Student Lectures - Winter/2003 PSU/CS 595 Internet Routing This file will contain the schedule of student lectures/topics for the routing class: We will assume that each lecture will be at least N minutes (assume N == 30-40 until we know better, 30 is minimum). For each lecturer, we will have the following info here: who - name and email when - TBD, assigned by Jim what - title of talk including authors bio - who you are and a little about you URL/location - for the major paper (RFC/draft) to read and any supplementary papers that may be of interest. Students are expected to find/read the 1st item. -------------------------------------------------------------- 1. (numero uno) who: Derek Rustvold when: TBD, assigned by Jim what: A Secure Routing Protocol for Ad Hoc Networks Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer bio: A full-time graduate student at PSU. BS in Computer Science from PSU, June 2002. UNIX System Administrator. Licensed pilot and former aircraft mechanic. URL/Location: A Secure Routing Protocol for Ad Hoc Networks - Sanzgiri, Dahill, Levine, Shields http://signl.cs.umass.edu/pubs/aran.icnp02.ps Background/Preparation: Ad Hoc On-Demand Distance Vector Routing - Perkins, Royer (1997) http://beta.ece.ucsb.edu/~eroyer/txt/aodv.ps Dynamic Source Routing in Ad Hoc Wireless Networks - Johnson, Maltz (1996) http://www.cse.ucsc.edu/research/ccrg/CMPE252/Papers/dsr.ps.gz Abstract: Most recent ad hoc network research has focused on providing routing services without considering security. This lecture will detail security threats against ad hoc routing protocols, specifically examining Ad hoc On-demand Distance Vector routing protocol (AODV) and Dynamic Source Routing protocol (DSR). Based on these threats, three different environments with distinct security requirements are identified. Authenticated Routing for Ad hoc Networks (ARAN) is proposed to solve one of them. It is a managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected. Outline: 1. Introduction 2. Background 2.1 AODV 2.2 DSR 3. Exploits allowed by existing protocols 3.1 Attacks Using Modification 3.1.1 Redirection by modified route sequence numbers 3.1.2 Redirection with modified hop counts 3.1.3 Denial-of-service with modified source routes 3.1.4 Tunneling 3.2 Attacks Using Impersonation 3.3 Attacks Using Fabrication 3.3.1 Falsifying Route Errors in AODV and DSR 3.3.2 Route Cache Poisoning in DSR 4. Security Requirements of Ad hoc Networks 5. Authenticated Routing for Ad hoc Networks 5.1 Components 5.1.1 Certification 5.1.2 Authenticated Route Discovery 5.1.3 Authenticated Route Setup 5.2 Route Maintenance 5.3 Responses to Erratic Behavior 5.4 Key Revocation 6. Security & Network Performance Analyses 6.1 Network Performance 6.1.1 Performance Results 6.1.2 Effect of Malicious Node Behavior 7. Conclusion ----------------------------------------------------------- 2. who -Anjali Singhai asinghai@cs.pdx.edu when- TBD, assigned by Jim what- Random Early Detection Gateways for Congestion Avoidance and a very brief introduction on Adaptive RED. The first Paper on RED is by Sally Floyd and Van Jacobson. The paper on Adaptive RED is by Sally Floyd, Ramakrishna Gummadi and Scott Shenker bio- I am a full time graduate student at PSU. My undergrad is in Electronics and Telecommunication from one of the oldest Engineering colleges in India. I worked with defense research on fly by wire controls for a couple of years and then worked on projects for Lucent Excel Switching systems with Infosys Technologies Ltd. URL/location - http://www.icir.org/floyd/papers/early.pdf http://www.icir.org/floyd/papers/adaptiveRed.pdf -------------------------------------------------------------- 3. Name: Jose Mata e-mail: jrmata@attbi.com when: TBD Topic: An overview of wireless networks with IEEE 802.11a/g Mata Bio: I am a full-time CS grad student and am also an Oregon attorney. I have done some work with intellectual property and patent law issues as they related to computer technology. I do not personally have any wireless devices, but am very curious about the issue since the growth rate of the wireless networking industry is expected by many to be huge over the next decade. Primary Article: "802.11a--Fast Wireless Networking" by Bruce Brown, ExtremeTech. This is a multi-page overview article. You can use the "next" arrows at the bottom of each page to move through the article. http://www.extremetech.com/article2/0,3973,9151,00.asp Other references: "Wi-Fi (802.11) Network Handbook" Ron Seide, Neil P. Reid, McGraw Hill Osborne Media (December 5, 2002). This is a recently published book available at Amazon.com. "Security in 802.11", Michael Goldschmidt, Glynn Morrison and Rohit Sabhlok http://www.informatics.ed.ac.uk/teaching/modules/cn/groupreports/secur ityin802.11.pdf "WPA: Is Wi-Fi's Security Bandage Going to Win Over Network Admins", Jacqueline Emigh, Tutorials, Internet.Com (December 2, 2002) http://www.80211-planet.com/tutorials/article.php/1550561 "Expert: Alleged Wi-Fi Risks are Nonsense", Mitch Wagner, Internetweek.com (January 9, 2003) http://www.internetweek.com/security02/INW20030109S0001 "Wi-Fi Basics" http://www-personal.umich.edu/~acarbon/Alejandro/wifi1.htm "Measured Performance of 5-GHz 802.11a Wireless Lan Systems", James C. Chen, Ph.D., Jeffrey M. Gilbert, Ph.D., Atheros Communications Inc. (8/27/01) http://www.atheros.com/AtherosRangeCapacityPaper.pdf "A Comparison of Hiperlan/2 and IEEE 802.11a", Angela Doufexi et. al, Centre for Communications Research, University of Bristol, UK and Telia Research AB, Sweden http://www.magisnetworks.com/pdf/white_papers/standards_comparison.pdf "Deploying Public WLANs", Jim Geier, Tutorials, Internet.com (August 19, 2002) http://www.80211-planet.com/tutorials/article.php/10724_1448941_2 Outline: 1. summary of how physical and MAC layers work (Frequency, Coded OFDM) 2. strengths and weaknesses of 802.11a 3. comparison to 802.11b, bluetooth and 3G 4. access points (public and private) -- connection of WLAN to LAN 5. wireless routers used with 802.11a and possible configurations of devices, use of DHCP, NAT (to connect for example laptops, pda, and other devices to a single access point) 6. security (WEP, WPA) ------------------------------------------------------------- 4. who - Meibai He email-meibai@cs.pdx.edu when - after the previous talk what - BGP/long-term trends bio - full time CS graduate student. URL/location - http://www.armware.dk/RFC/rfc/rfc3221.html ******************************************** ftp://ftp.rfc-editor.org/in-notes/rfc1771.txt ftp://ftp.rfc-editor.org/in-notes/rfc1772.txt ftp://ftp.rfc-editor.org/in-notes/rfc2283.txt Abstract- Introduction of BGP-4 specification and the usage of the BGP in the internet as the background information. We will focus on examining the various long term trends within the characteristics of the Internet's BGP table and identifying the operational practices and protocol factors that contributes to these trends. Finally, the future requirements for the exterior routing system will be discussed. Outline- -A overview of BGP specification -The usage of the BGP in the internet -trends within the characteristic of the internet's BGP table and identifies the operational practices and protocol factors contribute to these trends. -the future requirements for the exterior routing system ------------------------------------------------------------- 5. Who: Supreeth Venkataraman (supreetv@cs.pdx.edu) When: TBD, Assigned by Jim What: Onion Routing: An Architecture for Hiding Routing Information to Prevent Traffic Analysis (This is the title of my talk) Papers on which this talk is based ================================== 1. David M. Goldschlag, Michael G. Reed, and Paul F. Syverson, "Hiding Routing Information," Information Hiding, R. Anderson (editor), Springer-Verlag LLNCS 1174, 1996, pp. 137-150. 2. Dario Forte, "Analyzing the Difficulties in Backtracking the Onion Router's Traffic," Digital Forensic Research Workshop, 2002. (DFRWS 2002). Bio: I'm a full time graduate student at PSU. My hometown is Madras (now Chennai), India.I have an undergraduate degree in Computer Science from Mangalore University, India. In my spare time, I'm a guitarist with an affinity for classical music and classic rock. ABSTRACT ======== Onion Routing is a technique that makes it difficult for third parties to perform traffic analysis. Onion Routing achieves this by making use of existing cryptography techniques, and applying them to networking. This talk will focus on the architecture of Onion Routing, the terminology used, analysis of the technique, and difficulties that arise in backtracking the onion router's traffic. The talk will also have a short section on information hiding techniques on the internet in general. URL/location: 1. David M. Goldschlag, Michael G. Reed, and Paul F. Syverson, "Hiding Routing Information," Information Hiding, R. Anderson (editor), Springer-Verlag LLNCS 1174, 1996, pp. 137-150. http://www.onion-router.net/Publications/IH-1996.pdf 2. Dario Forte, "Analyzing the Difficulties in Backtracking the Onion Router's Traffic," Digital Forensic Research Workshop, 2002. (DFRWS 2002). http://www.dfrws.org/dfrws2002/papers/Papers/Dario_Forte.pdf ------------------------------------------------------------- 6. who: Venugopal Puli when: TBD what: Secure Mobile Networking Jim Binkley, Suresh Singh Portland State University. bio: Full-time graduate student at PSU. URL/Location: Secure Mobile Networking : http://www.cs.pdx.edu/research/SMN/index.html Secure and Mobile Networking : http://portal.acm.org/citation.cfm?id=295141&coll=portal&dl=ACM&ret=1#Fulltext Abstract: Mobility on the internet implies higher security concerns and risks than non-nomadic operations. It is possible that the traffic of a mobile node is passed through links with dubious security features. This innovative research project is a deligent effort to build a "secure enclave" among mobile workstations. The lecture will present the details of how a secure enclave is created among mobile nodes so that the nodes can join a secure network across insecure topologies and will explains the two-way tunnel mechanism. The lecture also expatiates the accomplishments, frustrations and finally future work to be carried. outline. 1) Introduction and overview of the goals 2) The Secure enclave approach. 3) Accomplishments. 4) High and low points 5) Future work. 6) Conclusion. ------------------------------------------------------------- 7. who: Gokul Huggahalli when: TBD, assigned by Jim what - A Review of Current Routing Protocols for Ad-hoc Mobile Wireless Networks by Elizabet M.Royer and C-K Toh bio: Full-time graduate student at PSU. URL/Location: http://citeseer.nj.nec.com/correct/275264 http://citeseer.nj.nec.com/cachedpage/275264/1 A review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks Abstract: An ad hoc mobile network is a collection of mobile nodes whose location changes dynamically and arbitrarily. The interconnectivity between these nodes changes arbitrarily, so providing communication between these nodes would require a routing protocol that is capable of discovering routes between the nodes. The routing protocol should be correct and efficient. Routing protocols that will be covered include: Destination-Sequenced Distance Vector Routing (DSDV) Clusterhead Gateway Switch Routing (CGSR) The Wireless Routing Protocol (WRP) Ad hoc On-Demand Distance Vector Routing (AODV) Dynamic Source Routing (DSR) Lightweight Mobile Routing Protocol (LMR) Temporally-Ordered Routing Algorithm (TORA) Associativity-Based Routing (ABR) Signal Stability Routing (SSR) Outline: 1. Introduction 2. Existing Ad-Hoc Protocols Available a. Table Driven Routing Protocols b. Destination Sequenced Distance Vector Routing 3. Table Driven Routing Protocols DSDV CGSR WRP 4. Destination Sequenced Distance Vector Routing AODV DSR LMR ORA ABR SR 5. Comparison between algorithms based on various parameters 6. Practical Applications 7. Conclusion ------------------------------------------------------------- 8. Who: Alesha R. Adamson alesha@cat.pdx.edu When: Winter 2003 TBD What: Ettercap: a multipurpose sniffer/interceptor/logger for switched LAN. Bio: I am a graduate student in the College of Engineering and Computer Science of Portland State University. I received my undergraduate degree from PSU in Computer Science in 2001. I live in a burritoe. URL/location: ettercap.sourceforge.net Abstract: Ettercap is a network sniffer/interceptor/logger for ethernet LANs. It supports active and passive dissection of many protocols (even ciphered ones, like SSH and HTTPS). Data injection in an established connection and filtering on the fly is also possible, keeping the connection synchronized. Many sniffing modes were implemented to give you a powerful and complete sniffing suite. Plugins are supported. It has the ability to check whether you are in a switched LAN or not, and to use OS fingerprints (active or passive) to let you know the geometry of the LAN. ------------------------------------------------------------- 9. who - Christopher Hall when - TBD, assigned by Jim what - Multi-protocol Label Switching bio - I have B.A. in Physics from Vassar College and am currently pursuing a M.S. in Computer Science at PSU. URL/location - http://www.ietf.org/rfc/rfc3031.txt http://www.ietf.org/rfc/rfc3032.txt http://www.ietf.org/rfc/rfc3270.txt http://www.ietf.org/rfc/rfc3443.txt ------------------------------------------------------------- 10. who - Subha Singaram (subha@pdx.edu) when - TBD, assigned by Jim what - Enhanced Interior Gateway Routing Protocol (EIGRP) bio - I am a full time graduate student at PSU. I did my undergraduate studies at the Open University of British Columbia. I am also a Bharatanatyam (one of the classical dances of India) dancer. URL/location - http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/en_igrp.htm http://www.oreilly.com/catalog/iprouting/chapter/ch04.html#29658 http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci214442,00.html http://www.tech-nic.net/html/eigrp.html ------------------------------------------------------------- 11. Who - Ravindra Singh (singhr@cs.pdx.edu) When - TBD What - Zeroconf - Zero Configuration IP Networking "That means making it possible to take two laptop computers, and connect them with a crossover Ethernet cable, and have them communicate usefully using IP, without needing a man in a white lab coat to set it all up for you... The long-term goal of Zeroconf is to enable the creation of entirely new kinds of networked products, products that today would simply not be commercially viable because of the inconvenience and support costs involved in setting up, configuring, and maintaining a network to allow them to operate" Bio - I have over 5 years of professional experience in designing and developing solutions in the areas of Client/Server, Web and Wireless technologies.I worked with Intel and helped them design a solution to stream live basketball games to a PocketPC, WAP Phones and Web TV. I am currently enrolled as full time Grad Student at PSU and also work part-time for Oregon Department of Transportation as a Software Developer. URL/ Location - http://www.zeroconf.org/ - Requirements for Automatic Configuration of IP Hosts (http://www.ietf.org/internet-drafts/draft-ietf-zeroconf-reqts-12. txt) - Zeroconf Host Profile Applicability Statement (http://files.zeroconf.org/draft-ietf-zeroconf-host-prof-01.txt) - Official IETF Zeroconf Charter Page (http://www.ietf.org/html.charters/zeroconf-charter.html) ------------------------------------------------------------- 12. Name: Milan Andric e-mail: andricm@cs.pdx.edu when: TBD Topic: Dynamic Source Routing in Ad Hoc and Multihop wireless networks Short Bio: I am a full-time CS grad student at PSU, interested in systems (networking, wireless, and routing and protocols) and SW engineering. I've received my undergrad CS degree from PSU in 2000, and worked for about 2 years in local industry (Intel, Timberline Software, etc.) My interests include component reliability theory and research on component design theory (including modern component theories/technologies). Articles: David B. Johnson and David A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Chapter 5, pages 153-181, Kluwer Academic Publishers, 1996. David B. Johnson, David A. Maltz, and Josh Broch. DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks. in Ad Hoc Networking, edited by Charles E. Perkins, Chapter 5, pp. 139-172, Addison-Wesley, 2001. ------------------------------------------------------------- 13. From: Amey A Tarte A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols (1998) http://citeseer.nj.nec.com/broch98performance.html ------------------------------------------------------------- 14. who: Maharajan Muthuswamy, maha@cs.pdx.edu when - TBD, assigned by Jim what - Reliable Multicast Transport Protocol and a look at Scalable Reliable Multicast [1] Reliable Multicast Transport Protocol Sanjoy Paul, Sabnani,Lin & Bhattacharya [2] A Reliable Multicast Framework for Light-weight Sessions and Application Level Framing Sally Floyd, Van Jacobson, Steve McCanne, Gung-Liu & Zhang Abstract: RMTP is based on a hierarchical structure in which receivers are grouped into local regions or domains. Each domain has a designated receiver (DR), which (re)transmits packets to the receivers in its domain, processes ACKs from the receivers and sends periodic ACKs to the sender. The sender does not receive ACKS from the original receiver. A single ACK is generated per region instead of all receivers sending their ACKs thereby preventing ACK implosion. I shall also attempt to take a look at Scalable Reliable Multicast(SRM). Different multicast applications have different requirements for reliability and the SRM framework we look at is stated to perform well over a wide range of topologies. bio - I am full time grad student at PSU. I have an undergraduate degree in Electrical Engineering from the University of Madras, India. URL/location - Primary Papers for reference: [1] Reliable Multicast Transport Protocol IEEE Journal on Selected Areas in Communications, Vol. 15 No. 3, http://citeseer.nj.nec.com/paul97reliable.html [2] A Reliable Multicast Framework for Light-weight Sessions and Application Level Framing http://citeseer.nj.nec.com/floyd95reliable.html Other URLs of Interest [1] The Bell Labs' RMTP Page http://www.bell-labs.com/project/rmtp/rmtp.html [2] The Reliable Multicast Research Group http://www.east.isi.edu/rm/ [3] IETF Criteria for Evaluating Reliable Multicast Transport and Application Protocols ftp://ftp.rfc-editor.org/in-notes/rfc2357.txt [4] RFC - Multicast Transport Protocol ftp://ftp.rfc-editor.org/in-notes/rfc1301.txt [5] Reliable Multicast Links - page contains several links pertaining to reliable multicast http://www.nard.net/~tmont/rm-links.html [6] NTT's RMTP Page http://info.isl.ntt.co.jp/rmtp/ ------------------------------------------------------------- 15. who - Nishita Vora Pandya when - TBD What - Session Initiation Protocol The talk will cover a brief overview of voice-over-ip technology and detailed discussion about the Session Initiation Protocol. Bio - I am a full time CS graduate student in PSU, and am usually seen towing a red bag on wheels behind me, wherever i go. I have an undergrad degree in Statistics, and a Masters in Human Resource Management, from Gujarat Univ., India. and have been pursuing this masters degree in PSU since the past year and half. During this period, I have also taught some undergraduate classes in PSU. URL - 1) RFC 2543(SIP) :- http://www.cis.ohio-state.edu/cgi-bin/rfc/rfc2543.html 2) Updated RFC: RFC 3625 :- http://www.armware.dk/RFC/rfc/rfc3265.html 3) http://www.cis.ohio-state.edu/~jain/refs/ref_voip.htm 4) http://www.cis.ohio-state.edu/~jain/cis788-99/voip_protocols/ ------------------------------------------------------------- 16. who - Subhash Aggarwal (saggarwa@cs.pdx.edu) when - TBD, assigned by Jim what - Virtual Router Redundancy Protocol (VRRP) bio - I am pursuing MS (part-time) in Computer Science (CS) from PSU. I completed BS in CS from PSU in 1998. I am a full-time software engineer (BIOS engineer) at Intel Corporation since 1998 spring. URL/location - [1] RFC 2338 (VRRP): http://www.ietf.org/rfc/rfc2338.txt [2] Internet Draft: http://www.ietf.cnri.reston.va.us/internet-drafts/draft-ietf-vrrp-spec-v2-06.txt [3] http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/120newft/120limit/120st/12 0st18/st_vrrpx.htm [4] http://www.nortelnetworks.com/solutions/lan/collateral/ppvrrp.pdf ------------------------------------------------------------- 17. Name: Zheng Tu Email: tuz@cs.pdx.edu When: TBD Topic: Routing with a clue and other IP lookup techniques Bio: I am a full-time CS graduate student of PSU. Primary Article: "Routing with a Clue" Yuhuda Afek, Anat Bremler-Barr and Sariel Har-Peled IEEE/ACM Trans. on Networking vol.9, No.6, Dec 2001 (local cache) http://www.cs.pdx.edu/~tuz/p693-afek.pdf Other References: 1. "A framework for multiprotocol label switching," IETF IETF Tech. Rep. draft-ietf-mpls-framework-02.txt, Nov. 1997. 2. "Tag Switching Architecture Overview" Y. Rekhler et. al IETF Tech. Rep. 3. "IP Switching and Gigabit Router" P. Newman et. al IEEE Commun. Mag., vol.35, pp 64-69, Jan. 1997 Outline: 1. Various IP lookup techniques: MPLS (Multiprotocol label switching) and Tag Switching. 2. Distributed IP lookup (basic idea in this paper) 3. Clue Hash Table (benefits, construction). 4. Integrating Clue Routing with MPLS and Tag Switching, Considerations with BGP and OSPF. ------------------------------------------------------------- 18. who - Anand Vijayakumar when - TBD, assigned by Jim what - TORA and Performance Comparison of TORA with Ideal Link-State Routing. Abstract - Temporally-Ordered Routing Algorithm - The Temporally-Ordered Routing Algorithm (A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks), is a scalable routing algorithm originally designed for Mobile Ad Hoc Networks (MANETs). It represents a significant departure from traditional routing technology. TORA was developed under funding from the Army Research Laboratory under its ATIRP Program and as part of the Navy's ongoing education program. Bio - I am a full-time grad student at PSU. My under-graduate degree is in Information Science and Engineering from Bangalore University, India. URL's of interest for this topic - 1)http://tonnant.itd.nrl.navy.mil/tora/tora.html 2)http://www.isr.umd.edu/ISR/accomplishments/037_Routing/ 3)http://citeseer.nj.nec.com/context/529797/0 4)http://www.ietf.org/proceedings/97dec/slides/manet-tora/tsld001.htm 5)http://www.cmpe.boun.edu.tr/~emre/research/msthesis/node24.html 6)http://www.cs.wm.edu/~kearns/swg97/tora.pdf 7)http://www.argreenhouse.com/society/TacCom/papers98/12_04i.pdf ------------------------------------------------------------- 19. who: Tuhinanshu(anshu@cs.pdx.edu) when: TBD, assigned by Jim what - the Fisheye State Routing Protocol (FSR)by Guanguy pei,Matio gerla and Tsu Wei Chen bio: Full-time graduate student at PSU. biblography: www.cs.colorado.edu/~grunwald/MobileComputing/Papers/ fisheye-state-routing-in-mobile-ad-hoc-networks.pdf abstract: Fisheye state routing protocol is protocol which reduces routing update overhead in large Network.It is a simple ,efficent and scalable routing solution in a mobile ad-hoc enviroment ------------------------------------------------------------- 20. Who - Srinath Subbaramu, srinath_ns@hotmail.com When - TBD, assigned by Jim What - Intrusion detection in wireless Ad-hoc networks. Bio - Full time grad student in Computer Science - Portland State University. URL/location - http://citeseer.nj.nec.com/zhang00intrusion.html ------------------------------------------------------------- 21. who : Andreas Steven When: TBD, assigned by Jim What: SIP-T (Session Initiation Protocol for Telephone) An overview of how to integrate/interwork the PSTN (Public Switched Telephone Network) and SIP for a seemless integration of voice over IP. How to carry a regular telephones' voice over SIP networks to a SIP phone and how to route the voice thorough the SIP network. Bio: A full-time graduate student at PSU. URL/location: 1) SIP-T : http://www.normos.org/ietf/rfc/rfc3372.txt 2) SIP : http://www.normos.org/rfc/rfc2543.txt ------------------------------------------------------------- 22. who : Zhisong Zuo, zhisong@cs.pdx.edu when : TBD, assigned by Jim what : Observation and Analysis of BGP Behavior Under Stress Lan Wang, Xiaoliang Zhao, Dan Pei, Randy Bush, Daniel Massey, Allison Mankin, S. Felix Wu, Lixia Zhang bio : I'm full time Graduate student of CS Dept. I had work in a university in China as a instructor. My interesting area is Database and Networking. URL/location : The paper's PDF file can be found in: http://citeseer.nj.nec.com/cache/papers/cs/26755/http:zSzzSzwww.icir.orgzSzvernzSzimw-2002zSzimw2002-paperszSz217.pdf/observation-and-analysis-of.pdf Abstract: Despite BGP's critical importance as the de-facto Internet inter-domain routing protocol, there is little understanding of how BGP actually performs under stressful conditions when dependable routing is most needed. In this paper, we examine BGP's behavior during one stressful period, the Code Red/Nimda attack on September 18, 2001. The attack was correlated with a 30-fold increase in the BGP update messages at a monitoring point which peers with a number of Internet service providers. Our examination of BGP's behavior during the event concludes that BGP exhibited no significant abnormality, and that over 40% of the observed updates can be attributed to the monitoring artifact in current BGP measurement settings. Our analysis, however, does reveal several weak points in both the protocol and its implementation, such as BGP's sensitivity to the transport session reliability, its inability to avoid the global propagation of small local changes, and its certain implementation features whose otherwise benign effects only get amplified under stressful conditions. We also identify areas for improvement in the current network measurement and monitoring effort. Related Material: [1] Border Gateway Protocol-4 (BGP-4), IETF RFCs (1771 defines the protocol, 1772 suggests usage and polices). [2] Protection of BGP Sessions via the TCP MD5 Signature Option, IETF RFC2385. [3] RFC draft for improvements to BGP-4, including some security issues. www.ietf.org/internet-drafts/draft-iab-bgparch-02.txt. ------------------------------------------------------------- 23. Who: Jason Poon What: - What is WEP - How WEP Works - Checksum - Initialization Vector for RC4 - RC4 Encryption - quick example - The four main problem of the WEP protocol - forgeries - replays - weak key attacks - decryption without encryption key - What is TKIP - Design constraints of TKIP - TKIP's solutions to the four WEP Problems - the addition of MIC - new IV sequencing - addition of per packet key mixing function - rekeying mechanism - Summary of improvements with TKIP References: 1) 802.11 Key Management Series: Part I: Key Management for WEP and TKIP By Jesse Walker 2) 802.11 Security Series Part II: The Temporal Key Integrity Protocol (TKIP) By Jesse Walker http://www.secadministrator.com/Articles/Index.cfm?ArticleID=27064 http://www.80211-planet.com/columns/article.php/1443911 http://www.isp-planet.com/fixed_wireless/technology/2002/better_than_wep.htm l Wireless technology is becoming more widely used by the public for greater convenience and connectivity to others. The Wired Equivalency Protocol(WEP) was intended to provided the wireless network with a level of security equal to that of a wired network. However, security deficiencies have been observed in the protocol. The noted design flaws are it does not provide any forgery protection from unauthorized users, it offers no protection against replay attacks, it misuses the RC4 encryption algorithm so that it is exposed to weak key attacks, and its reuse of initialization vectors open the network packets to dictionary attacks which do not even need the encryption key. These flaws will be discussed in detail along with the new Temporal Key Integrity Protocol (TKIP) which addresses the design flaws of the WEP protocol. New routers can be implemented with less design constraints as new hardware could be designed. However, TKIP was designed with many constraints, mainly dealing with providing a protocol that was secure but operable on existing router hardware. These constraints and the solutions to WEP's flaws will be outlined. ------------------------------------------------------------- 24. Who: Ajay Venkatachala / ajaygrad@cs.pdx.edu When: TBD ,assigned by Jim What: Wireless Video-I’ll be discussing some basic technical, operational and legal information so you can decide if these products are suitable for you. Bio: I am from a very beautiful place in INDIA called Bangalore( also know as the IT center of INDIA) A full time graduate student at PSU . B.E in computer science from one of INDIA's best engineering college , July,2002. I love playing and watching cricket. Other than that I like swimming, and watching movies. URL/ Location: http://www.itpapers.com http://www.swssec.com/wire1.html ------------------------------------------------------------- 25. Who - Yunan Karim When - TBD, assigned by Jim What - A review on networking multiplayer computer games and their underlying protocols. We will also look into Real Time Transport Protocol which has been used in online networking games. Bio - I am a full time graduate student at PSU. My undergraduate degree is in Industrial Engineering from Oregon State University. URL/location - Primary papers: 1. A Review on Networking and Multiplayer Computer Games (2002) by Jouni Smed, Timo Kaukoranta, Harri Hakonen http://citeseer.nj.nec.com/503759.htm 2. RTP: A Transport Protocol for Real-Time Applications (2001) by Henning Schulzrinne, Stephen L. Casner, Ron Frederick, Van Jacobson Work in progress RFC 1889 http://citeseer.nj.nec.com/schulzrinne01rtp.html Other References: 1. Network Topologies for Scalable Multi-User Virtual Environments (1996) by Thomas A. Funkhouser 2. Npsnet: A Network Software Architecture For Large Scale Virtual Environments by Michael R. Macedonia, Michael J. Zyda, David R. Pratt, Paul Barham, Steven Zeswitz 3. A Distributed Architecture for Multiplayer Interactive Applications on the Internet (1999) by Christophe Diot, Laurent GAUTIER Abstract Networking forms an essential part of multiplayer computer games. In this paper, we review the techniques developed for improving networking in distributed interactive real-time applications. We present a survey of the relevant literature concentrating on the research done on military simulations, networked virtual environments, and multiplayer computer games. We also discuss on resource management, consistency and responsiveness, and networking on the application level.