Network Operations and Internet Security @ Princeton

Joon Kim and Shuang Hao Present at Internet Measurement Conference

Leave a comment

Hyojoon Kim and Shuang Hao made a trip to Berlin, Germany to present their papers at the ACM SIGCOMM Internet Measurement Conference.  Their two papers were:

  • Monitoring the Initial DNS Behavior of Spammers
    S. Hao, N. Feamster, R. Pandrangi [.pdf]
  • Understanding the Evolution of Network Configuration: A Tale of Two Campuses
    H. Kim, T. Benson, A. Akella, N. Feamster [.pdf]
  • Shuang’s paper looks at the registration and initial lookup behaviors for malicious domains perform early identification of malicious domains (e.g., domains that are used to host scam sites).  He developed these techniques in collaboration with Verisign, who have filed for a patent on the algorithms.
  • Joon’s paper looks at how campus network configuration has evolved over a five-year period, for two campus networks: Georgia Tech and the University of Wisconsin.  He found that operators make tens of configuration changes daily, most of them for security-related purposes, such as access control.

Author: Nick Feamster

Nick Feamster is a professor in the Department of Computer Science at Princeton University. Before joining the faculty at Princeton, he was a professor in the School of Computer Science at Georgia Tech. He received his Ph.D. in Computer science from MIT in 2005, and his S.B. and M.Eng. degrees in Electrical Engineering and Computer Science from MIT in 2000 and 2001, respectively. His research focuses on many aspects of computer networking and networked systems, including the design, measurement, and analysis of network routing protocols, network operations and security, and anonymous communication systems. In December 2008, he received the Presidential Early Career Award for Scientists and Engineers (PECASE) for his contributions to cybersecurity, notably spam filtering. His honors include the Technology Review 35 "Top Young Innovators Under 35" award, a Sloan Research Fellowship, the NSF CAREER award, the IBM Faculty Fellowship, and award papers at SIGCOMM 2006 (network-level behavior of spammers), the NSDI 2005 conference (fault detection in router configuration), Usenix Security 2002 (circumventing web censorship using Infranet), and Usenix Security 2001 (web cookie analysis).

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s