Browse by Course code: INFO6003

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Number of items: 24.
  1. [img]
  2. [img]
  3. [img]
  4. [img]
  5. [img]
    INFO6003: Network revision
    Notes on revision topics for TJC's network and campus security lectures.

    Shared with the University by
  6. [img]
    INFO6003: IPv6 Impact on Security
    A brief discussion of some of the impacts of introducing IPv6

    Shared with the University by
  7. [img]
    INFO6003: Netflow example
    Some examples of Netflow tools in use in ECS

    Shared with the University by
  8. [img]
    INFO6003: Worldwide Infrastructure Security Report 2011 - notes
    Notes about the Arbor WISR 2011 report, which we'll run through in the lecture.

    Shared with the University by
  9. [img]
    Worldwide Infrastructure Security Report 2011
    Arbor Network's annual Internet security report for 2011/12. We will discuss this report in INFO6003 lectures.

    Shared with the University by
  10. [img]
    A Decade of DDoS
    A summary timeline by Arbor Networks of how DDoS attacks have evolved.

    Shared with the University by
  11. [img]
    A Focus on Distributed Denial of Service
    An Arbor Networks paper describing DDoS attacks and related attacks. The first 9-10 pages or so are good background reading for INFO6003. Students may also find the rest of the paper interesting.

    Shared with the University by
  12. [img]
    INFO6003 Network Security: WLAN authentication and roaming
    Describes different approaches to authentication for wireless networks, and the evolution of eduroam

    Shared with the University by
  13. [img]
    INFO6003: Network Security: DDoS
    A run through various aspects of Distributed Denial of Service attacks

    Shared with the University by
  14. [img]
  15. [img]
    INFO6003: Campus Network Security Perspectives
    These slides cover aspects of network design and technology relevant to a campus network deployment such as that at the University of Southampton.

    Shared with the University by
  16. [img]
    An analysis of trust in anonymity networks in the presence of adaptive attackers
    Introduces extended Crowds protocols. Optional reading

    Shared with the University by
  17. [img]
    Building incentives into Tor
    This is the paper introducing the Tor's gold star incentive mechanism. It is optional reading

    Shared with the University by
  18. [img]
    Hiding routing information
    This is the original "onion routing" paper, it explains in the details how onions are built and work. This is optional reading, although I strongly advise you to read the Introduction and section 3 "Onions"

    Shared with the University by
  19. [img]
  20. [img]
    On the Foundations of Quantitative Information Flow
    The paper introduces vulnerability and quantitative privacy. Optional reading

    Shared with the University by
  21. [img]
    Crowds: Anonymity for Web Transactions
    This is the original Crowds paper from Reiter and Rubin. Please consider it required reading.

    Shared with the University by
  22. [img]
    Tor: the second generation onion router
    This is the original Dingledine et al's Tor paper. Please consider it required reading.

    Shared with the University by
  23. [img]
  24. [img]
This list was generated on Thu Jul 27 18:45:12 2017 UTC.