6.033 | Spring 2018 | Undergraduate
Computer System Engineering

Week 13: Security Part III

Lecture 23: Network Security and Distributed Denial of Service (DDoS) Attacks

Lecture 23 Outline

  1. Today’s Threat Model
  2. DDoS Attacks
  3. Botnets
  4. Network Intrusion Detection Systems (NIDS)
  5. How to Evade NIDS
  6. Attacks that Mimic Legitimate Traffic
  7. Attacks on Routers
  8. Moral of the Story

Lecture Slides

Reading

  • [No readings]

Recitation 23: Botnets

Lecture 24: Bitcoin

Lecture 24 Outline

  1. Introduction
  2. Currency
  3. A Decentralized Digital Currency (Almost)
  4. Dealing with Double-spending
  5. Proofs-of-work
  6. Ordering Transactions
  7. Did we prevent Double-spending?
  8. Discussion

Lecture Slides

Reading

  • [No readings]

Recitation 24: Memory Corruption

Tutorial 13: [No Tutorial]

Course Info
Instructor
As Taught In
Spring 2018
Learning Resource Types
notes Lecture Notes
assignment Written Assignments
group_work Projects with Examples
co_present Instructor Insights