Logo: University of Southern California

Events Calendar



Select a calendar:



Filter June Events by Event Type:


SUNMONTUEWEDTHUFRISAT
2
3
4
5
6
7
8

16
17
18
19
21
22

30
2
3
4
5
6


Events for June 13, 2024

  • PhD Dissertation Defense - ASM Rizvi

    Thu, Jun 13, 2024 @ 01:00 PM - 03:00 PM

    Thomas Lord Department of Computer Science

    University Calendar


    Title: Mitigating Attacks That Disrupt Online Services Without Changing Existing Protocols  
     
    Date and Time: Thursday, June 13th, 2024: 1:00p - 3:00p  
     
    Location: RTH 114  
     
    Commitee Members: John Heidemann (Chair), Bhaskar Krishnamachari, Harsha V. Madhyastha, Jelena Mirkovic  
     
    Abstract: Service disruption is undesirable in today’s Internet connectivity due to its impacts on enterprise profits, reputation, and user satisfaction. We describe service disruption as any targeted interruptions caused by malicious parties in the regular user-to-service interactions and functionalities that affect service performance and user experience. In this thesis, we propose new methods that tackle service disruptive attacks using measurement and observation without changing existing Internet protocols. Although our methods do not guarantee defense against all the attack types, our example defense systems prove that our methods generally work to handle diverse attacks. To validate our thesis, we demonstrate defense systems against three disruptive attack types. First, we mitigate Distributed Denial-of-Service (DDoS) attacks that target an online service. Second, we handle brute-force password attacks that target the users of a service. Third, we detect malicious routing detours to secure the path from the users to the server. We provide the first public description of DDoS defenses based on anycast and filtering for the network operators. Then, we show the first moving target defense utilizing IPv6 to defeat password attacks. We also demonstrate how regular observation of latency helps cellular users, carriers, and national agencies to find malicious routing detours. As a supplemental outcome, we show the effectiveness of measurements in finding performance issues and ways to improve using existing protocols. These examples show that our idea applies to different network parts, even if we may not mitigate all the attack types.

    Location: Ronald Tutor Hall of Engineering (RTH) - 114

    Audiences: Everyone Is Invited

    Contact: ASM Rizvi

    Add to Google CalendarDownload ICS File for OutlookDownload iCal File