Networking and Security

Networking and Security group

Characterizing Enterprise Networks

While the global Internet have been extensively studied, the behavior of enterprise networks at the Internet's edge remains under-studied. One of the crucial reasons for this is a lack of apt tools that focus on protocols and technologies used within an enterprise, but not used across the global Internet (e.g., protocols that drive distributed file systems). As part of this project, researchers are developing tools to better analyze the traffic specific to these enterprise networks.

Evaluating Price Mechanisms for Clouds

Researchers are studying the problems that arise in cloud computing centers that use economic models to allocate resources. In these clouds, resources, such as storage, processing, and data transfer, must be allocated to different users. In economics-based clouds, artificial economies are set up; each resource is assigned a "price" and each user is given a "budget," which they spend on the resources they need.

University of Utah Investigating Bro Network Monitor Installation

June 26, 2012
University of Utah's Center for High Performance Computing is investigating how to integrate ICSI's Bro network security monitor into its new security architecture. A similar architecture using Bro and the OpenFlow switching specification was recently installed at Indiana University. Bro monitors network traffic at major universities, large research labs, supercomputing centers, and open–science communities around the country, and has been in use at the Lawrence Berkeley National Laboratory since the 1990s. Read more in this Ars Technica article.

New Research: Studying Twitter Spam’s Use in Political Censorship

Wednesday, May 9, 2012

spam tweets per minuteSpammers who posted almost half a million Twitter messages in order to silence debate over Russia’s election in December likely purchased fraudulent accounts in bulk and posted the tweets from botnets, groups of malware-infected computers under the command of a single person. According to Networking Group researchers, the campaign took advantage of an underground economy based on spam, a phenomenon that researchers are studying in an attempt to improve methods of eliminating spam.

CACM Features Networking Researcher Nicholas Weaver in Roundtable Discussion

February 1, 2012
The Communications of the ACM recently featured a roundtable discussion among Networking Group researcher Nicholas Weaver and other computer scientists about bufferbloat, the overuse of buffering inside a network, which can result in slow network connections.

Networking Researcher Vern Paxson Receives 2010-2011 Jim and Donna Gray Faculty Award

February 17, 2012
The 2010-2011 Jim and Donna Gray Faculty Award has been given to Networking Group researcher Vern Paxson, who leads security efforts at ICSI. The award is given each year to a UC Berkeley Computer Science faculty member for excellence in undergraduate teaching. Previous winners include Architecture Group leader Krste Asanović (2009-2010) and ICSI affiliate Dan Klein (2008-2009).

Networking Leader Scott Shenker Elected to National Academy of Engineers

February 16, 2012
Scott Shenker, leader of the Networking Group, has been elected as a member of the National Academy of Engineers, one of the highest distinctions accorded to engineers. Shenker was recognized for his contributions to Internet design and architecture. A professor at UC Berkeley, he is also a member of ICSI's Board of Trustees, a founding member of the ICSI Center for Internet Research, and a fellow of the ACM and the IEEE.

Sylvia Ratnasamy Receives Sloan Research Fellowship

February 15, 2012
ICSI external fellow Sylvia Ratnasamy has received a Sloan Research Fellowship. Ratnasamy, an assistant professor at UC Berkeley, works with ICSI's Networking Group. She is among 126 U.S. and Canadian researchers to receive the fellowship, which is given annually to young scientists and scholars.

GeoTube

Researchers are exposing the ways in which it is possible to aggregate public and seemingly innocuous information from different media and Web sites to attack the privacy of users. The project seeks to help users, particularly younger ones, understand the privacy implications of the information they share publicly on the Internet and to help them understand what control they can exercise over it.

Priv3 Featured on Lifehacker

September 27, 2011
Priv3, an extension for Firefox developed by Networking Group members that keeps social networking sites from tracking your movement on certain Web pages without your knowledge, has been featured on Lifehacker.com >>

Pages