Epic Networks Lab
Epic Networks Lab
  • Видео 77
  • Просмотров 632 266
Firewalls and Intrusion Detection Systems (IDS) | Computer Networks Ep. 8.9 | Kurose & Ross
Answering the question: "How do firewalls and intrusion-detection systems work?" This video covers operational security for enterprise networks, in particular rule-based and flow-based packet filtering.
Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 9.
Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: gaia.cs.umass.edu/kurose_ross/ppt.htm
Background music: www.epidemicsound.com/referral/tuicuy/
Просмотров: 6 963

Видео

Securing 5G: Authentication & Key Exchange in Cellular | Computer Networks Ep. 8.8.2 | Kurose & Ross
Просмотров 2,5 тыс.3 года назад
Answering the question: "How does cell phone encryption work?" This video covers security in wireless and mobile networks, in particular authentication and key agreement for 4G and 5G in cellular networks. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 8.2. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: g...
Secure WiFi: WPA Auth & Key Exchange in 802.11 | Computer Networks Ep 8.8.1 | Kurose & Ross
Просмотров 2,1 тыс.3 года назад
Answering the question: "How does WiFi encryption work?" This video covers security in wireless and mobile networks, in particular authentication and key agreement for WPA2 and WPA3 in 802.11 Wireless LANs. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 8.1. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: ...
IPsec: How VPNs Work - Virtual Private Network Security | Computer Networks Ep. 8.7 | Kurose & Ross
Просмотров 3,2 тыс.3 года назад
Answering the question: "How do VPNs work?" This video covers network layer security, in particular IPsec encrypted tunnels, which are commonly used for virtual private networks. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 7. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: gaia.cs.umass.edu/kurose_ross/...
TLS: Securing the Transport Layer (How HTTPS Works) | Computer Networks Ep. 8.6 | Kurose & Ross
Просмотров 3,9 тыс.3 года назад
Answering the question: "How does TLS work?" This video covers transport layer security, which is how secure websites (HTTPS) work. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 6. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: gaia.cs.umass.edu/kurose_ross/ppt.htm Background music: www.epidemicsound.com...
Secure Email with PGP Encryption | Computer Networks Ep. 8.5 | Kurose & Ross
Просмотров 3,4 тыс.3 года назад
Answering the question: "How do we secure email?" and "What is PGP?" This video includes email encryption for confidentiality, as well as digital signing for authentication, message integrity, and non-repudiation. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 5. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available h...
Digital Signatures, Message Integrity, and Authentication | Computer Networks Ep 8.3 | Kurose & Ross
Просмотров 5 тыс.3 года назад
Answering the question: "What are digital signatures, and how do they assure message integrity?" This video includes message integrity, digital signatures, and endpoint authentication. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Sections 3 and 4. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: gaia.cs.umass.edu...
Principles of Cryptography | Computer Networks Ep. 8.2 | Kurose & Ross
Просмотров 5 тыс.3 года назад
Answering the question: "How do networks use cryptography to achieve security?" This video includes public key cryptography (PKI) as well as symmetric key cryptography. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 2. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: gaia.cs.umass.edu/kurose_ross/ppt.htm Ba...
What is Network Security? | Computer Networks Ep. 8.1 | Kurose & Ross
Просмотров 9 тыс.3 года назад
Answering the question: "What do we mean by the term network security?" This video introduces a new series on Network Security, which covers the topics from the 8th chapter of Kurose & Ross. Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 1. Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: gaia.cs.umass.edu/...
Datacenter TCP, Incast Problem & Partition-agg timing | Network Traffic Analysis Ep. 17 | CS4558
Просмотров 2,4 тыс.3 года назад
Discusses the SIGCOMM paper "Data center TCP (DCTCP)", by Mohammad Alizadeh, Albert Greenberg, David A. Maltz, Jitendra Padhye, Parveen Patel, Balaji Prabhakar, Sudipta Sengupta, and Murari Sridharan. 2010. In Proceedings of the ACM SIGCOMM 2010 conference (SIGCOMM '10). Association for Computing Machinery, New York, NY, USA, 63-74. doi.org/10.1145/1851275.1851192 tools.ietf.org/html/rfc8257 Ba...
BGP Hijacking - Detection and Prevention | Network Traffic Analysis Ep. 16 | CS4558
Просмотров 5 тыс.3 года назад
Discusses the SIGCOMM IMC paper "Detecting Prefix Hijackings in the Internet with Argus", by Xingang Shi, Yang Xiang, Zhiliang Wang, Xia Yin, and Jianping Wu. 2012. In Proceedings of the 2012 Internet Measurement Conference (IMC '12). Association for Computing Machinery, New York, NY, USA, 15-28. doi.org/10.1145/2398776.2398779 Background music: www.epidemicsound.com/referral/tuicuy/
Nation-State Internet Censorship View from the Network | Network Traffic Analysis Ep. 15 | CS4558
Просмотров 4733 года назад
Discusses the SIGCOMM IMC paper "Analysis of Country-wide Internet Outages Caused by Censorship", by Alberto Dainotti, Claudio Squarcella, Emile Aben, Kimberly C. Claffy, Marco Chiesa, Michele Russo, and Antonio Pescapé. 2011. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference (IMC '11). Association for Computing Machinery, New York, NY, USA, 1-18. doi.org/10.1...
Alias Resolution: Resolving IP router interface aliases | Network Traffic Analysis Ep. 14 | CS4558
Просмотров 8373 года назад
Discusses the ACM SIGCOMM CCR article "Internet-Scale IP Alias Resolution Techniques", by Ken Keys. 2010. In ACM SIGCOMM Computer Communication Review (CCR), vol. 40, no. 1, pp. 50 55, Jan 2010. doi.org/10.1145/1672308.1672318 Background music: www.epidemicsound.com/referral/tuicuy/
Yarrp: Traceroute to the whole Internet at once! | Network Traffic Analysis Ep. 13 | CS4558
Просмотров 5123 года назад
Discusses the network topology discovery tool Yarrp (Yelling at Random Routers Progressively), which was first introduced in the SIGCOMM IMC paper "Yarrp'ing the Internet: Randomized High-Speed Active Topology Discovery", by Robert Beverly. 2016. In Proceedings of the Sixteenth ACM SIGCOMM Internet Measurement (IMC 2016) Conference, Santa Monica, CA, November 2016, (pp. 413-420). doi.org/10.114...
What's wrong with Traceroute? How to fix it with Paris Traceroute! | Network Traffic Analysis Ep 12
Просмотров 1,4 тыс.3 года назад
Discusses the SIGCOMM IMC paper "Avoiding traceroute anomalies with Paris traceroute", by Brice Augustin, Xavier Cuvellier, Benjamin Orgogozo, Fabien Viger, Timur Friedman, Matthieu Latapy, Clémence Magnien, and Renata Teixeira. 2006. In Proceedings of the 6th ACM SIGCOMM conference on Internet measurement (IMC '06). Association for Computing Machinery, New York, NY, USA, 153-158. doi.org/10.11...
Hacking IPv6: Security and Attacks vs IPv4 | Network Traffic Analysis Ep. 11 | CS4558
Просмотров 1,8 тыс.3 года назад
Hacking IPv6: Security and Attacks vs IPv4 | Network Traffic Analysis Ep. 11 | CS4558
Measuring the Deployment of IPv6: Topology and Performance | Network Traffic Analysis Ep 10 | CS4558
Просмотров 3403 года назад
Measuring the Deployment of IPv6: Topology and Performance | Network Traffic Analysis Ep 10 | CS4558
Pingin' in the Rain: Weather effects on Broadband Outages | Network Traffic Analysis Ep. 09 | CS4558
Просмотров 1833 года назад
Pingin' in the Rain: Weather effects on Broadband Outages | Network Traffic Analysis Ep. 09 | CS4558
Cable vs. DSL ISPs: Broadband Internet Performance | Network Traffic Analysis Ep. 08 | CS4558
Просмотров 8423 года назад
Cable vs. DSL ISPs: Broadband Internet Performance | Network Traffic Analysis Ep. 08 | CS4558
Every microsecond counts: tracking fine-grain latency | Network Traffic Analysis Ep. 07 | CS4558
Просмотров 6423 года назад
Every microsecond counts: tracking fine-grain latency | Network Traffic Analysis Ep. 07 | CS4558
Monitoring Network Utilization with Zero Measurement Cost | Network Traffic Analysis Ep. 06 | CS4558
Просмотров 4803 года назад
Monitoring Network Utilization with Zero Measurement Cost | Network Traffic Analysis Ep. 06 | CS4558
A Minimalist Approach to Network Flow Monitoring | Network Traffic Analysis Ep. 05 | CS4558
Просмотров 9163 года назад
A Minimalist Approach to Network Flow Monitoring | Network Traffic Analysis Ep. 05 | CS4558
How does NetFlow (IPFIX) work? | Network Traffic Analysis Ep. 04 | CS4558
Просмотров 9 тыс.3 года назад
How does NetFlow (IPFIX) work? | Network Traffic Analysis Ep. 04 | CS4558
Redirecting DNS for Ads and Profit | Network Traffic Analysis Ep. 03 | CS4558
Просмотров 5313 года назад
Redirecting DNS for Ads and Profit | Network Traffic Analysis Ep. 03 | CS4558
Drafting Behind Akamai | Reusing CDN Network Measurements | Network Traffic Analysis Ep. 02 | CS4558
Просмотров 6623 года назад
Drafting Behind Akamai | Reusing CDN Network Measurements | Network Traffic Analysis Ep. 02 | CS4558
How do CDNs Work? All about Content Distribution Networks | Network Traffic Analysis Ep 01 | CS4558
Просмотров 3,3 тыс.3 года назад
How do CDNs Work? All about Content Distribution Networks | Network Traffic Analysis Ep 01 | CS4558
How Mobile IP Works - Wireless Networks | Computer Networks Ep. 7.5 | Kurose & Ross
Просмотров 10 тыс.4 года назад
How Mobile IP Works - Wireless Networks | Computer Networks Ep. 7.5 | Kurose & Ross
How Cellular 4G/5G Networks Work - Wireless Networks | Computer Networks Ep. 7.4 | Kurose & Ross
Просмотров 10 тыс.4 года назад
How Cellular 4G/5G Networks Work - Wireless Networks | Computer Networks Ep. 7.4 | Kurose & Ross
802.11 How WiFi Works - Wireless Networks | Computer Networks Ep. 7.3 | Kurose & Ross
Просмотров 16 тыс.4 года назад
802.11 How WiFi Works - Wireless Networks | Computer Networks Ep. 7.3 | Kurose & Ross
Wireless & Mobile Link Challenges - Wireless Networks | Computer Networks Ep. 7.1 | Kurose & Ross
Просмотров 15 тыс.4 года назад
Wireless & Mobile Link Challenges - Wireless Networks | Computer Networks Ep. 7.1 | Kurose & Ross