Denial of Service (DoS) attacks deplete the resources of target systems to deny service to legitimate users. Preventing such attacks is quite difficult because of fundamental design decisions in the Internet and in wireless systems. This project is developing better theoretical models for DoS and using these to inspire and analyze new types of countermeasures. The project also investigates a range of topics in network security such as tunnels, firewalls, browsers, and DoS for wireless communications.
Publications
Friendsourcing to Detect Network Manipulation,
Ravinder Shankesi.
Doctoral Thesis, University of Illinois at Urbana-Champaign, August 2013.
Adaptive Selective Verification: An Efficient Adaptive Countermeasure to Thwart DoS Attacks
Sanjeev Khanna, Santosh S. Venkatesh, Omid Fatemieh, Fariba Khan, and Carl A. Gunter
IEEE/ACM Transactions on Networking, June 2012. [BIB]
Assuring Network Service with Bandwidth and Integrity Based Fairness
Fariba Khan
Doctoral Thesis, University of Illinois at Urbana-Champaign, November 2011. [BIB]
Making DTNs Robust Against Spoofing Attacks with Localized Countermeasures
Md Yusuf Sarwar Uddin, Ahmed Khurshid, Hee Dong Jung, Carl Gunter, Matthew Caesar and Tarek Abdelzaher
IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON ’11), Salt Lake City, UT, June 2011. [BIB]
Reconstructing Hash Reversal-Based Proof of Work Schemes
Jeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong Jin and Carl A. Gunter
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’11), Boston, MA, March 2011. [BIB]
Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks
Omid Fatemieh, Ali Farhadi, Ranveer Chandra and Carl A. Gunter
Network and Distributed System Security Symposium (NDSS ’11), San Diego, CA, February 2011. [PPT][BIB]
Assuring Robustness of Radio Spectrum Telemetry Against Vandalism and Exploitation
Omid Fatemieh
Doctoral Thesis, University of Illinois at Urbana-Champaign, February 2011. [BIB]
Application-Aware Secure Multicast for Power Grid Communications
Jianqing Zhang and Carl A. Gunter
International Journal of Security and Networks (IJSN), volume 6, number 1, 2011. [BIB][Related]
Tiered Incentives for Integrity Based Queuing
Fariba Khan and Carl A. Gunter
USENIX OSDI, Workshop on the Economics of Networks, Systems, and Computation (NetEcon ’10), Vancouver, BC, Canada, October 2010. [BIB]
Application-Aware Secure Multicast for Power Grid Communications
Jianqing Zhang and Carl A. Gunter
IEEE International Conference on Smart Grid Communications (SmartGridComm ’10), Gaithersburg, MD, October 2010. [PPT][BIB][Related]
Resource Inflation Threats to Denial of Service Countermeasures
Ravinder Shankesi, Omid Fatemieh and Carl A. Gunter
Technical Report, University of Illinois at Urbana-Champaign, October 2010.
Secure Multicast for Power Grid Communications
Jianqing Zhang
Doctoral Thesis, University of Illinois at Urbana-Champaign, September 2010. [Related]
Low Cost and Secure Smart Meter Communications using the TV White Spaces
Omid Fatemieh, Ranveer Chandra and Carl A. Gunter
IEEE International Symposium on Resilient Control Systems (ISRCS ’10), Idaho Falls, ID, August 2010. [PPT][BIB][Related]
Completeness of Discovery Protocols
Alwyn Goodloe and Carl A. Gunter
Assurable and Usable Security Configuration (SafeConfig ’09), Chicago, IL, November 2009.
Model-Checking DoS Amplification for VoIP Session Initiation
Ravinder Shankesi, Musab AlTurki, Ralf Sasse, Carl A. Gunter and Jose Meseguer
European Symposium on Research in Computer Security (ESORICS ’09), Saint Malo, France, September 2009.
Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol
Musab AlTurki, Jose Meseguer and Carl A. Gunter
Electronic Notes in Theoretical Computer Science 234, pages 3-18, 2009. [BIB]
Guest Editorial Network Infrastructure Configuration
Paul Anderson, Carl A. Gunter, Charles R. Kalmanek, Sanjai Narain, Jonathan M. Smith, Rajesh Talpade and Geoffrey G. Xie
IEEE Journal on Selected Areas in Communications, volume 27, issue 3, pages 249-252, 2009.
Using Rhythmic Nonces for Puzzle-Based DoS Resistance
Ellick M. Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin and Daniel Rebolledo
ACM Computer Security Architectures Workshop (CSAW ’08), Fairfax, VA, October 2008. [PPT][BIB]
Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol
Musab AlTurki, Jose Meseguer and Carl A. Gunter
International Workshop on Security and Rewriting Techniques (SecRet ’08), Pittsburgh, PA, June 2008.
Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers
Rohit Chadha, Carl A. Gunter, Jose Meseguer, Ravinder Shankesi and Mahesh Viswanathan
IFIP Formal Methods for Open Object-based Distributed Systems (FMOODS ’08), Oslo, Norway, June 2008. [BIB]
Adaptive Selective Verification
Sanjeev Khanna, Santosh S. Venkatesh, Omid Fatemieh, Fariba Khan and Carl A. Gunter
IEEE Conference on Computer Communications (INFOCOM ’08), Phoenix, AZ, April 2008. [PPT][BIB]
A Foundation for Tunnel-Complex Protocols
Alwyn E. Goodloe
Doctoral Thesis, University of Pennsylvania, March 2008. [BIB]
Reasoning about Concurrency for Security Tunnels
Alwyn E. Goodloe and Carl A. Gunter
IEEE Computer Security Foundations (CSF ’07), Venice, Italy, July 2007. [PPT][BBT]
How Much Bandwidth Can Botnets Commandeer?Michael Greenwald, Sanjeev Khanna and Santosh Venkatesh
2nd Annual Information Theory and Applications Workshop, San Diego, CA, February 2007.
L3A: A Protocol for Layer Three Accounting
Alwyn Goodloe, Carl A. Gunter, Matthew Jacobs and Gaurav Shah
IEEE Workshop on Secure Network Protocols (NPsec ’05), Boston, MA, November 2005. [PPT][BIB]
Mitigating DoS Attack Through Selective Bin Verification
Micah Sherr, Michael Greenwald, Carl A. Gunter, Sanjeev Khanna and Santosh Venkatesh
IEEE Workshop on Secure Network Protocols (NPsec ’05), Boston, MA, November 2005. [PPT][BIB]
Formal Modeling and Analysis of DoS Using Probabilistic Rewrite Theories
Gul Agha, Michael Greenwald, Carl A. Gunter, Sanjeev Khanna, Jose Meseguer, Koushik Sen and Prasannaa Thati
IEEE Workshop on Foundations of Computer Security (FCS ’05), Chicago, IL, June 2005. [PPT][BIB]
Formal Prototyping in Early Stages of Protocol Design
Alwyn Goodloe, Carl A. Gunter and Mark-Oliver Stehr
IFIP/ACM Workshop on Issues in the Theory of Security (WITS ’05), Long Beach, CA, January 2005. [PPT][BIB]
Design and Analysis of Sectrace: A Protocol to Set up Security Associations and Policies in IPSec Networks,
Alwyn Goodloe, Michael McDougall, Carl A. Gunter, and Mark-Oliver Stehr.
Technical Report, September, 2004.
DoS Protection for Reliably Authenticated Broadcast
Carl A. Gunter, Sanjeev Khanna, Kaijun Tan and Santosh Venkatesh
ICSOC Network and Distributed Systems Security Symposium (NDSS ’04), San Diego, CA, February 2004.
Related Resources
Last updated on Thursday, June 26, 2014, 12:48 pm