.
Network Operations Research Nick Feamster
Path Splicing with Network Slicing Nick Feamster Murtaza Motiwala Santosh Vempala.
Cabo: Concurrent Architectures are Better than One Nick Feamster, Georgia Tech Lixin Gao, UMass Amherst Jennifer Rexford, Princeton.
Network Security Highlights Nick Feamster Georgia Tech.
CS 7001 Course Overview Nick Feamster and Alex Gray College of Computing Georgia Institute of Technology.
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Internet Applications
Ali Ghodsi UC Berkeley & KTH & SICS
EMERGING TOPICS IN DATA, APPLICATION AND INFRASTRUCTURE PROTECTION Taher Elgamal ITU
Milena Mihail Theory Applications driving technology :  Th e Internet Phenomenon : - New Computational Paradigm  Biology, Genomics Theory is/has historically.
The Case for Drill-Ready Cloud Computing Vision Paper Tanakorn Leesatapornwongsa and Haryadi S. Gunawi 1.
OPSEC Awareness Briefing Man-In-The-Middle Attacks (MITM)
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
Technical Review Group (TRG)Agenda 27/04/06 TRG Remit Membership Operation ICT Strategy ICT Roadmap.
Cloud Computing: The IT Technology Solution of the Future Presented by: Chris Tryon.
1 GENI: Global Environment for Network Innovations Jennifer Rexford On behalf of Allison Mankin (NSF)
Future Research Directions Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
2° cycle degree programme (lm) in Telecommunications Engineering Principles Models and Applications for Distributed Systems Prof. Maurelio Boari
Does "The Cloud" Fit Into Your Organization? Tom Horan Meridian IT Inc. VP, Strategic Markets (847)
ETDC 625 Hardware and Software in Instructional Development Spring 2012 Raymond Nekrasz.
CHAPTER THE INTERNET, THE WEB, AND ELECTRONIC COMMERCE 22.
Constellation Technologies Providing a support service to commercial users of gLite Nick Trigg.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
Chapter 1: Hierarchical Network Design
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
IT 210 The Internet & World Wide Web introduction.
Methods of communication
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
1 Connect | Communicate | Collaborate Motivation When utilizing special-purpose networking you need to bring the network into place end-to-end GÉANT services.
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu, Roberto Perdisci, Junjie Zhang, and.
1 Client Server Architecture over the Internet Week - 2.
Spring 2011 CIS 4911 Senior Project Catalog Description: Students work on faculty supervised projects in teams of up to 5 members to design and implement.
Antony Slumbers Estates Cloud computing for commercial property.
Garrett Drown Tianyi Xing Group #4 CSE548 – Advanced Computer Network Security.
Network protocols –Nodes of a network must obey some rules if they want to communicate with each other. The set of rules is called network protocol. –The.
1 CDA 4527 Computer Networking Prof. Cliff Zou School of Computer Science University of Central Florida Fall 2005.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Chapter 1: Explore the Network
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
CLOUD COMPUTING WHAT IS CLOUD COMPUTING?  Cloud Computing, also known as ‘on-demand computing’, is a kind of Internet-based computing,
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
Network Architecture and Security Ten Years Out Internet2 Member Meeting; Fall 2005 Deke Kassabian – University of Pennsylvania Mark Poepping – Carnegie.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Build a low-touch, highly scalable cloud with IBM SmartCloud Provisioning Academic Initiative © 2011 IBM Corporation.
Bit-defender Customer Service Bit-defender Customer Service Toll- Free Number 24/
Tailor slide to customer industry/pain points
Azure Enables Mobility, Easy Sync and Share, and Allows Companies to Retain Data Control MINI-CASE STUDY “Azure provides the full stack of technology that.
Cloud Computing: Concepts
Agenda Need of Cloud Computing What is Cloud Computing
INTERNET SECURITY.
Presentation transcript:

Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings: Tuesdays at 12 p.m. (free lunch) –Informal seminar. Papers on wireless, virtualization, etc. –Come visit us or me if you want to learn more Teaching 7001 this fall. Willing to supervise 8903s/mini-projects Klaus 3348 Network Operations and Internet Security Lab

Research Focus: Network Security & Operations Goal: Improve network reliability and availability in the face of both accidental and malicious faults Areas –Reliability: fast recovery from failures –Management: fault diagnosis, provisioning –Security and trust: spam filtering, phishing –Anti-censorship: e.g., defeating the great firewall of China –Economics: improving the efficiency of the Internets connectivity markets

Research Approach Interdisciplinary: Learn and apply variety of domains –Machine learning, signal processing, algorithms, data mining –Collaboration with Profs. Gray, Lee, Vempala, Vazirani, Xu Practical: Build working systems that people use –Problem driven: network management, anti-censorship, fighting spam, etc. –Implementation and real-world deployment of working systems Relevant: Interaction/funding with research & industry –Spam: Cisco/Ironport, Yahoo!, McAfee, Verisign –Management/Diagnosis: AOL, Thomson, Georgia Tech Campus –Availability/Economics: ONR, NSF, GENI –Publication: SIGCOMM, SIGMETRICS, IMC, CCS, USENIX Security From practice, to theory, to practice. 1. Attack practical networking problems with principled methods. 2. Transfer the solutions to the real world with working systems.

New Research: Utility Networking Building and using communications networks should be as easy as plugging a device into the power outlet. –User-proof networking: Designing devices and protocols for home networks. Users plug in devices and the network just works. –Elastic networking: Designing networks so that they can be rapidly provisioned when demands fluctuate. (Think: Cloud computing, but for networks instead of servers.) Exciting times: the equivalent of an open source movement in network devices is happening now. Come talk to me to learn more! More information me subject Fall Research Come to group meetings: Tuesdays at 12 p.m. Contact Ph.D. students Mini-projects: (soon)