Select a calendar:
Filter June Events by Event Type:
SUNMONTUEWEDTHUFRISAT
Events for June 13, 2024
-
PhD Dissertation Defense - ASM Rizvi
Thu, Jun 13, 2024 @ 01:00 PM - 03:00 PM
Thomas Lord Department of Computer Science
University Calendar
Title: Mitigating Attacks That Disrupt Online Services Without Changing Existing Protocols
Date and Time: Thursday, June 13th, 2024: 1:00p - 3:00p
Location: RTH 114
Commitee Members: John Heidemann (Chair), Bhaskar Krishnamachari, Harsha V. Madhyastha, Jelena Mirkovic
Abstract: Service disruption is undesirable in today’s Internet connectivity due to its impacts on enterprise profits, reputation, and user satisfaction. We describe service disruption as any targeted interruptions caused by malicious parties in the regular user-to-service interactions and functionalities that affect service performance and user experience. In this thesis, we propose new methods that tackle service disruptive attacks using measurement and observation without changing existing Internet protocols. Although our methods do not guarantee defense against all the attack types, our example defense systems prove that our methods generally work to handle diverse attacks. To validate our thesis, we demonstrate defense systems against three disruptive attack types. First, we mitigate Distributed Denial-of-Service (DDoS) attacks that target an online service. Second, we handle brute-force password attacks that target the users of a service. Third, we detect malicious routing detours to secure the path from the users to the server. We provide the first public description of DDoS defenses based on anycast and filtering for the network operators. Then, we show the first moving target defense utilizing IPv6 to defeat password attacks. We also demonstrate how regular observation of latency helps cellular users, carriers, and national agencies to find malicious routing detours. As a supplemental outcome, we show the effectiveness of measurements in finding performance issues and ways to improve using existing protocols. These examples show that our idea applies to different network parts, even if we may not mitigate all the attack types.Location: Ronald Tutor Hall of Engineering (RTH) - 114
Audiences: Everyone Is Invited
Contact: ASM Rizvi