Pie(s) in the Sky Mark Crovella Boston University Computer Science.

Slides:



Advertisements
Similar presentations
Research Directions Mark Crovella Boston University Computer Science.
Advertisements

Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.
Tor: The Second-Generation Onion Router
Module 11: Troubleshooting a Network Load Balancing Cluster.
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
Computer Science 1 Characterizing Link Properties Using “Loss-pairs” Jun Liu (joint work with Prof. Mark Crovella)
Freedom of Expression Harun Kotan ITEC317 Harun Kotan ITEC317.
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
What is a Network?. Definition of a computer network A computer network is a system in which computers are connected to share information and resources.
Computer Networks Unit 1 – BTA 3O Ms. Chytra. Introduction to Networks Most people working in an office with more than a few computers will be using some.
October 15, 2002Serguei A. Mokhov, 1 Intro to Internet-services from Security Standpoint SOEN321-Information-Systems Security Revision.
Networks & the internet. Revision tip: Focus on the things you find difficult first.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Rules of Packet Transmission
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
Today’s Topics Chapter 8: Networks Chapter 8: Networks HTML Introduction HTML Introduction.
October 10-13, 2006 San Diego Convention Center, San Diego California Preparing Your Network for an IP PBX TMCU Warren Sonnen Director.
Chabot College ELEC Network Devices.
Protecting Students on the School Computer Network Enfield High School.
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 05 Network Protocols.
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
Use cases Navigation Problem notification Problem analysis.
The UCSD Network Telescope A Real-time Monitoring System for Tracking Internet Attacks Stefan Savage David Moore, Geoff Voelker, and Colleen Shannon Department.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
CSC 104 December 13,2012. Internet Regulation: States that it is about restricting or controlling certain pieces of information. This consisting of censorship.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
1 Semester 3 Threaded Case Study Royal Palm A/3B Ip Siu Tik Tsang Man Wu Wai Hung Wong Lai Ting.
Resilient Overlay Networks Robert Morris Frans Kaashoek and Hari Balakrishnan MIT LCS
Networks Computer Technology Day 17. Network  Two or more computers and other devices (printers or scanners) that are connected, for the purpose of sharing.
1 Figure 10-4: Intrusion Detection Systems (IDSs) IDSs  Event logging in log files  Analysis of log file data  Alarms Too many false positives (false.
Performance Validation of Mobile IP Wireless Networks Presented by Syed Shahzad Ali Advisor Dr. Ravi Pendse.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Teaching Networking Concepts: GENI Based Course Modules Jay AikatKevin Jeffay Marie NesfieldKrista Katzenmeyer Department of Computer Science, UNC-Chapel.
January 23-26, 2007 Ft. Lauderdale, Florida Preparing Your Network for an IP PBX TMCU Warren Sonnen Director of Product Management Epygi Technologies.
Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses.
Measurement in the Internet Measurement in the Internet Paul Barford University of Wisconsin - Madison Spring, 2001.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Prototyping the Campus Network Designing and Supporting Computer Networks.
1 Internet Firewall Security Present by: Ying Fu Department of Computer Science South Eastern University February, 2001.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Computer networks [lan,wan] done by: bashar,soud.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
GENI in your Networking Courses Ryan Doyle (in collaboration with Jay Aikat and Kevin Jeffay) Department of Computer Science, UNC-Chapel Hill November.
Introduction to Networking. What is a Network? Discuss in groups.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Basic Internet Skills. What is the internet? A large group of computers connected to one another Its purpose is to send information back and forth to.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Hotspot Shield Protect Your Online Identity
How is all that data traffic controlled on the Internet?
Implementing Network Access Protection
Phalanx : Withstanding Multimillion-Node Botnets
How And The Internet Work
Defending Against DDoS
Security Essentials for Small Businesses
Net 412 (Practical Part) Networks and Communication Department LAB 1.
Networking Essentials
Unit 36: Internet Server Management
Networks and the Internet
By Seferash B Asfa Wossen Strayer University 3rd December 2003
Read this to find out how the internet works!
Computer Networks Protocols
Presentation transcript:

Pie(s) in the Sky Mark Crovella Boston University Computer Science

Basic Science How many computers are connected to the Internet? –IP addresses? –Routers? How many objects are accessible via –HTTP? –P2P? How are these quantities changing over time and location? Where are these computers and files?

Network Performance Realtime hotspot characterization –where, when, and for how long do loss and congestion events occur in the wide area? Network simulation –How can we use simulation to aid design decisions about wide area services? Topology generation Source – modeled traffic generation

Security How resistant is the Internet and its services to attack? –What are the weaknesses? –How strong are the adversaries? (Google on: "Now retired from spam fighting) How can we enforce protection of Internet resources? –Legal remedies exist, but need tools for –Tracing and identifying attackers