Homework #2 - Traceback - Due Monday Jan 27, 1PM
Turn in this assignment via email (vern@berkeley.edu, plain text/HTML/Word)
by the due date, with the term Homework in the Subject.
Read the paper
Practical Network Support for IP Traceback, Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson, SIGCOMM 2000.
Note, the second half of section 5.1 gets somewhat hairy in a technical
sense. You don't need to grasp all of the details, but you should
strive to understand the gist of the discussion. (You also don't need to
worry about understanding where the analytic expressions come from.)
Briefly write up your views of:
- What are the main contributions of this paper?
- What parts of the paper do you find unclear? (optional)
- What parts of the paper are questionable? (That is, you think a
conclusion may be wrong, an approach or evaluation technically
flawed, or data ill-presented.)
- The paper is somewhat fast-and-loose in its discussion of one of the
scheme's significant limitations. State what you think it
is, explain why the explanation is not satisfactory, and
discuss how to reasonably extend the scheme to deal with
the limitation (if you think that's viable), or why the
limitation appears quite difficult to address.
- Discuss another form of spoofed identity that occurs in the Internet
and sketch a mechanism to either prevent it or trace it back.
Briefly discuss your proposed approach in terms of what it costs,
its limitations, and how an attacker might subvert it.
Keep in mind the homework logistics framed in
Homework #1.