Lecture 23: Network Security and Distributed Denial of Service (DDoS) Attacks
Lecture 23 Outline
- Today’s Threat Model
- DDoS Attacks
- Botnets
- Network Intrusion Detection Systems (NIDS)
- How to Evade NIDS
- Attacks that Mimic Legitimate Traffic
- Attacks on Routers
- Moral of the Story
Lecture Slides
Reading
- [No readings]
Recitation 23: Botnets
- Read “Your Botnet is My Botnet: Analysis of a Botnet Takeover (PDF)” by B. Stone-Gross, et al.
- Botnets Assignment
Lecture 24: Bitcoin
Lecture 24 Outline
- Introduction
- Currency
- A Decentralized Digital Currency (Almost)
- Dealing with Double-spending
- Proofs-of-work
- Ordering Transactions
- Did we prevent Double-spending?
- Discussion
Lecture Slides
Reading
- [No readings]
Recitation 24: Memory Corruption
- Read “SoK: Eternal War in Memory (PDF)” by L. Szekeres, M. Payer, T. Wei & D. Song
- Memory Corruption Assignment