Lecture 12
From CyberSecurity
Incentives to Exploit and Protect
What do we know about the Internet’s vulnerabilities? History of past exploits, worms, viruses. What could a determined, well-funded adversary accomplish?
Speakers
- Hal Varian, Berkeley, incentive-based strategies for enhancing cyber security
- Stefan Savage, UCSD, Internet outbreaks: Epidemiology and Defenses
- Vern Paxson, ICIR and LBNL, Network intrusion detection systems
Readings
- Carey Nachenberg, “Computer Virus-Antivirus Coevolution,” Communications of the ACM 40(1), January 1997. http://crypto.stanford.edu/cs155/virus_antivirus_coevolution.pdf
- Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage, “Automated Worm Fingerprinting,” Proc. OSDI 2004, December 2004. http://www.cse.ucsd.edu/users/savage/papers/OSDI04.pdf
- David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford and Nicholas Weaver, “Inside the Slammer Worm,” IEEE Security and Privacy 1(4):33-39, July 2003. http://www.cse.ucsd.edu/users/savage/papers/IEEESP03.pdf
- Vern Paxson, “Bro: A System for Detecting Network Intruders in Real-Time,” Computer Networks 31(23-24), December 1999. ftp://ftp.ee.lbl.gov/papers/bro-CN99.ps.gz
Discussion
Participate in the wiki-discussion.