DoS-Resilient Internet Protocols



  • Mosaic: Quantifying Privacy Leakage in Mobile Networks
    N. Xia, H. Song, Y. Liao, M. Iliofotou, A. Nucci, Z. Zhang, and A. Kuzmanovic
    In Proceedings of ACM SIGCOMM 2013, Hong Kong, China, August 2013.
    [ .pdf | .pdf.gz | slides | review ]
    How to utilize OSN IDs and other identifiers to attribute significant amounts of traffic to individual users in mobile networks.

  • Searching for Spam: Detecting Fraudulent Accounts Via Websearch
    M. Flores and A. Kuzmanovic
    Proceedings of the 14th International Conference on Passive and Active Measurement, Hong Kong, China, March 2013.
    [ .pdf | .pdf.gz | slides | review ]
    A method for detecting fraudulent accounts on Twitter by measuring web presence via websearch.

  • Upgrading Mice to Elephants: Effects and End-Point Solutions
    A. Mondal and A. Kuzmanovic
    In IEEE/ACM Transactions on Networking, to appear, March 2009.
    [ .pdf | .pdf.gz | review/response ]
    An extended version of the INFOCOM 2007 paper.

  • Thinning Akamai
    A.-J. Su and A. Kuzmanovic
    In Proceedings of USENIX/ACM SIGCOMM Internet Measurement Conference (IMC'08), Vouliagmeni, Greece, October 2008.
    [ .pdf | .pdf.gz | .ppt | review]
    How you can deny service to large-scale DNS-driven streaming networks.

  • Pollution Attacks and Defenses for Internet Caching Systems
    L. Deng, Y. Gao, Y. Chen, and A. Kuzmanovic
    In Journal of Computer Networks, 52(5): 935-956, April 2008.
    [ .pdf | .pdf.gz | review | response ]
    An extended version of the ICNP 2006 paper.

  • A Poisoning-Resilient TCP Stack
    A. Mondal and A. Kuzmanovic
    In Proceedings of IEEE ICNP 2007, Beijing, China, October 2007.
    [ .pdf | .pdf.gz | .ppt | review ]
    How you can protect your TCP connection from poisoning attacks, yet without using cryptography.

  • When TCP Friendliness Becomes Harmful
    A. Mondal and A. Kuzmanovic
    In Proceedings of IEEE INFOCOM 2007, Anchorage, Alaska, May 2007.
    [ .pdf | .pdf.gz | .ppt | review ]
    How you can improve interactive applications' performance, yet without "getting caught."

  • Receiver-Centric Congestion Control with a Misbehaving Receiver: Vulnerabilities and End-Point Solutions
    A. Kuzmanovic and E. Knightly
    To appear in Journal of Computer Networks.
    [ .pdf | .pdf.gz | review | response ]
    An extended version of the ICNP 2004 paper.

  • Internet Cache Pollution Attacks and Countermeasures
    Y. Gao, L. Deng, A. Kuzmanovic, and Y. Chen
    In Proceedings of IEEE ICNP 2006, Santa Barbara, CA, November 2006.
    [ .pdf | .pdf.gz | .ppt | review ]
    How you can detect and protect against cache-targeted pollution attacks.
    A Squid-based implementation could be downloaded here.

  • Low-Rate TCP-Targeted Denial of Service Attacks and Counter Strategies
    A. Kuzmanovic and E. Knightly
    In IEEE/ACM Transactions on Networking, 14(4), August 2006.
    [ .pdf | .pdf.gz | review/response ]
    An extended version of the SIGCOMM 2003 paper.

  • Denial-of-Service Resilience in Peer-to-Peer File Sharing Systems
    D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaenepoel
    In Proceedings of ACM SIGMETRICS 2005, Banff, Alberta, Canada, June 2005.
    [ .pdf | .pdf.gz | .ppt | review ]
    Why are pollution attacks against peer-to-peer systems so successful?

  • A Performance vs. Trust Perspective in the Design of End-Point Congestion Control Protocols
    A. Kuzmanovic and E. Knightly
    In Proceedings of IEEE ICNP 2004, Berlin, Germany, October 2004.
    [ .pdf | .pdf.gz | .ppt | review ]
    How to fix the security problems of receiver-driven TCP stacks.
    NS-2 simulator source code and scripts can be downloaded here.

  • Low-Rate TCP-Targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants)
    A. Kuzmanovic and E. Knightly
    In Proceedings of ACM SIGCOMM 2003, Karlsruhe, Germany, August 2003.
    [ .pdf| .pdf.gz| .ppt| review/response| Russian translation ]
    How you can deny service without blasting the network.
    NS-2 simulator and Linux source code can be downloaded here.