Week 13: Security Part III
Lecture 23: Network Security and Distributed Denial of Service (DDoS) Attacks
Lecture 23 Outline
- Today's Threat Model
- DDoS Attacks
- Botnets
- Network Intrusion Detection Systems (NIDS)
- How to Evade NIDS
- Attacks that Mimic Legitimate Traffic
- Attacks on Routers
- Moral of the Story
Lecture Slides
Reading
Recitation 23: Botnets
Lecture 24: Bitcoin
Lecture 24 Outline
- Introduction
- Currency
- A Decentralized Digital Currency (Almost)
- Dealing with Double-spending
- Proofs-of-work
- Ordering Transactions
- Did we prevent Double-spending?
- Discussion
Lecture Slides
Reading
Recitation 24: Memory Corruption
Tutorial 13: [No Tutorial]