From b3a2f6ccfaeab7dc6a2c2b17a30405914726d137 Mon Sep 17 00:00:00 2001 From: Nick Feamster Date: Wed, 16 Oct 2024 17:36:59 -0500 Subject: [PATCH] meeting 3 agenda --- docs/agenda.md | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) diff --git a/docs/agenda.md b/docs/agenda.md index e9156a2..3c1444a 100644 --- a/docs/agenda.md +++ b/docs/agenda.md @@ -25,6 +25,7 @@ * What are the implications of the ethical considerations in this paper for the design of privacy-preserving systems? * Not Covered: DMCA, SDMI Challenge Case Study, etc. (to be continued in later lectures) + * Possible Midterm Question: Example of Ethical Issue, Apply Ethical Framework * Debate: Data Breaches * Authentication * Assignment: Public Key Infrastructure @@ -33,3 +34,25 @@ * Topics NOT covered: symmetric key crypto, legacy cryptosystems, the number theory of RSA/public key crypto, etc. + +### Meeting 3 + +* Lecture Coverage: Denial of Service +* Typical Characteristics of DoS Attacks + * Asymmetry + * Difficulty of Attribution (IP Spoofing) + * Difficulty of Distinguishing Legitimate from Attack Traffic +* Case Study: Mirai Botnet + * DNS basics + * Difficulty of mitigation, attribution +* Common defenses + * Rate limiting + * Captchas +* Possible Midterm Question: Example Recent DoS Attack, Analyze + characteristics, propose mitigations +* Not covered: Technical details of TCP SYN Flood attacks, TCP handshake, TCP + SYN cookies, etc. Details of defending against TCP-based attacks. +* Debate: Encryption Backdoors +* More Denial of Service/Botnets + * DNS Amplification + * Traffic Injection (Great Cannon)