Page 1
CPE6510 – Resilient Networks – Spring 2017
Course Overview
Course Description: This course presents reliability and fault tolerance for network-centric systems,
including models, metrics, and analysis techniques. This course also concentrates on security, including
technical tools and methods for audit and assessment as well as management and policy issues. Note that in
addition to lectures, students read and present summaries of current research papers and execute a project.
(Co-listed with SysE 6322)
Prerequisite: SysE 6321 ⁄ CPE 6410 or CPE 5420
Class Number: On Campus: CPE: 72261 & SysE: 72263 – Distance Education: CPE: 72262 & SysE:
72264
Credit Hours: 3.0
Time: Th @ 4:00 pm – 6:30 pm
Location: Library G14 and Distance Education
Instructor: Egemen K. Çetinkaya
Instructor Contact Information:
132 Emerson Electric Co. Hall
301 W. 16th St.
Rolla, MO 65409-0040
Phone: +1 573 341 6887
E-mail: [email protected]
Skype: starpasha2004
Instructor Office Hours: Thursday @ 1:30 pm – 3:30 pm or by appointment
Administrative Assistant: Ms. Carol Lay, +1 573 341 4509, [email protected] , 143 Emerson Electric Co.
Hall
CPE 6510 Spring 2017 Syllabus: This syllabus is for all sections of this course
Page 2
Course Schedule
Tentative schedule of lectures, readings, assignments, and exams. Dates in the future subject to change.
Date Lecture Notes Announcements,
Readings, and Discussions
Student Presentations
Project Milestones
19 January 2017
Course Overview Networking Background
N/A N/A Project overview, expectations, and planning
26 January 2017
Resilience Overview
[SHÇ+2010], [ALR+2004]
N/A N/A
2 February 2017
Challenges and Tolerance
[EFL+1999], [SKH+2002], [ÇS2013] [BGP Hijacking video: YouTube and Pakistan Telecom] [CNN Overload video: CNN.com: Facing a World Crisis]
[JKR2002]JM1 : presentation [COP+2004]JM2 : presentation [SS2011]JM3 : presentation
N/A
9 February 2017
Resilience Evaluation
[NST2004], [SÇH+2013]
[CPB+2011]JM4 : presentation [GJN2011, HDB+2014, LGA+2013]JM5 : presentation [KWC+2009]JM6 : presentation
N/A
16 February 2017
Graph Theory Overview
[HRI+2008], [N2003]
[SPW2002]JM7 : presentation [BPV2014]JM8 : presentation [FAA+2011]JM9 : presentation
Finalize project topics and groups
23 February 2017
Graph Robustness and Algorithms
[AÇS2014], [ÇAP+2015]
[HSM2012]JM10 : presentation [TKI+2015]JM11 : presentation
N/A
2 March 2017
Network Security Overview
[CM2002], [YRL+2006]
[SK2011]JM12 : presentation [GAL+2015]JM13 : presentation [ZCX+2015]JM14 : presentation
N/A
9 March 2017
Midterm Exam Logistics
Midterm Exam N/A N/A
16 March 2017
N/A Spring Recess N/A N/A
23 March Network Security [MR2004], [PLR2007], [ZL2012]JM1 : Project report draft
Page 3
2017 Attacks [LBM+1994] presentation [WZL+2015]JM2 : presentation [RZL2013]JM3 : presentation
- title, abstract, outline MS-Word template or LaTeX template
30 March 2017
N/A Spring Break N/A N/A
6 April 2017
Critical Infrastructures
[RPK2001], [SHG2012], [YQS+2012] [Metcalf sniper attack video: Metcalf attack]
[O2014]JM4 : presentation
N/A
13 April 2017
Security of Control Systems
[GH2013], [M2005], [ILW2006] [Power Grid Attack video: Power grid vulnerability]
[SRG+2015]JM5 : presentation [S2015]JM6 : presentation [MJS2002, MSA2005]JM7 : presentation
N/A
20 April 2017
Wireless Network Security
[DKB2005], [SMM+2006], [KW2003]
[FB2014]JM8 : presentation [ATO2015]JM9 : presentation [GMS2015]JM10 : presentation
Project report draft - solid draft with references
27 April 2017
Game Theory and Network Security
[MZA+2013], [LX2013]
[MWA+2014]JM11 : presentation [BVL+2015]JM12 : presentation
N/A
4 May 2017
N/A N/A N/A Project presentations during class
11 May 2017
N/A No Final Exam N/A Project reports due
14 March 2017: Midterm grades due by instructor
20 March 2017: Midterm grades available via Joe'SS
16 May 2017: Final grades due by instructor
23 May 2017: Final grades available via Joe'SS
Page 4
Course Materials
Books
There will not be a required textbook for this class.
Optional Books
[G2004] Wayne Grover, Mesh-based Survivable Networks: Options and Strategies for Optical, MPLS,
SONET and ATM Networking, Prentice Hall PTR, 2004.
[VPD2004] Jean-Philippe Vasseur, Mario Pickavet, and Piet Demeester, Network Recovery: Protection and
Restoration of Optical, SONET-SDH, IP, and MPLS, Morgan Kaufmann, 2004.
[OM2005] Canhui Sam Ou and Biswanath Mukherjee, Survivable Optical WDM Networks, Springer, 2005.
(E-book is accesible online via the library and doi.)
[R2015] Jacek Rak, Resilient Routing in Communication Networks, Springer, 2015.
(E-book is accesible online via the doi.)
[B2012] Kenneth P. Birman, Guide to Reliable Distributed Systems, Springer, 2012.
(E-book is accesible online via the library and doi.)
[BA2012] Eric Bauer and Randee Adams, Reliability and Availability of Cloud Computing, IEEE-Wiley,
2012.
(E-book is accesible online via the library.)
[GS2011] Ilya Gertsbakh and Yoseph Shpungin, Network Reliability and Resilience, Springer Berlin
Heidelberg, 2011.
(E-book is accesible online via the library and doi.)
[T2002] Kishor S. Trivedi, Probability and Statistics with Reliability, Queuing, and Computer Science
Applications, 2nd edition, Wiley, 2002.
(Note that this is the required textbook for CPE 6440, Network Performance Analysis.)
[FP2016] Lance Fiondella and Antonio Puliafito, Principles of Performance and Reliability Modeling and
Evaluation, Springer International Publishing, 2016.
(E-book is accesible online via the library and doi.)
[S2002] Martin L. Shooman, Reliability of Computer Systems and Networks: Fault Tolerance, Analysis,
and Design, John Wiley & Sons, Inc., 2002.
(E-book is accesible online via the library.)
[KK2007] Israel Koren and C. Mani Krishna, Fault-Tolerant Systems, Morgan Kaufmann, 2007.
(Note that this is the required textbook for CPE 5510, Fault-Tolerant Digital Systems. E-book is accesible
online via the library.)
[ZGL+2013] Qing Zhou, Long Gao, Ruifang Liu, and Shuguang Cui, Network Robustness under Large-
Scale Attacks, Springer New York, 2013.
(E-book is accesible online via the library and doi.)
Page 5
[QTK+2008] Yi Qian, David Tipper, Prashant Krishnamurthy, and James Joshi, Information Assurance:
Dependability and Security in Networked Systems, Morgan Kaufmann, 2008.
(E-book is accesible online via the library.)
[A2008] Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd
edition, Wiley, 2008.
(Note that this was the textbook in 2010 offering of the course. It is available online via author's website.)
[NAP2003] NAP, The Internet Under Crisis Conditions: Learning from September 11, National Academies
Press, 2003.
(E-book is accesible online via the publisher.)
Supplementary Books
[KR2013] James F. Kurose and Keith W. Ross, Computer Networking: A Top-Down Approach, 6th edition,
Addison-Wesley, 2013.
(Note that this a mandatory book and must be read for anyone who wants start networking research with
me.)
[K2012] Srinivasan Keshav, Mathematical Foundations of Computer Networking, Addison-Wesley
Professional, 2012.
(E-book is accessible online via the library.)
[MR2007] Deepankar Medhi and Karthikeyan Ramasamy, Network Routing: Algorithms, Protocols, and
Architectures, Morgan Kaufmann, 2007.
(E-book is accesible online via the library.)
[KPS2002] Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private
Communication in a Public World, 2nd edition, Prentice Hall, 2002.
(Note that this was the required textbook for CPE 5420. E-book is accessible online via the library.)
[S2005] William Stallings, Wireless Communications & Networks, 2nd edition, Prentice Hall, 2005.
(Note that this is the required textbook for CPE 5430, Wireless Networks.)
[NBW2006] Mark E.J. Newman, Albert-László Barabási, and Duncan J. Watts, The Structure and
Dynamics of Networks, Princeton University Press, 2006.
(E-book is accesible online via the library.)
[W2001] Douglas B. West, Introduction to Graph Theory, 2nd edition, Prentice Hall, 2001.
(Note that this is the required textbook for CS 6001, Applied Graph Theory for Computer Science.)
[N2010] Mark E.J. Newman, Networks: An Introduction, Oxford University Press, 2010.
(Note that this is the required textbook for CS 6001, Complex Networked Systems.)
[CLR+2009] Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein, Introduction
to Algorithms, 3rd edition, MIT Press, 2009.
[B2010] Nino Boccara, Modeling Complex Systems, 2nd edition, Springer, 2010.
(Note that this was the required textbook for SysE 6321 ⁄ CPE 6410. E-book is accesible online via the
library and doi.)
Page 6
[B1997] Yaneer Bar-Yam, Dynamics of Complex Systems, Addison-Wesley, 1997.
(Note that this was the supplemental textbook for SysE 6321 ⁄ CPE 6410. It is available online via author's
website.)
Papers
[SHÇ+2010] James P.G. Sterbenz, David Hutchison, Egemen K. Çetinkaya, Abdul Jabbar, Justin P.
Rohrer, Marcus Schöller, and Paul Smith, “Resilience and Survivability in Communication Networks:
Strategies, Principles, and Survey of Disciplines,” Computer Networks, Volume 54, Issue 8, pp. 1245 –
1265, June 2010.
[ALR+2004] Algirdas Avižienis, Jean-Claude Laprie, Brian Randell, and Carl Landwehr, “Basic Concepts
and Taxonomy of Dependable and Secure Computing,” IEEE Transactions on Dependable and Secure
Computing, Volume 1, Issue 1, pp. 11 – 33, January-March 2004.
[EFL+1999] Robert J. Ellison, David A. Fisher, Richard C. Linger, Howard F. Lipson, Thomas A.
Longstaff, and Nancy R. Mead, “Survivability: Protecting Your Critical Systems,” IEEE Internet
Computing, Volume 3, Issue 6, pp. 55 – 63, November-December 1999.
[SKH+2002] James P.G. Sterbenz, Rajesh Krishnan, Regina Rosales Hain, Alden W. Jackson, David
Levin, Ram Ramanathan, and John Zao, “Survivable Mobile Wireless Networks: Issues, Challenges, and
Research Directions,” in Proceedings of the 1st ACM Workshop on Wireless Security (WiSe), Atlanta, GA,
September 2002, pp. 31 – 40.
[ÇS2013] Egemen K. Çetinkaya and James P.G. Sterbenz, “A Taxonomy of Network Challenges,” in
Proceedings of the 9th IEEE/IFIP International Conference on the Design of Reliable Communication
Networks (DRCN), Budapest, March 2013, pp. 322 – 330.
[NST2004] David M. Nicol, William H. Sanders, and Kishor S. Trivedi, “Model-Based Evaluation: From
Dependability to Security,” IEEE Transactions on Dependable and Secure Computing, Volume 1, Issue 1,
pp. 48 – 65, January-March 2004.
[SÇH+2013] James P.G. Sterbenz, Egemen K. Çetinkaya, Mahmood A. Hameed, Abdul Jabbar, Shi Qian,
and Justin P. Rohrer, “Evaluation of Network Resilience, Survivability, and Disruption Tolerance:
Analysis, Topology Generation, Simulation, and Experimentation,” Telecommunication Systems, Volume
52, Issue 2, pp. 705 – 736, February 2013.
[HRI+2008] Hamed Haddadi, Miguel Rio, Gianluca Iannaccone, Andrew Moore, and Richard Mortier,
“Network Topologies: Inference, Modeling, and Generation,” IEEE Communications Surveys & Tutorials,
Volume 10, Issue 2, pp. 48 – 69, 2nd Quarter 2008.
[N2003] Mark Newman, “The Structure and Function of Complex Networks,” SIAM Review, Volume 45,
Issue 2, pp. 167 – 256, 2003.
[AÇS2014] Mohammed J.F. Alenazi, Egemen K. Çetinkaya, and James P.G. Sterbenz, “Cost-efficient
algebraic connectivity optimisation of backbone networks,” Optical Switching and Networking, Volume
14, Part 2, pp. 107 – 116, August 2014.
[ÇAP+2015] Egemen K. Çetinkaya, Mohammed J.F. Alenazi, Andrew M. Peck, Justin P. Rohrer, and
James P.G. Sterbenz, “Multilevel Resilience Analysis of Transportation and Communication Networks,”
Telecommunication Systems, Volume 60, Issue 4, pp. 515 – 537, December 2015.
Page 7
[CM2002] Anirban Chakrabarti and G. Manimaran, “Internet Infrastructure Security: A Taxonomy,” IEEE
Network Magazine, Volume 16, Issue 6, pp. 13 – 21, November/December 2002.
[YRL+2006] Hao Yang, Fabio Ricciato, Songwu Lu, and Lixia Zhang, “Securing a Wireless World,”
Proceedings of the IEEE, Volume 94, Issue 2, pp. 442 – 454, February 2006.
[MR2004] Jelena Mirkovic and Peter Reiher, “A Taxonomy of DDoS Attack and DDoS Defense
Mechanisms,” ACM SIGCOMM Computer Communication Review, Volume 34, Issue 2, pp. 39 – 53, April
2004.
[PLR2007] Tao Peng, Christopher Leckie, and Kotagiri Ramamohanarao, “Survey of Network-Based
Defense Mechanisms Countering the DoS and DDoS Problems,” ACM Computing Surveys, Volume 39,
Issue 1, Article 3, April 2007.
[LBM+1994] Carl E. Landwehr, Alan R. Bull, John P. McDermott, and William S. Choi, “A Taxonomy of
Computer Program Security Flaws,” ACM Computing Surveys, Volume 26, Issue 3, pp. 211 – 254,
September 1994.
[RPK2001] Steven M. Rinaldi, James P. Peerenboom, and Terrence K. Kelly, “Identifying, Understanding,
and Analyzing Critical Infrastructure Interdependencies,” IEEE Control Systems Magazine, Volume 21,
Issue 6, pp. 11 – 25, December 2001.
[SHG2012] Siddharth Sridhar, Adam Hahn, and Manimaran Govindarasu, “Cyber-Physical System
Security for the Electric Power Grid,” Proceedings of the IEEE, Volume 100, Issue 1, pp. 210 – 224,
January 2012.
[YQS+2012] Ye Yan, Yi Qian, Hamid Sharif, and David Tipper, “A Survey on Cyber Security for Smart
Grid Communications,” IEEE Communications Surveys & Tutorials, Volume 14, Issue 4, pp. 998 – 1010,
4th Quarter 2012.
[GH2013] Brendan Galloway and Gerhard P. Hancke, “Introduction to Industrial Control Networks,” IEEE
Communications Surveys & Tutorials, Volume 15, Issue 2, pp. 860 – 880, 2nd Quarter 2013.
[M2005] Ann Miller, “Trends in Process Control Systems Security,” IEEE Security & Privacy Magazine,
Volume 3, Issue 5, pp. 57 – 60, September/October 2005.
[ILW2006] Vinay M. Igure, Sean A. Laughter, and Ronald D. Williams, “Security issues in SCADA
networks,” Computers & Security, Volume 25, Issue 7, pp. 498 – 506, October 2006.
[DKB2005] Djamel Djenouri, Lyes Khelladi, and Nadjib Badache, “A Survey of Security Issues in Mobile
Ad Hoc and Sensor Networks,” IEEE Communications Surveys & Tutorials, Volume 7, Issue 4, pp. 2 – 28,
4th Quarter 2005.
[SMM+2006] Minho Shin, Justin Ma, Arunesh Mishra, and William A. Arbaugh, “Wireless Network
Security and Interworking,” Proceedings of the IEEE, Volume 94, Issue 2, pp. 455 – 466, February 2006.
[KW2003] Chris Karlof and David Wagner, “Secure routing in wireless sensor networks: attacks and
countermeasures,” Ad Hoc Networks, Volume 1, Issues 72-3, pp. 293 – 315, September 2003.
[MZA+2013] Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Başar, and Jean-Pierre
Hubaux, “Game Theory Meets Network Security and Privacy,” ACM Computing Surveys, Volume 45,
Issue 3, pp. 1 – 39, June 2013.
Page 8
[LX2013] Xiannuan Liang and Yang Xiao, “Game Theory for Network Security,” IEEE Communications
Surveys & Tutorials, Volume 15, Issue 1, pp. 472 – 486, 1st Quarter 2013.
Potential Student Papers
Past Challenges
[JKR2002] Jaeyeon Jung, Balachander Krishnamurthy, and Michael Rabinovich, “Flash Crowds and
Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites,” in Proceedings of
the ACM WWW, Honolulu, HI, May 2002, pp. 293 – 304.
[SS2011] Aaron Schulman and Neil Spring, “Pingin' in the Rain,” in Proceedings of the ACM IMC, Berlin,
November 2011, pp. 19 – 25.
[COP+2004] James H. Cowie, Andy T. Ogielski, BJ Premore, Eric A. Smith, and Todd Underwood,
“Impact of the 2003 Blackouts on Internet Communications,” Renesys Corporation, March 2004.
[CPB+2011] Kenjiro Cho, Cristel Pelsser, Randy Bush, and Youngjoon Won, “The Japan Earthquake: the
impact on traffic and routing observed by a local ISP,” in Proceedings of the ACM SWID, Tokyo,
December 2011, Article No. 2.
[GJN2011] Phillipa Gill, Navendu Jain, and Nachiappan Nagappan, “Understanding Network Failures in
Data Centers: Measurement, Analysis, and Implications,” in Proceedings of the ACM SIGCOMM, Toronto,
ON, August 2011, pp. 350 – 361.
[HDB+2014] Herodotos Herodotou, Bolin Ding, Shobana Balakrishnan, Geoff Outhred, and Percy Fitter,
“Scalable Near Real-Time Failure Localization of Data Center Networks,” in Proceedings of the ACM
KDD, New York, NY, August 2014, pp. 1689 – 1698.
[LGA+2013] Joshua B. Leners, Trinabh Gupta, Marcos K. Aguilera, and Michael Walfish, “Improving
availability in distributed systems with failure informers,” in Proceedings of the USENIX NSDI, Lombard,
IL, April 2013, pp. 427 – 441.
[KWC+2009] Alexis Kwasinski, Wayne W. Weaver, Patrick L. Chapman, and Philip T. Krein,
“Telecommunications Power Plant Damage Assessment for Hurricane Katrina–Site Survey and Follow-Up
Results,” IEEE Systems Journal, Volume 3, Issue 3, pp. 277 – 287, September 2009.
[SPW2002] Stuart Staniford, Vern Paxson, and Nicholas Weaver, “How to Own the Internet in Your Spare
Time,” in Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, August 2002, pp. 149
– 167.
[FAA+2011] Kensuke Fukuda, Michihiro Aoki, Shunji Abe, Yuseng Ji, Michihiro Koibuchi, Motonori
Nakamura, Shigeki Yamada, and Shigeo Urushidani, “Impact of Tōhoku Earthquake on R&E Network in
Japan,” in Proceedings of the ACM SWID, Tokyo, December 2011, Article No. 1.
[BPV2014] Siddharth Bafna, Avichal Pandey, and Kshitiz Verma, “Anatomy of the Internet Peering
Disputes,” arXiv:1409.6526, September 2014.
[MWA2002] “Understanding BGP Misconfiguration,”
[DSA+2014] “Analysis of Country-wide Internet Outages Caused by Censorship,”
Page 9
[R2011] “Considerations and Suggestions on Improvement of Communication Network Disaster
Countermeasures after the Wenchuan Earthquake,”
Performance Evaluation
[BS2015] “A Survey on Internet Performance Measurement Platforms and Related Standardization
Efforts,”
[HTD+2013] “Disaster survivability in optical communication networks,”
Graph Algorithms
[HSM2012] Brandon Heller, Rob Sherwood, and Nick McKeown, “The Controller Placement Problem,” in
Proceedings of the ACM HotSDN, Helsinki, August 2012, pp. 7 – 12.
[TKI+2015] Stojan Trajanovski, Fernando A. Kuipers, Aleksandar Ilić, Jon Crowcroft, and Piet Van
Mieghem, “Finding Critical Regions and Region-Disjoint Paths in a Network,” IEEE/ACM Transactions on
Networking, Volume 23, Issue 3, pp. 908 – 921, June 2015.
[FDH+2015] “Disaster-aware datacenter placement and dynamic content management in cloud networks,”
[HSH+2015] “Optimal design of resilient virtual networks,”
[DAL+2005] “The 'robust yet fragile' nature of the Internet,”
Security
[SK2011] S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud
computing,” Journal of Network and Computer Applications, Volume 34, Issue 1, pp. 1 – 11, January 2011.
[ZCX+2015] Jun Zhang, Xiao Chen, Yang Xiang, Wanlei Zhou, and Jie Wu, “Robust Network Traffic
Classification,” IEEE/ACM Transactions on Networking, Volume 23, Issue 4, pp. 1257 – 1270, August
2015.
[GAL+2015] Fida Gillani, Ehab Al-Shaer, Samantha Lo, Qi Duan, Mostafa Ammar, and Ellen Zegura,
“Agile Virtualized Infrastructure to Proactively Defend Against Cyber Attacks,” in Proceedings of the
IEEE INFOCOM, Kowloon, May 2015, pp. 729 – 737.
[ZL2012] Dimitris Zissis and Dimitrios Lekkas, “Addressing cloud computing security issues,” Future
Generation Computer Systems, Volume 28, Issue 3, pp. 583 – 592, March 2012.
[WZL+2015] Bing Wang, Yao Zheng, Wenjing Lou, and Y. Thomas Hou, “DDoS attack protection in the
era of cloud computing and Software-Defined Networking,” Computer Networks, Volume 81, pp. 308 –
319, April 2015.
[GKS+2015] Dan Gonzales, Jeremy Kaplan, Evan Saltzman, Zev Winkelman, and Dulani Woods, “Cloud-
Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds,” IEEE Transactions on
Cloud Computing, March 2015.
[RZL2013] Rodrigo Roman, Jianying Zhou, and Javier Lopez, “On the features and challenges of security
and privacy in distributed internet of things,” Computer Networks, Volume 57, Issue 10, pp. 2266 – 2279,
July 2013.
Page 10
[WXW2015] “Whispers in the Hyper-Space: High-Bandwidth and Reliable Covert Channel Attacks Inside
the Cloud,”
[MSM2014] “Traffic anomaly diagnosis in Internet backbone networks: A survey,”
[S2015] Sandra Scott-Hayward, “Design and deployment of secure, robust, and resilient SDN Controllers,”
in Proceedings of the 1st IEEE Conference on Network Softwarization (NetSoft), London, April 2015, pp. 1
– 5.
[MJS2002] Srinivas Mukkamala, Guadalupe Janoski, and Andrew H. Sung, “Intrusion Detection Using
Neural Networks and Support Vector Machines,” in Proceedings of the International Joint Conference on
Neural Networks (IJCNN), Honolulu, HI, May 2002, pp. 1702 – 1707.
[MSA2005] Srinivas Mukkamala, Andrew H. Sung, and Ajith Abraham, “Intrusion detection using an
ensemble of intelligent paradigms,” Journal of Network and Computer Applications, Volume 28, Issue 2,
pp. 167 – 182, April 2005.
Critical Infrastructures
[O2014] Min Ouyang, “Review on modeling and simulation of interdependent critical infrastructure
systems,” Reliability Engineering and System Safety, Volume 121, pp. 43 – 60, January 2014.
[MWA+2014] Milos Manic, Dumidu Wijayasekara, Kasun Amarasinghe, Joel Hewlett, Kevin Handy,
Christopher Becker, Bruce Patterson, and Robert Peterson, “Next Generation Emergency Communication
Systems via Software Defined Networks,” in Proceedings of the Third GENI Research and Educational
Experiment Workshop (GREE), Atlanta, GA, March 2014, pp. 1 – 8.
Control System Security
[TLM2008] “Vulnerability Assessment of Cybersecurity for SCADA Systems,”
[CDV2013] “Review of Security Issues in Industrial Networks,”
Smart Grid
[FB2014] Sören Finster and Ingmar Baumgart, “Privacy-Aware Smart Metering: A Survey,” IEEE
Communications Surveys & Tutorials, Volume 16, Issue 3, pp. 1732 – 1745, 3rd Quarter 2014.
[BVL+2015] Joonsang Baek, Quang Hieu Vu, Joseph K. Liu, Xinyi Huang, and Yang Xiang, “A Secure
Cloud Computing Based Framework for Big Data Information Management of Smart Grid,” IEEE
Transactions on Cloud Computing, Volume 3, Issue 2, pp. 233 – 244, 2015.
Wireless
[GMS2015] Jorge Granjal, Edmundo Monteiro, and Jorge Sá Silva, “Security for the Internet of Things: A
Survey of Existing Protocols and Open Research Issues,” IEEE Communications Surveys & Tutorials,
Volume 17, Issue 3, pp. 1294 – 1312, 3rd Quarter 2015.
[ATO2015] Chaitrali Amrutkar, Patrick Traynor, and Paul C. van Oorschot, “An Empirical Evaluation of
Security Indicators in Mobile Web Browsers,” IEEE Transactions on Mobile Computing, Volume 14, Issue
5, pp. 889 – 903, May 2015.
Page 11
[SRG+2015] S. Sicari, A. Rizzardi, L.A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in
Internet of Things: The road ahead,” Computer Networks, Volume 76, pp. 146 – 164, January 2015.
Game Theory
[CYX+2015] Jing Chen, Quan Yuan, Guoliang Xue, and Ruiying Du, “Game-theory-based batch
identification of invalid signatures in wireless mobile networks,” in Proceedings of the IEEE INFOCOM,
Kowloon, May 2015, pp. 262 – 270.
[MMO2015] “Formation Games of Reliable Networks,”
[ZKS+2014] “RRE: A Game-Theoretic Intrusion Response and Recovery Engine,”
Page 12
Course Policies
These policies are subject to change and students will be notified of any changes.
Correspondence
Don't hesitate contacting me outside of the office hours, but first confirm my availability via e-mail.
Subject line of all e-mails regarding this class must start with: CPE6510 - followed by a meaningful
indicator of the content. Otherwise, e-mails can be misfiltered and not read (faculty members receive many
e-mails daily). If you don't hear from me within 48 hours, please resend the e-mail. I expect students will
check their e-mails regularly for any announcements. We will primarily utilize the course website and
(maybe) Canvas during this class. I will utilize S&Tconnect for potential performance issues. You can also
instant message me via Skype, but do not call on Skype before confirming my availability. The course
Facebook page will be utilized to share news, interesting facts, discussions etc.
Attendance
On-campus students are expected to attend all classes. Students enrolled in the distance education section
of the course are encouraged to participate in the live class, but are welcome to watch the archived lectures
instead. Note that 5% of the course grade is constituted by student participation activities such as in-class
interactions. Attendance to the midterm exam, which will be administered during the class time (Midterm
Exam: 9 March 2017), and in-class project presentations (4 May 2017) are mandatory. Distance students
will be required to take the exam with a webcam and headset or by an approved proctor during the normal
class time. There will not be make-up options for these unless prior arrangements are made, or in the event
of emergencies and sudden illness (which must be documented by the student). If you are in a state of
contagious illness (e.g. Flu, Ebola), don't come to the class but notify me ahead of time. Flu shots are
recommended for everyone. Distance students will be required to present their presentations with a webcam
and headset during normal class time (preferred) or a previously recorded presentation if unable to present
live (check for recording a presentation in PowerPoint by VCC).
Classroom Courtesy
We will physically meet in the Library G14 and the lectures will be webcast as well as archived. Students
are expected to be prompt to the class. Due to interference with the recording system, I will ask everyone
to turn off their cellphones (not even silence or vibrate!). Please avoid typing or eating snacks near the
microphones as it creates annoying noise to others.
Assignments
Assignments are due on the due date at 11:59 pm. Unless prior arrangements are made, late assignments
are not accepted. Assignments must be sent either in pdf as an attachment or plaintext e-mail format.
Readings
Students are expected to read all required readings before the corresponding lecture. While most paper
readings are hyperlinked to a version that is available on the author's webpage, some are not; however, all
papers are available via the library. Alternatively, once you VPN into the campus network, papers are
accessible from the course webpage.
Page 13
Presentations
Students are expected to give 2-3 presentation(s) in the corresponding class throughout the semester based
on a scholarly paper. Each presentation is expected to last ~25 min. Student initials are marked (e.g. JM1
Joe Miner1) in the schedule. You will be required to search for a paper/topic and send at least three options
one week prior to your presentation. Presentations must be sent 48 hours in advance so I can provide
feedback to you. You can use the presentation guidelines found in this template. Presentations will be
evaluated based on the following scoring rubric (thanks to Vicki Hopgood for the rubric). Distance students
should check how to record ppt presentation video.
Computer Labs
The Linux desktops are located in EECH 107 & CS 213 and you can SSH into these machines using VPN.
The Windows PCs are located in EECH 105 & 106. I expect that students will use the computing resources
according to the MST IT Policy. If you need resources for any intrusive testing or programming, contact
me first. If you have computer-related problems, contact IT Help Desk.
Collaborative Software Support
For WebEx problems, contact Video Communications Center (VCC). For Canvas problems, contact
Educational Technology (EdTech).
Title IX
Missouri University of Science and Technology is committed to the safety and well-being of all members
of its community. US Federal Law Title IX states that no member of the university community shall, on the
basis of sex, be excluded from participation in, or be denied benefits of, or be subjected to discrimination
under any education program or activity. Furthermore, in accordance with Title IX guidelines from the US
Office of Civil Rights, Missouri S&T requires that all faculty and staff members report, to the Missouri
S&T Title IX Coordinator, any notice of sexual harassment, abuse, and/or violence (including personal
relational abuse, relational/domestic violence, and stalking) disclosed through communication including but
not limited to direct conversation, email, social media, classroom papers and homework exercises. Missouri
S&T's Title IX Coordinator is Vice Chancellor Shenethia Manuel. Contact her directly ([email protected] ;
(573) 341-4920; 113 Centennial Hall) to report Title IX violations. To learn more about Title IX resources
and reporting options (confidential and non-confidential) available to Missouri S&T students, staff, and
faculty, please visit http://titleix.mst.edu.
Disability Support
If you have a documented disability and anticipate needing accommodations in this course, you are
strongly encouraged to meet with me early in the semester. You will need to request that the Disability
Support Services staff send a letter to me verifying your disability and specifying the accommodation you
will need before I can arrange your accommodation.
Academic Integrity
Academic integrity is an essential part of your success at MST (and thereafter). Academic dishonesty such
as cheating, plagiarism, or sabotage is prohibited, and MST policy will be followed upon any instance of
these. Following are the guidelines:
Page 14
Homework
You can discuss homework with each other, but can not write up together. You can use the Web/books/papers/library for finding a solution
methodology, but do not search for a solution manual nor use an existing solution manual for your assignment.
Any student who copies or permits another student to copy will receive a 0 for the assignment, and the MST policy will be initiated.
Software
You can discuss code/pseudocode with each other, but can not write the software together unless it is a group project.
You can use software libraries available, but properly cite the source in your code as a comment.
Any student who copies or permits another student to copy will receive a 0 for the assignment, and the MST policy will be initiated.
Exams
You are expected to answer exam questions by yourself. No additional resources (e.g., programmable calculators, phones, cheat sheets, etc.) are allowed and cheating in the exams is forbidden.
Any student who copies or permits another student to copy will receive a 0 for the exam, and the MST policy will be initiated.
Project Report
You must not copy/paste your report from other resources. Proper citation is required for the work of others. I will utilize SafeAssign plagiarism detection software. Any student who plagiarizes will receive a 0 for the project, and the MST
policy will be initiated. Below are some links that can be useful for the writing part of any
submission: 1. MST Writing Center 2. Reference Sources and Literature Citation by James P.G. Sterbenz 3. Academic Integrity and Plagiarism by James P.G. Sterbenz 4. Writing Technical Articles by Henning Schulzrinne
Penalties vary from a warning up to expulsion from the university. Before your actions, I suggest you think
twice, and save us headache. When in doubt, don't hesitate to ask me!
Page 15
Grading
This course is intended for graduate level students. If you are not a graduate student or have not taken the
prerequisites for this class, talk to me as soon as possible. The grade for graduate students cannot be lower
than C.
Grading Scale
Percentile Letter Significance
90-100 A Excellent
80-89 B Superior
70-79 C Medium
00-69 F Failure
The weights of each component for the overall grade is as below:
Grading Weights
Weight Component
25% Midterm exam
20% Paper presentations
10% Homework and quizzes
40% Project
5% Participation
Important Notes:
There will not be a final exam in this class, thus the project is an important part of your grade. Midterm exam will cover topics from the beginning of the class to midterm exam, which will be
administered on 9 March 2017. Online students must have a webcam and a headset (microphone and speaker) [for proctoring].
Ability to print and scan (either scanner or high resolution camera) PDF documents is required for the exams. Skype, Google Hangout or other software that enables seeing each other might be required.
Exam will cover every topic we discuss in class (including student presentations). Each student is expected to present 2-3 papers throughout the semester. The in-class student
presentations will contribute 20% of the overall grade. Presentations will be evaluated based on the following scoring rubric (thanks to Vicki Hopgood for the rubric).
There will be homework assignments and quizzes to provide you and me with feedback of your understanding of the course topics.
Participation grades will be based on questions asked, interactions, leading discussions, finding the bugs in lecture notes and course website, recommendations for reading, etc. Distance students are encouraged to participate during live class sessions but will not be penalized if unable to. Participation for asynchronous distance students will rely on e-mail messages.
Employer reimbursement and immigration status cannot be a consideration in the final grade. Publishable projects are subject to extra credit.
Page 16
Feedback
Do not hesitate to contact me if you have opinions to improve the course. You don't have to wait until end
of semester.
Project Prospects
Students are expected to explore a topic of their choice that is relevant to the class in detail through the
project. Project teams will be formed of at most three students (generally two) per team. Distance students
will be assisted in forming teams and are encouraged to collaborate via Skype/Google Hangouts and work
together using services such as Dropbox. The project grade contributes a major portion of the final grade.
The overall project grade (extra credit will be given for publishable projects with my guidance) will depend
on:
Project Grading
Percentile Component
40% Novelty of ideas and results
40% Project report
20% Project presentation
Project reports must be sent only in pdf format. Final reports should be in total length of 10-15 pages. You
can use this MS-Word template or LaTeX template for project reports. Students must submit the
deliverables according to the following dates:
Due Dates for Project Deliverables
Due Date Deliverable
16 February 2017 Project title and group members
23 March 2017 Project report draft - title, abstract, outline
20 April 2017 Project report draft - solid draft with references
5 May 2017 Project presentations during class
11 May 2017 Project reports due
Last updated 13 January 2017 – Valid XHTML 1.1
©2014–2017 Egemen K. Çetinkaya <[email protected] >