CSc 6523: Readings

Here is a list of papers that we may read. We will certainly not cover all of them, and may add more. Papers are assigned for discussion in a schedule. Note that this is a starting point for the course. We will not cover every paper here, and may add things that interest the class. Many of these papers are recent, and their reference lists are excellent sources for further study.

You must join ACM and buy the library service to access these papers.

  1. Internet Development
    1. Clark, D., “The design philosophy of the DARPA internet protocols,” SIGCOMM Comput. Commun. Rev., Vol. 18, No. 4 (1988), pp. 106–114.   [dld]
    2. Postel, J., “RFC 791: Internet Protocol,” September 1981.   [dld]
    3. Postel, J., “RFC 768: User Datagram Protocol,” August 1980.   [dld]
    4. Postel, J., “RFC 793: Transmission Control Protocol,” September 1981.   [dld]
    5. Nagle, J., “RFC 896: Congestion Control in IP/TCP Internetworks,” January 1984.   [dld]
    6. Jacobson, V., “Congestion avoidance and control,” SIGCOMM '88: Symposium proceedings on Communications architectures and protocols, Stanford, California, United States, 1988, pp. 314–329.   [dld]
    7. Jacobson, V., Braden, R. and Borman, D., “RFC 1323: TCP Extensions for High Performance,” May 1992.   [dld]
    8. Fall, Kevin and Floyd, Sally, “Simulation-based comparisons of Tahoe, Reno and SACK TCP,” SIGCOMM Comput. Commun. Rev., Vol. 26, No. 3 (1996), pp. 5–21.   [dld]
    9. Stevens, W., “RFC 2001: TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms,” January 1997.   [dld]
    10. Bruyeron, Renaud, Hemon, Bruno and Zhang, Lixia, “Experimentations with TCP selective acknowledgment,” SIGCOMM Comput. Commun. Rev., Vol. 28, No. 2 (1998), pp. 54–77.   [dld]
    11. Allman, M., Paxson, V. and Stevens, W., “RFC 2581: TCP Congestion Control,” April 1999.   [dld]
    12. Mathis, M., Mahdavi, J., Floyd, S. and Romanow, A., “RFC 2018: TCP Selective Acknowledgment Options,” October 1996.   [dld]
    13. Ahn, Jong Suk, Danzig, Peter B., Liu, Zhen and Yan, Limin, “Evaluation of TCP Vegas: emulation and experiment,” SIGCOMM '95: Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication, Cambridge, Massachusetts, United States, 1995, pp. 185–195.   [dld]
    14. Floyd, Sally and Jacobson, Van, “Random early detection gateways for congestion avoidance,” IEEE/ACM Trans. Netw., Vol. 1, No. 4 (1993), pp. 397–413.   [dld]
    15. Christiansen, Mikkel, Jeffay, Kevin, Ott, David and Smith, F. Donelson, “Tuning RED for Web traffic,” IEEE/ACM Trans. Netw., Vol. 9, No. 3 (2001), pp. 249–264.   [dld]
    16. Braden, B., Clark, D., Crowcroft, J., Davie, B., Deering, S., Estrin, D., Floyd, S., Jacobson, V., Minshall, G., Partridge, C., Peterson, L., Ramakrishnan, K., Shenker, S., Wroclawski, J. and Zhang, L., “RFC 2309: Recommendations on Queue Management and Congestion Avoidance in the Internet,” April 1998.   [dld]
    17. Floyd, S. and Henderson, T., “RFC 2582: The NewReno Modification to TCPs Fast Recovery Algorithm',” April 1999.   [dld]
    18. Ramakrishnan, K., Floyd, S. and Black, D., “RFC 3168: The Addition of Explicit Congestion Notification (ECN) to IP,” September 2001.   [dld]
  2. Where To Next
    1. Martin, Jim, Nilsson, Arne and Rhee, Injong, “Delay-based congestion avoidance for TCP,” IEEE/ACM Trans. Netw., Vol. 11, No. 3 (2003), pp. 356–369.   [dld]
    2. Rubenstein, Dan, Kurose, Jim and Towsley, Don, “Detecting shared congestion of flows via end-to-end measurement,” IEEE/ACM Trans. Netw., Vol. 10, No. 3 (2002), pp. 381–395.   [dld]
    3. Popa, Lucian, Ghodsi, Ali and Stoica, Ion, “HTTP as the narrow waist of the future internet,” Proceedings of the Ninth ACM SIGCOMM Workshop on Hot Topics in Networks, Monterey, California, 2010, pp. 6:1–6:6.   [dld]
    4. Mittal, Radhika, Sherry, Justine, Ratnasamy, Sylvia and Shenker, Scott, “Recursively Cautious Congestion Control,” Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, Seattle, WA, April 2–4, 2014, pp. 373––385.   [dld]
  3. Newer Internet Protocols
    1. Ong, L. and Yoakum, J., “RFC 3286: An Introduction to the Stream Control Transmission Protocol (SCTP),” May 2002.   [dld]
    2. Kohler, E., Handley, M. and Floyd, S., “RFC 4340: Datagram Congestion Control Protocol (DCCP),” March 2006.   [dld]
    3. Fairhurst, G., “RFC 5596: Datagram Congestion Control Protocol (DCCP) Simultaneous-Open Technique to Facilitate NAT/Middlebox Traversal,” September 2009.   [dld]
    4. Grigorik, Ilya, “Making the Web Faster with HTTP 2.0,” Commun. ACM, Vol. 56, No. 12 (2013), pp. 42–49.   [dld]
    5. Stenberg, Daniel, “HTTP2 Explained,” ACM SIGCOMM Comput. Commun. Rev., Vol. 44, No. 3 (2014), pp. 120–128.   [dld]
    6. Kamp, Poul-Henning, “HTTP/2.0: The IETF is Phoning It in,” Commun. ACM, Vol. 58, No. 3 (2015), pp. 40–42.   [dld]
    7. Elkhatib, Yehia, Tyson, Gareth and Welzl, Michael, The Effect of Network and Infrastructural Variables on SPDY's Performance, Tech. Rpt. SCC-2013-01, Cornell University, Jan 25, 2014   [dld]
    8. Yamamoto, Kazuhiko, Tsujikawa, Tatsuhiro and Oku, Kazuho, “Exploring HTTP/2 Header Compression,” Proceedings of the 12th International Conference on Future Internet Technologies, Fukuoka, Japan, 2017, pp. 1:1–1:5.   [dld]
  4. Measurement And Simulation
    1. Ager, Bernhard, Mühlbauer, Wolfgang, Smaragdakis, Georgios and Uhlig, Steve, “Comparing DNS resolvers in the wild,” Proceedings of the 10th annual conference on Internet measurement, Melbourne, Australia, 2010, pp. 15–21.   [dld]
    2. Wustrow, Eric, Karir, Manish, Bailey, Michael, Jahanian, Farnam and Huston, Geoff, “Internet background radiation revisited,” Proceedings of the 10th annual conference on Internet measurement, Melbourne, Australia, 2010, pp. 62–74.   [dld]
    3. Yadav, Sandeep, Reddy, Ashwath Kumar Krishna, Reddy, A.L. Narasimha and Ranjan, Supranamaya, “Detecting algorithmically generated malicious domain names,” Proceedings of the 10th annual conference on Internet measurement, Melbourne, Australia, 2010, pp. 48–61.   [dld]
    4. Leonard, Derek and Loguinov, Dmitri, “Demystifying service discovery: implementing an internet-wide scanner,” Proceedings of the 10th annual conference on Internet measurement, Melbourne, Australia, 2010, pp. 109–122.   [dld]
    5. Luckie, Matthew, “Scamper: a scalable and extensible packet prober for active measurement of the internet,” Proceedings of the 10th annual conference on Internet measurement, Melbourne, Australia, 2010, pp. 239–245.   [dld]
    6. Xu, Xueyang, Mao, Z. Morley and Halderman, J. Alex, “Internet Censorship In China: Where Does The Filtering Occur?,” Proceedings of the Proc. of the 12th Intl. Conf. on Passive and Active Measurement, Atlanta, GA, Mar. 20–22, 2011.   [dld]
    7. Marinos, Ilias, Watson, Robert N. M. and Handley, Mark, “Network Stack Specialization for Performance,” Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, College Park, Maryland, 2013, pp. 9:1–9:7.   [dld]
    8. Nguyen, Truc Anh N., Gangadhar, Siddharth and Sterbenz, James P. G., “Performance Evaluation of TCP Congestion Control Algorithms in Data Center Networks,” Proceedings of the 11th International Conference on Future Internet Technologies, Nanjing, China, 2016, pp. 21–28.   [dld]
    9. Lichtblau, Franziska, Streibelt, Florian, Krüger, Thorben, Richter, Philipp and Feldmann, Anja, “Detection, Classification, and Analysis of Inter-domain Traffic with Spoofed Source IP Addresses,” Proceedings of the 2017 Internet Measurement Conference, London, United Kingdom, 2017, pp. 86–99.   [dld]
    10. Wang, Zhongjie, Cao, Yue, Qian, Zhiyun, Song, Chengyu and Krishnamurthy, Srikanth V., “Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship,” Proceedings of the 2017 Internet Measurement Conference, London, United Kingdom, 2017, pp. 114–127.   [dld]
    11. Kline, Jeff, Barford, Paul, Cahn, Aaron and Sommers, Joel, “On the Structure and Characteristics of User Agent String,” Proceedings of the 2017 Internet Measurement Conference, London, United Kingdom, 2017, pp. 184–190.   [dld]
  5. Flooding and DDOS Attacks

      There are a lot of old things in this that don't seem to have made it into practice. Something of a history of “well, that doesn't help”

    1. Barros, Cesar Eduardo, “A Proposal for ICMP Traceback Messages,” ()   [dld]
    2. Doeppner, Thomas W., Klein, Philip N. and Koyfman, Andrew, “Using router stamping to identify the source of IP packets,” Proceedings of the 7th ACM conference on Computer and communications security, Athens, Greece, 2000, pp. 184–189.   [dld]
    3. Snoeren, Alex C., Partridge, Craig, Sanchez, Luis A., Jones, Christine E., Tchakountio, Fabrice, Schwartz, Beverly, Kent, Stephen T. and Strayer, W. Timothy, “Single-packet IP traceback,” IEEE/ACM Trans. Netw., Vol. 10, No. 6 (2002), pp. 721–734.   [dld]
    4. Goodrich, Michael T., “Probabilistic packet marking for large-scale IP traceback,” IEEE/ACM Trans. Netw., Vol. 16, No. 1 (2008), pp. 15–24.   [dld]
    5. Jin, Cheng, Wang, Haining and Shin, Kang G., “Hop-count filtering: an effective defense against spoofed DDoS traffic,” CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, Washington D.C., USA, 2003, pp. 30–41.   [dld]
    6. Paxson, Vern, “An analysis of using reflectors for distributed denial-of-service attacks,” SIGCOMM Comput. Commun. Rev., Vol. 31, No. 3 (2001), pp. 38–47.   [dld]
    7. Peng, Tao, Leckie, Christopher and Ramamohanarao, Kotagiri, “Survey of Network-based Defense Mechanisms Countering the DoS and DDoS Problems,” ACM Comput. Surv., Vol. 39, No. 1 (2007), pp. .   [dld]
    8. Marc Kührer, Thomas Hupperich, Christian Rossow, and Thorsten Holz, “Exit from Hell? Reducing the Impact of Amplification DDoS Attacks,” Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, Aug. 20–22, 2014, pp. 111–125.   [dld]
    9. Lu, Yiqin and Wang, Meng, “An Easy Defense Mechanism Against Botnet-based DDoS Flooding Attack Originated in SDN Environment Using sFlow,” Proceedings of the 11th International Conference on Future Internet Technologies, Nanjing, China, 2016, pp. 14–20.   [dld]
  6. Worms

      These are mostly old stuff. We don't seem to have had a good juicy worm attack for a while.

    1. Zou, Cliff Changchun, Gong, Weibo and Towsley, Don, “Code red worm propagation modeling and analysis,” CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, 2002, pp. 138–147.   [dld]
    2. David Moore, Vern Paxson, Colleen Shannon, Stuart Staniford, and Nicholas Weaver, “The Spread of the Sapphire/Slammer Worm,” Proceedings of the CAIDA Technical Report, 2003, .   [dld]
    3. Stuart Staniford, Vern Paxson and Nicholas Weaver, “How to Own the Internet in Your Spare Time ,” Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, Aug. 5–9, 2002, pp. 149–167.   [dld]
    4. Zou, Cliff C., Gong, Weibo, Towsley, Don and Gao, Lixin, “The monitoring and early detection of internet worms,” IEEE/ACM Trans. Netw., Vol. 13, No. 5 (2005), pp. 961–974.   [dld]
    5. Costa, Manuel, Crowcroft, Jon, Castro, Miguel, Rowstron, Antony, Zhou, Lidong, Zhang, Lintao and Barham, Paul, “Vigilante: End-to-end containment of Internet worm epidemics,” ACM Trans. Comput. Syst., Vol. 26, No. 4 (2008), pp. 1–68.   [dld]
    6. Sarat, Sandeep and Terzis, Andreas, “On the Detection and Origin Identification of Mobile Worms,” Proceedings of the 2007 ACM Workshop on Recurring Malcode, Alexandria, Virginia, USA, 2007, pp. 54–60.   [dld]
    7. Fleizach, Chris, Liljenstam, Michael, Johansson, Per, Voelker, Geoffrey M. and Mehes, Andras, “Can You Infect Me Now?: Malware Propagation in Mobile Phone Networks,” Proceedings of the 2007 ACM Workshop on Recurring Malcode, Alexandria, Virginia, USA, 2007, pp. 61–68.   [dld]
    8. Nathaniel Husted and Steven Myers, “Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm,” Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, Boston, MA, March 29, 2011.   [dld]
  7. Intrusion Detection
    1. Handley, Mark, Paxson, Vern and Kreibich, Christian, “Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics,” Proceedings of the 10th USENIX Security Symposium, Washington, DC, August 13–17, 2001, pp. 115–131.   [dld]
    2. Ning, Peng and Xu, Dingbang, “Learning attack strategies from intrusion alerts,” CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, Washington D.C., USA, 2003, pp. 200–209.   [dld]
    3. Kruegel, Christopher and Vigna, Giovanni, “Anomaly detection of web-based attacks,” CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, Washington D.C., USA, 2003, pp. 251–261.   [dld]
    4. Alexis Cort, “Algorithm-based Approaches to Intrusion Detection and Response,” (August, 2002)   [dld]
    5. Qiu, Tongqing, Ge, Zihui, Pei, Dan, Wang, Jia and Xu, Jun, “What happened in my network: mining network events from router syslogs,” Proceedings of the 10th annual conference on Internet measurement, Melbourne, Australia, 2010, pp. 472–484.   [dld]
  8. Security
    1. Joncheray, Laurent, “A Simple Active Attack Against TCP,” Proceedings of the 5th USENIX UNIX Security Symposium, Salt Lake City, UT, June 5–7, 1995, pp. 2–2.   [dld]
    2. Vixie, Paul, “DNS and BIND Security Issues,” Proceedings of the 5th USENIX UNIX Security Symposium, Salt Lake City, UT, June 5–7, 1995, pp. 19–19.   [dld]
    3. Hu, Xin and Mao, Z. Morley, “Accurate Real-time Identification of IP Prefix Hijacking,” Proceedings of the IEEE Symp. on Security and Privacy, Oakland, CA, Sep. 2007.   [dld]
    4. Wright, Cory, “Understanding Kaminsky's DNS Bug,” (Jul 25, 2008)   [dld]
    5. Gieben, Miek, “DNSSEC: The Protocol, Deployment, and a Bit of Development,” (June, 2004)   [dld]
    6. Friedlander, Amy, Mankin, Allison, Maughan, W. Douglas and Crocker, Stephen D., “DNSSEC: A Protocol Toward Securing the Internet Infrastructure,” Commun. ACM, Vol. 50, No. 6 (2007), pp. 44–50.   [dld]
    7. Goldberg, Sharon, “Why is It Taking So Long to Secure Internet Routing?,” Commun. ACM, Vol. 57, No. 10 (2014), pp. 56–63.   [dld]
    8. Laurie, Ben, “Certificate Transparency,” ACM Queue, Vol. 12, No. 8 (2014), pp. 10:10–10:19.   [dld]
    9. Shao, Yuru, Ott, Jason, Jia, Yunhan Jack, Qian, Zhiyun and Mao, Z. Morley, “The Misuse of Android Unix Domain Sockets and Security Implications,” Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 2016, pp. 80–91.   [dld]
    10. Luo, Meng, Starov, Oleksii, Honarmand, Nima and Nikiforakis, Nick, “Hindsight: Understanding the Evolution of UI Vulnerabilities in Mobile Browsers,” Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, Texas, USA, 2017, pp. 149–162.   [dld]
    11. Farooqi, Shehroze, Zaffar, Fareed, Leontiadis, Nektarios and Shafiq, Zubair, “Measuring and Mitigating Oauth Access Token Abuse by Collusion Networks,” Proceedings of the 2017 Internet Measurement Conference, London, United Kingdom, 2017, pp. 355–368.   [dld]
    12. Vanhoef, Mathy and Piessens, Frank, “Release the Kraken: New KRACKs in the 802.11 Standard,” Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, Canada, 2018, pp. 299–314.   [dld]
    13. Sharif, Mahmood, Urakawa, Jumpei, Christin, Nicolas, Kubota, Ayumu and Yamada, Akira, “Predicting Impending Exposure to Malicious Content from User Behavior,” Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, Canada, 2018, pp. 1487–1501.   [dld]
    14. Gilad, Yossi, Hlavacek, Tomas, Herzberg, Amir, Schapira, Michael and Shulman, Haya, “Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security,” Proceedings of the 17th ACM Workshop on Hot Topics in Networks, Redmond, WA, USA, 2018, pp. 57–63.   [dld]
  9. Peer-To-Peer

      This section needs to be refreshed.

    1. Androutsellis-Theotokis, Stephanos and Spinellis, Diomidis, “A survey of peer-to-peer content distribution technologies,” ACM Comput. Surv., Vol. 36, No. 4 (2004), pp. 335–371.   [dld]
    2. Ratnasamy, Sylvia, Francis, Paul, Handley, Mark, Karp, Richard and Schenker, Scott, “A scalable content-addressable network,” SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, San Diego, California, United States, 2001, pp. 161–172.   [dld]
    3. Dabek, Frank, Kaashoek, M. Frans, Karger, David, Morris, Robert and Stoica, Ion, “Wide-area cooperative storage with CFS,” SOSP '01: Proceedings of the eighteenth ACM symposium on Operating systems principles, Banff, Alberta, Canada, 2001, pp. 202–215.   [dld]
    4. Guo, Yang, Suh, Kyoungwon, Kurose, Jim and Towsley, Don, “P2Cast: peer-to-peer patching scheme for VoD service,” WWW '03: Proceedings of the 12th international conference on World Wide Web, Budapest, Hungary, 2003, pp. 301–309.   [dld]
    5. Bharambe, Ashwin, Douceur, John R., Lorch, Jacob R., Moscibroda, Thomas, Pang, Jeffrey, Seshan, Srinivasan and Zhuang, Xinyu, “Donnybrook: Enabling Large-scale, High-speed, Peer-to-peer Games,” ACM SIGCOMM Comput. Commun. Rev., Vol. 38, No. 4 (2008), pp. 389–400.   [dld]
  10. Some Un-Serious RFCs
    1. Merryman, R., “RFC 527: ARPAWOCKY,” May 1973.   [dld]
    2. Crispin, M.R., “RFC 748: Telnet randomly-lose option,” April 1 1978.   [dld]
    3. Postel, J., Kleinrock, L., Cerf, V.G. and Boehm, B., “RFC 1121: Act one - the poems,” September 1989.   [dld]
    4. Waitzman, D., “RFC 1149: Standard for the transmission of IP datagrams on avian carriers,” April 1 1990.   [dld]
    5. Waitzman, D., “RFC 2549: IP over Avian Carriers with Quality of Service,” April 1 1999.   [dld]
    6. Bellovin, S., “RFC 3514: The Security Flag in the IPv4 Header,” April 1 2003.   [dld]

119 papers listed.