Browse by Course code: INFO6003

Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0
Number of items: 24.

INFO6003: Network revision
Notes on revision topics for TJC's network and campus security lectures.

Shared with: University

INFO6003: IPv6 Impact on Security
A brief discussion of some of the impacts of introducing IPv6

Shared with: University

INFO6003: Netflow example
Some examples of Netflow tools in use in ECS

Shared with: University

INFO6003: Worldwide Infrastructure Security Report 2011 - notes
Notes about the Arbor WISR 2011 report, which we'll run through in the lecture.

Shared with: University

Worldwide Infrastructure Security Report 2011
Arbor Network's annual Internet security report for 2011/12. We will discuss this report in INFO6003 lectures.

Shared with: University

A Decade of DDoS
A summary timeline by Arbor Networks of how DDoS attacks have evolved.

Shared with: University

A Focus on Distributed Denial of Service
An Arbor Networks paper describing DDoS attacks and related attacks. The first 9-10 pages or so are good background reading for INFO6003. Students may also find the rest of the paper interesting.

Shared with: University

INFO6003 Network Security: WLAN authentication and roaming
Describes different approaches to authentication for wireless networks, and the evolution of eduroam

Shared with: University

INFO6003: Network Security: DDoS
A run through various aspects of Distributed Denial of Service attacks

Shared with: University

INFO6003: Campus Network Security Perspectives
These slides cover aspects of network design and technology relevant to a campus network deployment such as that at the University of Southampton.

Shared with: University

On the Foundations of Quantitative Information Flow
The paper introduces vulnerability and quantitative privacy. Optional reading

Shared with: University

An analysis of trust in anonymity networks in the presence of adaptive attackers
Introduces extended Crowds protocols. Optional reading

Shared with: University

Hiding routing information
This is the original "onion routing" paper, it explains in the details how onions are built and work. This is optional reading, although I strongly advise you to read the Introduction and section 3 "Onions"

Shared with: University

Building incentives into Tor
This is the paper introducing the Tor's gold star incentive mechanism. It is optional reading

Shared with: University

Tor: the second generation onion router
This is the original Dingledine et al's Tor paper. Please consider it required reading.

Shared with: University

Crowds: Anonymity for Web Transactions
This is the original Crowds paper from Reiter and Rubin. Please consider it required reading.

Shared with: University

This list was generated on Mon Sep 1 12:07:17 2014 BST.