Stefan Savage

Stefan Savage

Stefan Savage (born 1969) is an American computer science researcher, currently an Associate Professor in the Systems and Networking Group at the University of California San Diego. Savage is widely-cited in the areas of network worms and malware propagation, distributed denial of service (DDOS) mitigation and traceback, and wireless security. He received his Ph.D. from the University of Washington. [Citation
newspaper=The San Diego Union Tribune
title=People To Watch: Stefan Savage
year=2005
url=http://lazowska.cs.washington.edu/savage.htm
]

In 1999, Savage's research team published "TCP Congestion Control with a Misbehaving Receiver", which uncovered protocol flaws in the TCP protocol that carries most Internet traffic. By exploiting these flaws, Savage proposed means for attackers to evade congestion control, allowing attackers to monopolize crowded network connections that would otherwise be shared by multiple users. This was the first paper to address congestion control evasion as a vulnerability, rather than as a theoretical design implication. That same year, Savage published "Sting", a paper and software tool that presented a mechanism to abuse quirks in the TCP protocol to allow a single party to infer bidirectional packet loss, a valuable contribution to traffic measurement. [http://citeseer.ist.psu.edu/savage99tcp.html>] [ [http://citeseer.ist.psu.edu/savage99sting.html Sting: a TCP-based Network Measurement Tool - Savage (ResearchIndex) ] ]

In 2000, Savage's team published "Practical Network Support for IP Traceback", which proposed a simple stochastic extension to internet routers that would enable them to trace floods of traffic back to their origin. IP traceback is a major open networking research question, with significant implications towards DDOS mitigation: if IP traffic can be traced, Internet Service Providers can track down and halt DDOS floods. Savage later co-founded Asta Networks, which offered a product that addressed these problems. [ [http://citeseer.ist.psu.edu/savage00practical.html Practical Network Support for IP Traceback - Savage, Wetherall, Karlin, Anderson (ResearchIndex) ] ]

In 2001, Savage, with colleagues at UCSD and CAIDA, published "Inferring Internet Denial-of-Service Activity", which introduced the idea of the network telescope and provided major empirical results regarding DDOS attacks. [ [http://citeseer.ist.psu.edu/moore01inferring.html Inferring Internet Denial-of-Service Activity - Moore, Voelker, Savage (ResearchIndex) ] ] Follow-on work has provided insight into the spread of network worms, including Code Red II and Slammer. [ [http://www-cse.ucsd.edu/~savage/papers/IEEESP03.pdf Inside the slammer worm - Security & Privacy Magazine, IEEE ] ]

In 2003, John Bellardo and Savage published "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions", which introduced practical attacks on 802.11 wireless protocol flaws that would allow attackers to force legitimate clients off wireless networks. The paper is also a notable example of applied reverse engineering in an academic setting; Bellardo and Savage reverse engineered the Intersil wireless chipset, finding an undocumented diagnostic mode that allowed them to directly inject malicious wireless packets onto a network. [http://www.cs.ucsd.edu/~savage/papers/UsenixSec03.pdf]

In 2004, Savage and George Varghese led a research team that published "Automated Worm Fingerprinting", which introduced a novel hashing technique that allowed network operators to monitor network traffic and uncover data patterns that were "propagating", spreading across the network at an unusual rate. Propagating traffic is a strong indicator for network worm outbreaks, a key unsolved problem in network security. Varghese later co-founded Netsift to capitalize on this research; Cisco purchased Netsift in 2005. [ [http://citeseer.ist.psu.edu/singh04automated.html Automated Worm Fingerprinting - Singh (ResearchIndex) ] ]

External links

* [http://www.cs.ucsd.edu/~savage/ Stefan Savage's home page at UCSD]

References


Wikimedia Foundation. 2010.

Игры ⚽ Поможем сделать НИР

Look at other dictionaries:

  • SQL slammer (computer worm) — The SQL slammer worm is a computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic, starting at 05:30 UTC on January 25, 2003. It spread rapidly, infecting most of its 75,000… …   Wikipedia

  • George Varghese — is a Professor of Computer Science at the University of California San Diego where he leads the Internet Algorithms Lab and also works with the Center for Network Systems and the Center for Internet Epidemiology. He is the author of the textbook… …   Wikipedia

  • Email spam — An email box folder filled with spam messages. Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of spam that involves nearly identical messages sent to numerous recipients by email. Definitions of spam usually… …   Wikipedia

  • Keith Marzullo — is the inventor of Marzullo s algorithm, which is part of the basis of the Network Time Protocol and the Windows Time Service.Currently he is Professor and Chair, Department of Computer Science and Engineering at University of California, San… …   Wikipedia

  • IPv4 — Название: Internet Protocol version 4 Уровень (по модели OSI): Сетевой Семейство: TCP/IP Назначение протокола: Адресация Спецификация: RFC 791 Основные реализации (клиенты) …   Википедия

  • SQL Slammer — Computer security portal SQL Slammer is a computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic, starting at 05:30 UTC on January 25, 2003. It spread rapidly, infecting most of… …   Wikipedia

  • Return Oriented Programming — (ROP) ist eine Technik in Computer Schadprogrammen zur Ausnutzung einer Sicherheitslücke, bei der der Angreifer den Aufrufstack so manipuliert, dass nach dem nächsten Rücksprungbefehl indirekt ausgesuchter Maschinencode ausgeführt wird.[1][2]… …   Deutsch Wikipedia

  • literature — /lit euhr euh cheuhr, choor , li treuh /, n. 1. writings in which expression and form, in connection with ideas of permanent and universal interest, are characteristic or essential features, as poetry, novels, history, biography, and essays. 2.… …   Universalium

  • Liste der Biografien/Lan — Biografien: A B C D E F G H I J K L M N O P Q …   Deutsch Wikipedia

  • Liste de zoologistes — Attention, il n est pas d usage en zoologie d utiliser d abréviation pour les noms des auteurs (contrairement aux usages de la botanique, voir ici). Cette liste ne constitue pas une liste officielle. Nous attirons l attention du lecteur sur son… …   Wikipédia en Français

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”