------------------------------------------------------------------------------
MC logo
CSc 6523: Readings
[^] CSc 6523: Topics in Computer Networking
------------------------------------------------------------------------------ Here is the initial reading list for the semester. This is intended only as a starting point. If you have other papers or topics you wish to study, please make suggestions. Most papers are linked to electronic copies. Most of the links are to the ACM electronic library. You must join ACM and buy the library service to access these papers.

Note that this is a starting point for the course. We will not cover every paper here, and may add things that interest the class. Many of these papers are recent, and their reference lists are excellent sources for further study.

  1. Internet Development
    1. Clark, D., “The design philosophy of the DARPA internet protocols,” SIGCOMM Comput. Commun. Rev., Vol. 18, No. 4 (1988), pp. 106–114.   [dld]
    2. Postel, J., “RFC 791: Internet Protocol,” September 1981.   [dld]
    3. Postel, J., “RFC 768: User Datagram Protocol,” August 1980.   [dld]
    4. Postel, J., “RFC 793: Transmission Control Protocol,” September 1981.   [dld]
    5. Nagle, J., “RFC 896: Congestion Control in IP/TCP Internetworks,” January 1984.   [dld]
    6. Jacobson, V., “Congestion avoidance and control,” SIGCOMM '88: Symposium proceedings on Communications architectures and protocols, Stanford, California, United States, 1988, pp. 314–329.   [dld]
    7. Jacobson, V., Braden, R. and Borman, D., “RFC 1323: TCP Extensions for High Performance,” May 1992.   [dld]
    8. Fall, Kevin and Floyd, Sally, “Simulation-based comparisons of Tahoe, Reno and SACK TCP,” SIGCOMM Comput. Commun. Rev., Vol. 26, No. 3 (1996), pp. 5–21.   [dld]
    9. Stevens, W., “RFC 2001: TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms,” January 1997.   [dld]
    10. Bruyeron, Renaud, Hemon, Bruno and Zhang, Lixia, “Experimentations with TCP selective acknowledgment,” SIGCOMM Comput. Commun. Rev., Vol. 28, No. 2 (1998), pp. 54–77.   [dld]
    11. Allman, M., Paxson, V. and Stevens, W., “RFC 2581: TCP Congestion Control,” April 1999.   [dld]
    12. Mathis, M., Mahdavi, J., Floyd, S. and Romanow, A., “RFC 2018: TCP Selective Acknowledgment Options,” October 1996.   [dld]
    13. Ahn, Jong Suk, Danzig, Peter B., Liu, Zhen and Yan, Limin, “Evaluation of TCP Vegas: emulation and experiment,” SIGCOMM '95: Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication, Cambridge, Massachusetts, United States, 1995, pp. 185–195.   [dld]
    14. Floyd, Sally and Jacobson, Van, “Random early detection gateways for congestion avoidance,” IEEE/ACM Trans. Netw., Vol. 1, No. 4 (1993), pp. 397–413.   [dld]
    15. Christiansen, Mikkel, Jeffay, Kevin, Ott, David and Smith, F. Donelson, “Tuning RED for Web traffic,” IEEE/ACM Trans. Netw., Vol. 9, No. 3 (2001), pp. 249–264.   [dld]
    16. Braden, B., Clark, D., Crowcroft, J., Davie, B., Deering, S., Estrin, D., Floyd, S., Jacobson, V., Minshall, G., Partridge, C., Peterson, L., Ramakrishnan, K., Shenker, S., Wroclawski, J. and Zhang, L., “RFC 2309: Recommendations on Queue Management and Congestion Avoidance in the Internet,” April 1998.   [dld]
    17. Floyd, S. and Henderson, T., “RFC 2582: The NewReno Modification to TCPs Fast Recovery Algorithm',” April 1999.   [dld]
    18. Floyd, Sally, “A Report on Some Recent Developments in TCP Congestion Control,” IEEE Communications Magazine, April, 2001, pp. 84–90.   [dld]
    19. Ramakrishnan, K., Floyd, S. and Black, D., “RFC 3168: The Addition of Explicit Congestion Notification (ECN) to IP,” September 2001.   [dld]
  2. Other TCP Proposals and Experiments
    1. Martin, Jim, Nilsson, Arne and Rhee, Injong, “Delay-based congestion avoidance for TCP,” IEEE/ACM Trans. Netw., Vol. 11, No. 3 (2003), pp. 356–369.   [dld]
    2. Rubenstein, Dan, Kurose, Jim and Towsley, Don, “Detecting shared congestion of flows via end-to-end measurement,” IEEE/ACM Trans. Netw., Vol. 10, No. 3 (2002), pp. 381–395.   [dld]
    3. Liu, Shao, Başar, Tamer and Srikant, R., “Exponential-RED: a stabilizing AQM scheme for low- and high-speed TCP protocols,” IEEE/ACM Trans. Netw., Vol. 13, No. 5 (2005), pp. 1068–1081.   [dld]
    4. Popa, Lucian, Ghodsi, Ali and Stoica, Ion, “HTTP As the Narrow Waist of the Future Internet,” Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, Monterey, California, 2010, pp. 6:1–6:6.   [dld]
    5. Marinos, Ilias, Watson, Robert N. M. and Handley, Mark, “Network Stack Specialization for Performance,” Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, College Park, Maryland, 2013, pp. 9:1–9:7.   [dld]
    6. Radhika Mittal, Justine Sherry, Sylvia Ratnasamy, Scott Shenker, “Recursively cautious congestion control,” Proceedings of the 11th USENIX Symposium on Networked Systems, Seattle, WA, Apr. 2–4, 2014, pp. 373–385.   [dld]
  3. Other Transport Protocols
    1. Katabi, Dina, Handley, Mark and Rohrs, Charlie, “Congestion control for high bandwidth-delay product networks,” SIGCOMM '02: Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, Pittsburgh, Pennsylvania, USA, 2002, pp. 89–102.   [dld]
    2. Falk, Aaron, Faber, Ted, Bannister, Joseph, Chien, Andrew, Grossman, Robert and Leigh, Jason, “Transport protocols for high performance,” Commun. ACM, Vol. 46, No. 11 (2003), pp. 42–49.   [dld]
    3. Mellia, Marco, Meo, Michela and Casetti, Claudio, “TCP smart framing: a segmentation algorithm to reduce TCP latency,” IEEE/ACM Trans. Netw., Vol. 13, No. 2 (2005), pp. 316–329.   [dld]
  4. Newer Internet Protocols
    1. Ong, L. and Yoakum, J., “RFC 3286: An Introduction to the Stream Control Transmission Protocol (SCTP),” May 2002.   [dld]
    2. Kohler, E., Handley, M. and Floyd, S., “RFC 4340: Datagram Congestion Control Protocol (DCCP),” March 2006.   [dld]
    3. Fairhurst, G., “RFC 5596: Datagram Congestion Control Protocol (DCCP) Simultaneous-Open Technique to Facilitate NAT/Middlebox Traversal,” September 2009.   [dld]
    4. Grigorik, Ilya, “Making the Web Faster with HTTP 2.0,” Commun. ACM, Vol. 56, No. 12 (2013), pp. 42–49.   [dld]
    5. Stenberg, Daniel, “HTTP2 Explained,” ACM SIGCOMM Comput. Commun. Rev., Vol. 44, No. 3 (2014), pp. 120–128.   [dld]
    6. Kamp, Poul-Henning, “HTTP/2.0: The IETF is Phoning It in,” Commun. ACM, Vol. 58, No. 3 (2015), pp. 40–42.   [dld]
    7. Elkhatib, Yehia, Tyson, Gareth and Welzl, Michael, The Effect of Network and Infrastructural Variables on SPDY's Performance, Tech. Rpt. #SCC-2013-01, Cornell University, Jan 25, 2014   [dld]
  5. Measurement
    1. Zander, Sebastian and Armitage, Grenville, “A Traffic Model for the Xbox Game Halo 2,” Proceedings of the International Workshop on Network and Operating Systems Support for Digital Audio and Video, Stevenson, Washington, USA, 2005, pp. 13–18.   [dld]
    2. Ager, Bernhard, Mühlbauer, Wolfgang, Smaragdakis, Georgios and Uhlig, Steve, “Comparing DNS resolvers in the wild,” Proceedings of the 10th annual conference on Internet measurement, Melbourne, Australia, 2010, pp. 15–21.   [dld]
    3. Wustrow, Eric, Karir, Manish, Bailey, Michael, Jahanian, Farnam and Huston, Geoff, “Internet background radiation revisited,” Proceedings of the 10th annual conference on Internet measurement, Melbourne, Australia, 2010, pp. 62–74.   [dld]
    4. Yadav, Sandeep, Reddy, Ashwath Kumar Krishna, Reddy, A.L. Narasimha and Ranjan, Supranamaya, “Detecting algorithmically generated malicious domain names,” Proceedings of the 10th annual conference on Internet measurement, Melbourne, Australia, 2010, pp. 48–61.   [dld]
    5. Leonard, Derek and Loguinov, Dmitri, “Demystifying service discovery: implementing an internet-wide scanner,” Proceedings of the 10th annual conference on Internet measurement, Melbourne, Australia, 2010, pp. 109–122.   [dld]
    6. Luckie, Matthew, “Scamper: a scalable and extensible packet prober for active measurement of the internet,” Proceedings of the 10th annual conference on Internet measurement, Melbourne, Australia, 2010, pp. 239–245.   [dld]
    7. Xu, Xueyang, Mao, Z. Morley and Halderman, J. Alex, “Internet Censorship In China: Where Does The Filtering Occur?,” Proceedings of the Proc. of the 12th Intl. Conf. on Passive and Active Measurement, Atlanta, GA, Mar. 20–22, 2011.   [dld]
    8. Shue, Craig A. and Kalafut, Andrew J., “Resolvers Revealed: Characterizing DNS Resolvers and Their Clients,” ACM Trans. Internet Technol., Vol. 12, No. 4 (2013), pp. 14:1–14:17.   [dld]
  6. Flooding Attacks
    1. Doeppner, Thomas W., Klein, Philip N. and Koyfman, Andrew, “Using router stamping to identify the source of IP packets,” Proceedings of the 7th ACM conference on Computer and communications security, Athens, Greece, 2000, pp. 184–189.   [dld]
    2. Snoeren, Alex C., Partridge, Craig, Sanchez, Luis A., Jones, Christine E., Tchakountio, Fabrice, Schwartz, Beverly, Kent, Stephen T. and Strayer, W. Timothy, “Single-packet IP traceback,” IEEE/ACM Trans. Netw., Vol. 10, No. 6 (2002), pp. 721–734.   [dld]
    3. Goodrich, Michael T., “Probabilistic packet marking for large-scale IP traceback,” IEEE/ACM Trans. Netw., Vol. 16, No. 1 (2008), pp. 15–24.   [dld]
    4. Jin, Cheng, Wang, Haining and Shin, Kang G., “Hop-count filtering: an effective defense against spoofed DDoS traffic,” CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, Washington D.C., USA, 2003, pp. 30–41.   [dld]
    5. Paxson, Vern, “An analysis of using reflectors for distributed denial-of-service attacks,” SIGCOMM Comput. Commun. Rev., Vol. 31, No. 3 (2001), pp. 38–47.   [dld]
    6. Peng, Tao, Leckie, Christopher and Ramamohanarao, Kotagiri, “Survey of Network-based Defense Mechanisms Countering the DoS and DDoS Problems,” ACM Comput. Surv., Vol. 39, No. 1 (2007), pp. .   [dld]
    7. Kührer, Marc, Hupperich, Thomas, Rossow, Christian, and Holz, Thorsten, “Exit from Hell? Reducing the Impact of Amplification DDoS Attacks,” Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, Aug. 20-22, 2014, pp. 111-125.   [dld]
  7. Worms
    1. Zou, Cliff Changchun, Gong, Weibo and Towsley, Don, “Code red worm propagation modeling and analysis,” CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, 2002, pp. 138–147.   [dld]
    2. Moore, David, Paxson, Vern, Shannon, Colleen, Staniford, Stuart, and Weaver, Nicholas, The Spread of the Sapphire/Slammer Worm, Tech. Rpt., CAIDA, 2003   [dld]
    3. Staniford, Stuart, Paxson, Vern and Weaver, Nicholas, “How to Own the Internet in Your Spare Time ,” Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, Aug. 5–9, 2002, pp. 149–167.   [dld]
    4. Zou, Cliff C., Gong, Weibo, Towsley, Don and Gao, Lixin, “The monitoring and early detection of internet worms,” IEEE/ACM Trans. Netw., Vol. 13, No. 5 (2005), pp. 961–974.   [dld]
    5. Costa, Manuel, Crowcroft, Jon, Castro, Miguel, Rowstron, Antony, Zhou, Lidong, Zhang, Lintao and Barham, Paul, “Vigilante: End-to-end containment of Internet worm epidemics,” ACM Trans. Comput. Syst., Vol. 26, No. 4 (2008), pp. 1–68.   [dld]
    6. Sarat, Sandeep and Terzis, Andreas, “On the Detection and Origin Identification of Mobile Worms,” Proceedings of the 2007 ACM Workshop on Recurring Malcode, Alexandria, Virginia, USA, 2007, pp. 54–60.   [dld]
    7. Fleizach, Chris, Liljenstam, Michael, Johansson, Per, Voelker, Geoffrey M. and Mehes, Andras, “Can You Infect Me Now?: Malware Propagation in Mobile Phone Networks,” Proceedings of the 2007 ACM Workshop on Recurring Malcode, Alexandria, Virginia, USA, 2007, pp. 61–68.   [dld]
    8. Husted, Nathaniel and Myers, Steven , “Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm,” Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, Boston, MA, March 29, 2011.   [dld]
  8. Intrusion Detection
    1. Handley, Mark, Paxson, Vern and Kreibich, Christian, “Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics,” Proceedings of the 10th USENIX Security Symposium, Washington, DC, August 13-17, 2001, pp. 115-131.   [dld]
    2. Ning, Peng and Xu, Dingbang, “Learning attack strategies from intrusion alerts,” CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, Washington D.C., USA, 2003, pp. 200–209.   [dld]
    3. Kruegel, Christopher and Vigna, Giovanni, “Anomaly detection of web-based attacks,” CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, Washington D.C., USA, 2003, pp. 251–261.   [dld]
    4. Cort, Alexis, “Algorithm-based Approaches to Intrusion Detection and Response,” August, 2002.   [dld]
    5. Qiu, Tongqing, Ge, Zihui, Pei, Dan, Wang, Jia and Xu, Jun, “What happened in my network: mining network events from router syslogs,” Proceedings of the 10th annual conference on Internet measurement, Melbourne, Australia, 2010, pp. 472–484.   [dld]
  9. Security
    1. Hu, Xin and Mao, Z. Morley, “Accurate Real-time Identification of IP Prefix Hijacking,” Proceedings of the IEEE Symp. on Security and Privacy, Oakland, CA, Sep. 2007.   [dld]
    2. Wright, Cory, “Understanding Kaminsky's DNS Bug,” Jul 25, 2008.   [dld]
    3. Gieben, Miek, “DNSSEC: The Protocol, Deployment, and a Bit of Development,” June, 2004.   [dld]
    4. Friedlander, Amy, Mankin, Allison, Maughan, W. Douglas and Crocker, Stephen D., “DNSSEC: A Protocol Toward Securing the Internet Infrastructure,” Commun. ACM, Vol. 50, No. 6 (2007), pp. 44–50.   [dld]
    5. Dacosta, Italo, Chakradeo, Saurabh, Ahamad, Mustaque and Traynor, Patrick, “One-time Cookies: Preventing Session Hijacking Attacks with Stateless Authentication Tokens,” ACM Trans. Internet Technol., Vol. 12, No. 1 (2012), pp. 1:1–1:24.   [dld]
    6. Yuan, Lihua, Chen, Chao-Chih, Mohapatra, Prasant, Chuah, Chen-Nee and Kant, Krishna, “A Proxy View of Quality of Domain Name Service, Poisoning Attacks and Survival Strategies,” ACM Trans. Internet Technol., Vol. 12, No. 3 (2013), pp. 9:1–9:26.   [dld]
    7. Goldberg, Sharon, “Why is It Taking So Long to Secure Internet Routing?,” Commun. ACM, Vol. 57, No. 10 (2014), pp. 56–63.   [dld]
    8. Bursztein, Elie, Benko, Borbala, Margolis, Daniel, Pietraszek, Tadek, Archer, Andy, Aquino, Allan, Pitsillidis, Andreas and Savage, Stefan, “Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild,” Proceedings of the 2014 Conference on Internet Measurement Conference, Vancouver, BC, Canada, 2014, pp. 347–358.   [dld]
    9. Zarras, Apostolis, Kapravelos, Alexandros, Stringhini, Gianluca, Holz, Thorsten, Kruegel, Christopher and Vigna, Giovanni, “The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements,” Proceedings of the 2014 Conference on Internet Measurement Conference, Vancouver, BC, Canada, 2014, pp. 373–380.   [dld]
    10. Lychev, Robert, Schapira, Michael and Goldberg, Sharon, “Rethinking Security for Internet Routing,” Commun. ACM, Vol. 59, No. 10 (2016), pp. 48–57.   [dld]
  10. Peer-To-Peer
    1. Androutsellis-Theotokis, Stephanos and Spinellis, Diomidis, “A survey of peer-to-peer content distribution technologies,” ACM Comput. Surv., Vol. 36, No. 4 (2004), pp. 335–371.   [dld]
    2. Ratnasamy, Sylvia, Francis, Paul, Handley, Mark, Karp, Richard and Schenker, Scott, “A scalable content-addressable network,” SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, San Diego, California, United States, 2001, pp. 161–172.   [dld]
    3. Dabek, Frank, Kaashoek, M. Frans, Karger, David, Morris, Robert and Stoica, Ion, “Wide-area cooperative storage with CFS,” SOSP '01: Proceedings of the eighteenth ACM symposium on Operating systems principles, Banff, Alberta, Canada, 2001, pp. 202–215.   [dld]
    4. Guo, Yang, Suh, Kyoungwon, Kurose, Jim and Towsley, Don, “P2Cast: peer-to-peer patching scheme for VoD service,” WWW '03: Proceedings of the 12th international conference on World Wide Web, Budapest, Hungary, 2003, pp. 301–309.   [dld]
    5. Bharambe, Ashwin, Douceur, John R., Lorch, Jacob R., Moscibroda, Thomas, Pang, Jeffrey, Seshan, Srinivasan and Zhuang, Xinyu, “Donnybrook: Enabling Large-scale, High-speed, Peer-to-peer Games,” ACM SIGCOMM Comput. Commun. Rev., Vol. 38, No. 4 (2008), pp. 389–400.   [dld]
    6. Dingledine, Roger, Mathewson, Nick and Syverson, Paul, “Tor: The Second-Generation Onion Router,” Proceedings of the Proceedings of the 13th conference on USENIX Security Symposium, Berkeley, CA, USA, Aug 9–23, 2004.   [dld]
    7. Winter, Philipp, Ensafi, Roya, Loesing, Karsten and Feamster, Nick, “Identifying and Characterizing Sybils in the Tor Network,” Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), Austin, TX, 2016, pp. 1169–1185.   [dld]
  11. Wireless
    1. Ramanathan, S. and Steenstrup, Martha, “A survey of routing techniques for mobile communications networks,” Mob. Netw. Appl., Vol. 1, No. 2 (1996), pp. 89–104.   [dld]
    2. Das, Samir R., Castañeda, Robert and Yan, Jiangtao, “Simulation-based performance evaluation of routing protocols for mobile ad hoc networks,” Mob. Netw. Appl., Vol. 5, No. 3 (2000), pp. 179–189.   [dld]
    3. Biaz, Saâd and Vaidya, Nitin H., “"De-randomizing" congestion losses to improve TCP performance over wired-wireless networks,” IEEE/ACM Trans. Netw., Vol. 13, No. 3 (2005), pp. 596–608.   [dld]
    4. Eryilmaz, Atilla, Srikant, R. and Perkins, James R., “Stable scheduling policies for fading wireless channels,” IEEE/ACM Trans. Netw., Vol. 13, No. 2 (2005), pp. 411–424.   [dld]
    5. Eronen, Pasi, TCP Wake-Up: Reducing Keep-Alive Traffic in Mobile IPv4 and IPsec NAT Traversal, Tech. Rpt. #NRC-TR-2008-002, Nokia Corp., January 31, 2008   [dld]
    6. Ravindranath, Lenin, Newport, Calvin, Balakrishnan, Hari and Madden, Samuel, “"Extra-sensory perception" for wireless networks,” Proceedings of the Ninth ACM SIGCOMM Workshop on Hot Topics in Networks, Monterey, California, 2010, pp. 5:1–5:6.   [dld]
    7. Li, Tianji, Leith, Douglas and Malone, David, “Buffer Sizing for 802.11-based Networks,” IEEE/ACM Trans. Netw., Vol. 19, No. 1 (2011), pp. 156–169.   [dld]
    8. Lakshminarayanan, Kaushik, Seshan, Srinivasan and Steenkiste, Peter, “Understanding 802.11 Performance in Heterogeneous Environments,” Proceedings of the 2Nd ACM SIGCOMM Workshop on Home Networks, Toronto, Ontario, Canada, 2011, pp. 43–48.   [dld]
  12. Some Un-Serious RFCs
    1. Merryman, R., “RFC 527: ARPAWOCKY,” May 1973.   [dld]
    2. Crispin, M.R., “RFC 748: Telnet randomly-lose option,” April 1 1978.   [dld]
    3. Postel, J., Kleinrock, L., Cerf, V.G. and Boehm, B., “RFC 1121: Act one - the poems,” September 1989.   [dld]
    4. Waitzman, D., “RFC 1149: Standard for the transmission of IP datagrams on avian carriers,” April 1 1990.   [dld]
    5. Waitzman, D., “RFC 2549: IP over Avian Carriers with Quality of Service,” April 1 1999.   [dld]
    6. Bellovin, S., “RFC 3514: The Security Flag in the IPv4 Header,” April 1 2003.   [dld]

114 papers listed.