Computer Network Measurement and Security

UCLA, Spring 2025

This graduate course covers foundational work and current topics in computer network measurement and security. The course consists of reading and discussing published research papers, presenting recent security work, and completing an original research project.

📌 Course Information

Discussion: M/W 2:00–3:50 PM. Boelter Hall 5420.
⚠️ This course is based on in-person discussion of research. On time, in-person attendance and participation is required.

Instructor: Liz Izhikevich. Office Hours: By appointment.

Prerequisites: This course is open to all graduate students as well as advanced undergraduate students. While the course has no official prerequisites, it requires a mature understanding of software systems and networks. It is required that all students who have not taken a computer networking course to watch all lecture videos from Stanford's Introduction to Networking Course (approximately 4.5 hours of content), before the first lecture.

Communication: We use Ed Discussion for announcements and discussion.

Submissions: All course assignments are to be submitted through Gradescope. Enrollment code: EVZN2Y.

🗓️ Tentative Topics and Schedule

The tentative schedule and required readings for the class are below:

3/31  Introduction to Internet Scanning

Lecture: Intro to Internet Security, Course Overview, Presentation Instructions, Presentation Schedule, How to Read a Paper ([1],[2], [3])
Reading (Due 4/2): LZR: Identifying Unexpected Internet Servivces

4/2  Internet Scanning Research

Lecture:Research Topics, Censys, Paper Discussion
Project (Due 4/7): Instructions, Group Sign-Ups

4/7  Internet Data Analysis [⚠️Virtual]

Lecture: Zoom Link on Ed, SQL (BigQuery) For Analysis, Research Group Meetings
Project (Due 4/9): Instructions

4/9   Predictive Internet Scanning

Lecture: Predictive Scanning, How to Give a Good Talk, Presentation Rubric, Research Group Meetings
Reading (Due 4/14): Predicting IPv4 Services Across All Ports
Project (Due 4/14): Write-Up

4/14  Abusing Internet Scanning

Lecture: Botnets, Paper Discussion, Student Presentation
Reading (Due 4/16): Understanding the Mirai Botnet

4/16  IPv6 Scanning

Lecture: IPv6, Paper Discussion, Student Presentation
Reading (Due 4/21): 6Sense: Internet-Wide IPv6 Scanning and its Security Applications
Project (Due 4/21): Write-Up

4/21  Cloud Storage Scanning

Lecture: Cloud Storage, Paper Discussion, Student Presentation
Reading (Due 4/23): Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild

4/23  Cloud Compute Scanning

Lecture: Group Meetings, Paper Discussion, Student Presentation
Reading (Due 4/28): Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds
Project (Due 4/28): Instructions, Presentation Sign-Ups

4/28  Measurement Paper Writing [⚠️Virtual]

Lecture: Tips for Empirical Paper Writing, Paper Discussion, Student Presentation

4/30  Mid-Point and GEO Satellites [⚠️Virtual]

Lecture: GEO Satellites, Mid-Point Presentations
Reading (Due 5/5): A Tale of Sea and Sky On the Security of Maritime VSAT Communications
Project (Due 5/5): Write-Up

5/5  LEO Satellites

Lecture: LEO Satellites, Paper Discussion, Student Presentation
Reading (Due 5/7): Democratizing LEO Satellite Network Measurements

5/7  Internet of Things

Lecture: IoT, Paper Discussion, Student Presentation
Reading (Due 5/12): All Things Considered: An Analysis of IoT Devices on Home Networks
Project (Due 5/12): Write-Up

5/12  Industrial Control Systems

Lecture: ICS, Paper Discussion, Student Presentation
Reading (Due 5/14): TBD

5/14  Machine Learning

Lecture: ML, Paper Discussion, Student Presentation
Reading (Due 5/19): Dos and Don'ts of Machine Learning in Computer Security
Project (Due 5/19): Write-Up

5/19  Large Language Models

Lecture: LLMs, Paper Discussion, Student Presentation
Reading (Due 5/21): TBD

5/21  Understanding Criminals

Lecture: Internet Criminals, Paper Discussion, Student Presentation
Reading (Due 5/28): To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild
Project (Due 5/28): Final Write-Up, Presentation Sign-Ups

5/26  Holiday

No class.

5/28  Project Wrap-Up

Lecture: Project Group Meetings, Paper Discussion, Student Presentation

6/2  Final Presentations

No required reading. Attendance mandatory.

6/4  Final Presentations

No required reading. Attendance mandatory.

🚩 Course Structure

This course is composed of three parts: reading and discussing foundational papers in every class, reading and presenting recent work for one class, and completing a group research project. Grading will be based on:

📚 Readings and Discussion (20%)

We will read and discuss 1 paper for each class, typically formative works in an area of networking and security. Students must come prepared to actively discuss assigned papers and make substantive intellectual contributions. This means thoroughly reading each paper ahead of time. Students must annotate the paper with margin notes—these can include questions, observations, or points needing clarification. There should be at least one margin note per paper section. At least one margin note should include a proposed discussion question. Before class, students will upload their annotated paper to Gradescope.

📨 Students should submit the reading assignments through Gradescope by 1:30 PM on the day of each class.

📣 Do not underestimate the time required to properly read and process a research paper. Expect to spend several hours preparing for each session.

🧑‍🏫 Topic Presentation (15%)

To explore how subfields have evolved, each student will present one recent paper relevant to the day's topic. Students will sign up for their preferred topic/date at the start of the quarter.

Students should select a paper published in the last three years from a top-tier venue in security (e.g., IEEE Security and Privacy, USENIX Security, ACM CCS), networking (NSDI, SIGCOMM, SIGMETRICS, IMC) or adjacent fields (e.g., CHI, ASPLOS, PLDI). Avoid low-tier venues, as such papers will not be accepted for presentation.

⚠️ Presentations must be 12–15 minutes long, with 5 minutes for questions. Presentations exceeding 15 minutes will be cut off, impacting grades. Be prepared to answer questions about the paper.

⚠️ Students must submit their selected paper for approval at least three days before their presentation.

🔬 Course Project (65%)

Students will complete a quarter-long original research project in groups of 1–4 students. Projects will culminate in a presentation and a 6–10 page report, similar to the papers read during the course.

Projects have four graded components:

  • Project Write-Ups (20%). Most weeks there will be a short write-up due that asks groups to submit their weekly progress, along with a specific section (e.g., draft of related works section).
  • Mid and Final Class Presentation (15%). Each group will give two presentations: one mid-quarter (5%) and one during the last week of the course (10%).
  • Final Paper (30%). Submit a 6–10 page report using the USENIX LaTeX template.

All written submissions must be in paragraph form, in English, and submitted as PDFs using LaTeX. Refer to Writing Technical Articles for guidance if you are new to academic research writing.

⚙️ Administrivia

Submit all reports via Gradescope by 1:30 PM on the day of each deadline.

The class presentation counts as the final exam.

All submitted work must be original work. Please speak to the instructor before using generative AI tools for assignments or projects (e.g., generating text).

🎓 Credits

Class structure and website layout design inspired by CS356 from Stanford University.