6.033 | Spring 2018 | Undergraduate

Computer System Engineering

Week 13: Security Part III

Lecture 23: Network Security and Distributed Denial of Service (DDoS) Attacks

Lecture 23 Outline

  1. Today’s Threat Model
  2. DDoS Attacks
  3. Botnets
  4. Network Intrusion Detection Systems (NIDS)
  5. How to Evade NIDS
  6. Attacks that Mimic Legitimate Traffic
  7. Attacks on Routers
  8. Moral of the Story

Lecture Slides

Reading

  • [No readings]

Recitation 23: Botnets

Lecture 24: Bitcoin

Lecture 24 Outline

  1. Introduction
  2. Currency
  3. A Decentralized Digital Currency (Almost)
  4. Dealing with Double-spending
  5. Proofs-of-work
  6. Ordering Transactions
  7. Did we prevent Double-spending?
  8. Discussion

Lecture Slides

Reading

  • [No readings]

Recitation 24: Memory Corruption

Tutorial 13: [No Tutorial]

Course Info

Instructor
As Taught In
Spring 2018
Learning Resource Types
Lecture Notes
Written Assignments
Projects with Examples
Instructor Insights