Jelena Mirkovic
CURRICULUM VITAE
USC Information Sciences Institute
4676 Admiralty Way ste 1001
Marina Del Rey, CA 90292
310-448-9170
E-mail: [email protected]
Homepage: http://www.isi.edu/~mirkovic
Appointments |
Project Leader
University of Southern California, Information Sciences Institute |
1/2013 - present |
Research Faculty
University of Southern California |
8/2010 - present |
Computer Scientist
University of Southern California, Information Sciences Institute |
8/2007 - 12/2012 |
Assistant Professor
Computer and Information Sciences Department, University of Delaware |
9/2003 - 8/2007 |
Research Assistant
Computer Science Department, University of California Los Angeles |
10/2000 - 8/2003 |
Lecturer
Center for Excellence in Engineering and Diversity,
University of California Los Angeles |
4/2000 |
Teaching Assistant
Computer Science Department, University of California Los Angeles |
10/1998 - 8/2000 |
Research Assistant
School of Electrical Engineering, University of Belgrade, Serbia |
9/1997 - 9/1998 |
Education |
University of California Los Angeles
Ph.D. in Computer Science (specializing in Network Security)
Thesis: D-WARD: Source-End DDoS Defense
Advisor: Prof. Peter Reiher
GPA: 3.84/4.00
|
9/2003 |
University of California Los Angeles
M.S. in Computer Science
GPA: 3.82/4.00
|
12/2000 |
School of Electrical Engineering, University of Belgrade,
Serbia
B.Sc. in Computer Science
GPA: 9.33/10.00
|
7/1998 |
Publications |
Books |
- John Wroclawski, Terry Benzel, Jim Blythe, Ted Faber,
Alefiya Hussain, Jelena Mirkovic and Stephen Schwab, Chapter on "DETERLab and DETER project" in The GENI Book,
Rick McGeer, Mark Berman, Chip Elliott and Robert Ricci,
Springer, 2016.
- Chapter on
"Collaborative DDoS Defenses" in Encyclopedia
of Cryptography and Security, 2nd Edition
Henk C.A. van Tilborg, Sushil Jajodia, Editors-in-Chief,
Springer, 2011.
-
Internet
Denial of Service: Attack and Defense Mechanisms
Jelena
Mirkovic, Sven Dietrich, David Dittrich and Peter Reiher, Prentice Hall
PTR, ISBN 0-13-147573-8, 2005.
|
Journals |
- Perspectives on the SolarWinds Incident
Sean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash and James Bret Michael
IEEE Security & Privacy, volume 19, number 2, pp 7-13, 2021. (editorial)
- Using
Episodic Memory for User Authentication
Simon S. Woo, Ron Artstein, Elsi Kaiser, Xiao Le and Jelena
Mirkovic,
ACM Transactions on Privacy and Security, vol 22, issue 2, April
2019.
- Handling
Anti-Virtual Machine Techniques in Malicious Software
H. Shi and J. Mirkovic,
ACM Transactions on Privacy and Security, vol 21, issue 1, 2018.
- Optimal application allocation on multiple public clouds
S. Woo and J. Mirkovic,
Elsevier Computer Networks, February 2014.
- Teaching Cybersecurity with DeterLab
J. Mirkovic and T. Benzel.
IEEE Security and Privacy Magazine, January/February 2012,
Vol. 10, No. 1, pp. 73-76. (invited paper).
- Comparative
Evaluation of Spoofing Defenses
J. Mirkovic and E. Kissel,
IEEE Transactions on Dependable and Secure Computing, March-April
2011, Vol. 8, No. 2, pp 218-232.
- Tools for worm experimentation on the DETER testbed
S.Wei, A. Hussain, J. Mirkovic and C. Ko,
International Journal of Communication Networks and Distributed
Systems (IJCNDS), 2010, Vol. 5, No. 1/2, pp. 151-171.
-
Accurately Measuring
Denial of Service in Simulation and Testbed Experiments
J. Mirkovic, A. Hussain, S. Fahmy, P. Reiher and R. Thomas,
IEEE Transactions on Dependable and Secure Computing, Vol. 6, No. 2, pp.
81-95,
April-June 2009.
-
Testing a Collaborative DDoS
Defense in a Red Team/Blue Team Exercise
J. Mirkovic, P. Reiher, C. Papadopoulos, A. Hussain,
M. Shepard, M. Berg and R. Jung,
IEEE Transactions on Computers, Vol. 57, No. 8, pp 1098-1112, August 2008.
-
Learning the valid incoming direction of IP packets
J. Li, J. Mirkovic, T. Ehrenkranz, M. Wang, P. Reiher and
L. Zhang,
Computer Networks, Vol. 52, No. 2, February 2008, pp 399-417.
-
D-WARD: A Source-End Defense Against
Flooding Denial-of-Service Attacks
J. Mirkovic and P. Reiher,
IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 3, July-September 2005, pp. 216-232.
|
Conferences and workshops |
- Samba: Identifying Inappropriate Videos for Young Children on YouTube
Le Binh, Rajat Tandon, Chingis Oinar, Jeffrey Liu, Uma Durairaj, Jiani Guo, Spencer Zahabizadeh, Sanjana Ilango, Jeremy Tang, Fred Morstatter, Simon Woo, and Jelena Mirkovic
Proceedings of the 31st ACM International Conference on Information & Knowledge Management (CIKM), 2022 (acceptance rate 274/1175 = 23.32%)
- Defending Root DNS Servers Against DDoS Using Layered Defenses
A S M Rizvi, Jelena Mirkovic, John Heidemann, Wesley Hardaker and Robert Story
Proceedings of IEEE COMSNETS, 2023. Best paper award
- Practical Intent-driven Routing Configuration Synthesis
Sivaramakrishnan Ramanathan, Ying Zhang, Mohab Gawish, Yogesh Mundada, Zhaodong Wang, Sangki Yun, Eric Lippert, Walid Taha, Minlan Yu and Jelena Mirkovic
Proceedings of NSDI, 2023. (acceptance rate 46/288=16%)
- Xatu: Boosting Existing DDoS Detection Systems Using Auxiliary Signals
Zhiying Xu, Sivaramakrishnan Ramanathan, Alexander Ruth, Jelena Mirkovic and Minlan Yu
Proceedings of CoNext, 2022. (acceptance rate 28/151=19%)
- AMON-SENSS: Scalable and Accurate Detection of Volumetric DDoS Attacks at ISPs
Rajat Tandon, Pithayuth Charnsethikul, Michalis Kallitsis and Jelena Mirkovic
Proceedings of Globecom, 2022.
- Toward Findable, Accessible, Interoperable, and Reusable Cybersecurity Artifacts
David Balenson, Terry Benzel, Eric Eide, David Emmerich, David Johnson, Jelena Mirkovic and Laura Tinnel
Proceedings of Cyber Security Experimentation and Test (CSET), 2022.
- Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables
Nicolaas Weideman, Haoda Wang, Tyler Kann, Spencer Zahabizadeh, Wei-Cheng Wu, Rajat Tandon, Jelena Mirkovic and Christophe Hauser
Proceedings of International Symposium on Research in Attacks, Intrusions, and Defenses
(RAID), 2022. (acceptance rate 53/216=25%)
- I know what you did on Venmo: Discovering privacy leaks in mobile social payments
Rajat Tandon, Pithayuth Charnsethikul, Ishank Arora, Dhiraj Murthy and Jelena Mirkovic
Proceedings of Privacy Enhancing Technologies Symposium (PETS), 2022. (acceptance rate 53/216=24%)
- Polymorphic Malware Behavior Through Network Trace Analysis
Xiyue Deng and Jelena Mirkovic
Proceedings of 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), 2022.
- User Experiences on Network Testbeds
Jelena Mirkovic and Portia Pusey
Proceedings of 14th Cyber Security Experimentation and Test (CSET), 2021.
- An Experimental Approach for Estimating Cyber Risk: a Proposal Building upon Cyber Ranges and Capture the Flags
Giorgio Di Tizio, Fabio Massacci, Luca Allodi, Stanislav Dashevsky and Jelena Mirkovic
Proceedings of IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2020.
- Malware Behavior Through Network Trace Analysis
Xiyue Deng and Jelena Mirkovic
Proceedings of International Networking Conference (INC), 2020.
- Quantifying Cloud Misbehavior
Rajat Tandon, Jelena Mirkovic, Pithayuth Charnsethikul
Proceedings of IEEE International Conference on Cloud Networking (CloudNet), 2020.
- Quantifying the Impact of Blocklisting in the Age of Address Reuse
Sivaramakrishnan Ramanathan, Anushah Hossain, Jelena Mirkovic, Minlan Yu, Sadia Afroz
Proceedings of Internet Measurement Conference (IMC), 2020.
(acceptance rate 53/216=24.5%)
- BLAG: Improving the Accuracy of Blacklists
Sivaramakrishnan Ramanathan, Jelena Mirkovic and Minlan Yu,
Proceedings of Network and Distributed System Security Symposium (NDSS), 2020.
(acceptance rate 88/506=17.4%)
- Using Terminal Histories to Monitor Student Progress on Hands-on Exercises
Jelena Mirkovic, Aashray Aggarwal, David Weinman, Paul Lepe, Jens Mache and Richard Weiss,
Proceedings of Special Interest Group on Computer Science Education Symposium (SIGCSE), 2020.
(acceptance rate 31.4%)
- Measuring Student Learning On
Network Testbeds
Paul Lepe, Aashray Aggarwal, Jelena Mirkovic, Jens Mache, Richard
Weiss and David Weinmann,
Proceedings of the Midscale Education and Research Infrastructure and
Tools (MERIT) Workshop, 2019.
- Defending Web Servers Against
Flash Crowd Attacks
Rajat Tandon, Abhinav Palia, Jaydeep Ramani, Brandon Paulsen,
Genevieve Bartlett and Jelena Mirkovic,
Proceedings of the Midscale Education and Research Infrastructure and
Tools (MERIT) Workshop, 2019.
- SENSS Against Volumetric DDoS Attacks
Sivaramakrishnan Ramanathan, Jelena Mirkovic, Minlan Yu and Ying Zhang
Proceedings of 2018 Annual Computer Security Applications
Conference (ACSAC), 2018. (acceptance rate 60/299=20.1%)
- DEW:
Distributed Experiment Workflows
Jelena Mirkovic, Genevieve Bartlett and James Blythe
Proceedings of the CSET 2018.
- Malware
Analysis through High-Level Behavior
Xiyue Deng and Jelena Mirkovic
Proceedings of the CSET 2018.
- GuidedPass: Helping Users to
Create Strong and Memorable Passwords
Simon S. Woo and Jelena Mirkovic
Proceedings of the 21st International Symposium on Research in
Attacks, Intrusions and Defenses (RAID), 2018. (acceptance rate 33/145=23%)
- Leveraging Semantic
Transformation to Investigate Password Habits and Their Causes
Ameya Hanamsagar, Simon S. Woo, Chris Kanich and Jelena Mirkovic
Proceedings of the ACM Conference on Human Factors in Computing
Systems (CHI), 2018. (acceptance rate 667/2657=25.1%)
- RESECT: Self-Learning Traffic
Filters for IP Spoofing Defense
Jelena Mirkovic, Erik Kline and Peter Reiher
Proceedings of 2017 Annual Computer Security Applications
Conference (ACSAC), 2017. (acceptance rate 48/244=19.7%)
- Commoner Privacy And A Study
On Network Traces
Xiyue Deng and Jelena Mirkovic
Proceedings of 2017 Annual Computer Security Applications
Conference (ACSAC), 2017. (acceptance rate 48/244=19.7%)
- Understanding Malware’s
Network Behaviors using Fantasm
Xiyue Deng, Hao Shi and Jelena Mirkovic
Proceedings of LASER Workshop, 2017.
- Do You See Me Now? Sparsity in
Passive Observations of Address Liveness
Jelena Mirkovic,Genevieve Bartlett, John Heidemann, Hao Shi and Xiyue Deng
Proceedings of Traffic Measurement and Analysis Conference (TMA), 2017.
- Hiding Debuggers from Malware
with Apate
Hao Shi, Jelena Mirkovic,
Proceedings of ACM SAC, 2017. (acceptance rate 8/51=16%)
- Enabling SDN
Experimentation in Network Testbeds
Sivaramakrishnan Ramanathan, Pravein Kannan, Chan Mun Choon, Jelena
Mirkovic, Keith Sklower,
Proceedings of ACM SDNNFV Security Workshop, 2017.
- Improving Recall and Security
of Passphrases through Use of Mnemonics
Simon Woo, Jelena Mirkovic,
Proceedings of Passwords Conference, 2016.
- Life-Experience Passwords (LEPs)
Simon Woo, Elsi Keiser, Ron Artstein, Jelena Mirkovic,
Proceedings of ACSAC, 2016 (acceptance rate 48/210=22.8%)
- Good Automatic Authentication
Question Generation
Simon Woo, Zuyao Li, Jelena Mirkovic,
Proceedings of International Natural Language Generation conference, 2016
- Engaging Novices in
Cybersecurity Competitions: A Vision and Lessons Learned at ACM
Tapia 2015
Jelena Mirkovic, Aimee Tabor, Simon Woo, Portia Pusey,
Proceedings of USENIX Summit on Gaming, Games and Gamification in
Security Education (3GSE), 2015.
- Expressing Different
Traffic Models
Using The LegoTG Framework
G. Bartlett and J. Mirkovic.
In Proceedings of the Workshop on
Computer and Networking Experimental Research using Testbeds
(CNERT), 2015 (Best Paper)
- Critter: Content-Rich
Traffic Trace Repository
V. Sharma, G. Bartlett and J. Mirkovic.
In Proceedings of Workshop on Information Sharing and Collaborative
Security (WISCS), 2014.
- Cardinal Pill Testing of System
Virtual Machines
H. Shi, A. Alwabel, and J. Mirkovic.
In Proceedings of the USENIX Security Symposium, 2014.
(acceptance rate ~67/350=19%)
- Class Capture-the-Flag Exercises
J. Mirkovic, P. A. H. Peterson.
In Proceedings of the USENIX Summit on Gaming, Games and
Gamification in Security Education 2014.
- Safe and Automated Live Malware
Experimentation on Public Testbeds
A. Alwabel, H. Shi, G. Bartlett, and J. Mirkovic.
In Proceedings of the 7th Workshop on Cyber Security Experimentation
and Test, 2014.
- Life-Experience
Passwords (LEPs)
S. Woo, J. Mirkovic, E. Kaiser and R. Artstein.
In Proceedings of the Who are you? Adventures in
Authentication Workshop 2014.
- Reducing Allocation
Errors in Network Testbeds
J. Mirkovic, H. Shi and A. Hussain.
In Proceedings of the Internet Measurement Conference (IMC) 2012.
(acceptance rate ~45/183=24.6%)
- Beyond
Disk Imaging for Preserving User State in Network Testbeds
J. Mirkovic, A. Alwabel and T. Faber.
In Proceedings of the Workshop on CyberSecurity Experimentation and
Test (CSET) 2012.
- A Semantic Framework for Data Analysis in Networked Systems
A. Viswanathan, A. Hussain, J. Wroclawski, S. Schwab and
J. Mirkovic.
In Proceedings of the Networked System Design and Implementation
(NSDI) 2011.
(acceptance rate ~27/157=17.2%)
-
Teaching
Security with Network Testbeds
J. Mirkovic, M. Ryan, J. Hickey, K. Sklower, P. Reiher,
P. A. H. Peterson, B. H. Kang, M. C. Chuah, D. Massey,
G. Ragusa.
In Proceedings of the ACM SIGCOMM Workshop on Education, 2011.
-
The DETER Project: Advancing the
Science of Cyber Security Experimentation and Test
J. Mirkovic, T. Benzel. S. Schwab, J. Wroclawski, T. Faber and B. Braden.
In Proceedings of the IEEE Homeland Security Technologies Conference
(IEEE HST), 2010.
-
RAD: Reflector Attack Defense Using Message
Authentication Codes
E. Kline, M. Beaumont-Gay, J. Mirkovic and P. Reiher.
In Proceedings of the Annual Computer Security Applications Conference
(ACSAC), 2009. (acceptance rate ~44/240=18.3%)
- Modeling Human Behavior for Defense
against Flash Crowd Attacks
G. Oikonomou and J. Mirkovic, Proceedings of the IEEE International
Conference on Communications (ICC), 2009.
-
Tools for Worm Experimentation on
the DETER testbed
S. Wei, C. Ko, J. Mirkovic and A. Hussain,
Proceedings of the IEEE Create-Net International Conference on
Testbeds and Research Infrastructures for the Development of Networks
and Communities (Tridentcom), 2009.
-
How to Test DDoS Defenses
J. Mirkovic, S. Fahmy, P. Reiher and R. Thomas,
Proceedings of the Cybersecurity Applications & Technology Conference
For Homeland Security (CATCH) 2009.
- Current Developments in DETER
Cybersecurity Testbed Technology
T. Benzel, B. Braden, T. Faber, J. Mirkovic,
S. Schwab, K. Sollins and J. Wroclawski,
Proceedings of the Cybersecurity Applications & Technology Conference
For Homeland Security (CATCH) 2009.
- Building Accountability into the Future
Internet
J. Mirkovic and P. Reiher, Proceedings of the IEEE ICNP Workshop on Secure
Network Protocols (NPSec), 2008.
-
Correcting Congestion-Based Error in
Network Telescope's Observations of Worm Dynamics
S. Wei and J. Mirkovic,
Proceedings of the IEEE
Internet Measurement Conference (IMC), 2008. (6-page paper,
overall acceptance rate 32/185=17%)
-
Privacy-Safe Network Trace
Sharing via Secure Queries
J. Mirkovic,
Proceedings of the ACM CCS Workshop on
Network Data Anonymization (NDA), 2008.
-
Managing the Health of Security
Experiments
J. Mirkovic, K. Sollins and J. Wroclawski,
Proceedings of the USENIX Cyber Security Experimentation and Test
Workshop (CSET), 2008.
-
Combining Speak-up with DefCOM for
Improved DDoS Defense
M. Mehta, K. Thapar, G. Oikonomou and J. Mirkovic,
Proceedings of the IEEE International Conference on Communications
(ICC), 2008.
- Fine-Grained Capabilities
for Flooding DDoS Defense Using Client Reputations
M. Natu and J. Mirkovic,
Proceedings of the ACM SIGCOMM Large-Scale Attack and Defense Workshop
(LSAD), 2007.
-
Automating DDoS
Experimentation
J. Mirkovic,
B. Wilson, A. Hussain, S. Fahmy, P. Reiher, R. Thomas and
S. Schwab, Proceedings of the USENIX DETER workshop, 2007
- Towards User-Centric Metrics for
Denial-Of-Service Measurement,
J. Mirkovic, A. Hussain, B. Wilson, S. Fahmy, P. Reiher, R. Thomas,
W. Yao and S. Schwab, Proceedings of the ACM FCRC Workshop on
Experimental Computer Science (ExpCS), 2007.
- DDoS Benchmarks and
Experimenter's Workbench for the DETER Testbed
J. Mirkovic, S. Wei, A. Hussain, B. Wilson, R. Thomas, S. Schwab,
S. Fahmy, R. Chertov and P. Reiher,
Proceedings of the IEEE Create-Net International Conference on
Testbeds and Research Infrastructures for the Development of Networks
and Communities (Tridentcom), 2007.
- Benchmarks for DDoS Defense
Evaluation
J. Mirkovic, E.Arikan, S. Wei, S. Fahmy, R. Thomas and P. Reiher,
Proceedings of the IEEE AFCEA
MILCOM 2006.
- Measuring
Denial-of-Service
J. Mirkovic, P. Reiher, S. Fahmy, R. Thomas, A. Hussain, S. Schwab and
C. Ko,
Proceedings of the ACM CCS Quality of Protection Workshop (QoP),
2006.
- A Framework for
Collaborative DDoS Defense
G. Oikonomou, J. Mirkovic, P. Reiher and M. Robinson,
Proceedings of the Annual Computer Security Applications Conference
(ACSAC), 2006. (acceptance rate 32/135=27%)
- Building Reputations for
Internet Clients
S. Wei and J. Mirkovic,
Proceedings of the ESORICS International Workshop on Security and
Trust Management (STM), 2006.
- A Realistic Simulation of
Internet-Scale Events
S. Wei and J. Mirkovic,
Proceedings of the the Create-Net International Conference on
Performance Evaluation Methodologies and Tools (VALUETOOLS),
2006.
- Profiling and
Clustering Internet Hosts
S. Wei, J. Mirkovic and E. Kissel,
Proceedings of the WORLDCOMP International Conference on Data Mining
(DMIN), June 2006.
- Distributed Worm
Simulation with a Realistic Internet Model
S. Wei, J. Mirkovic and M. Swany,
Proceedings of the ACM IEEE SCS Workshop on Principles of Advanced and
Distributed Simulation (PADS), 2005.
- Alliance
Formation for DDoS Defense
J. Mirkovic, M. Robinson, P. Reiher and G. Kuenning,
Proceedings of the ACM SIGSAC New Security
Paradigms Workshop (NSPW), 2003. (acceptance rate
13/43=30%)
- Challenges
of Source-End DDoS Defense
J. Mirkovic, G. Prier and P. Reiher,
Proceedings of the IEEE International
Symposium on Network Computing and Applications (NCA),
2003. (acceptance rate 40/155=26%)
- Attacking
DDoS at the Source
J. Mirkovic, G. Prier and P. Reiher,
Proceedings of the IEEE International Conference
on Network Protocols (ICNP), 2002. (acceptance rate
32/217=15%)
- Implementing
Address Assurance in the Intel IXP Router
M. Burns, G. Prier, J. Mirkovic, P. Reiher,
Proceedings of the Network Processors Conference (NPC), 2002.
- SAVE:
Source Address Validity Enforcement Protocol
J. Li, J. Mirkovic, M. Wang, P. Reiher and L. Zhang,
Proceedings of the IEEE INFOCOM, 2002. (acceptance rate
192/938=20.5%)
- A
Self-Organizing Approach to Data Forwarding In Large-Scale
Sensor Networks
J. Mirkovic, G.
P. Venkataramani, S. Lu and L. Zhang,
Proceedings of the IEEE International Conference on
Communications (ICC), 2001.
|
Other refereed publications |
- Software-Defined Security
Service
M. Yu, Y. Zhang, J. Mirkovic and A. Alwabel
Open Networking Summit, 2014.
- When Is Service
Really Denied? A User-Centric DoS Metric
J. Mirkovic,
A. Hussain, B. Wilson, S. Fahmy, W. Yao, P. Reiher, S. Schwab and
R. Thomas,
Poster paper at the ACM International Conference on Measurement and
Modeling of Computer Systems (SIGMETRICS), 2007.
- A Taxonomy of DDoS Attacks
and Defense Mechanisms
J. Mirkovic and
P. Reiher,
ACM SIGCOMM Computer Communications Review, Vol. 34, Num. 2, April
2004, pp. 39-54.
- Genetic
Search Based on Multiple Mutations
V. Milutinovic, D. Cvetkovic and J. Mirkovic,
IEEE Computer, pp. 118-119,
November 2000.
|
Tech reports / thesis / other |
- Designing for Fallible Humans
J. Mirkovic and S. S. Woo,
Proceedings of Humans and CyberSecurity Workshop (HACS), 2019.
Invited paper
-
Improving Testbed Experiment Design Through Shifting User Interface Emphasis,
G. Bartlett, J. Mirkovic and J. Blythe,
USC/ISI Technical
Report # ISI-TR-737, 2019.
-
LegoTG: Composable Traffic
Generation with a Custom Blueprint,
J. Mirkovic and G. Bartlett,
USC/ISI Technical
Report # ISI-TR-699, 2015.
-
DADL: Distributed Application Description Language,
J. Mirkovic, T. Faber. P. Hsieh, G. Malayandisamu,
R. Malavia,
USC/ISI Technical Report # ISI-TR-664, 2010.
- Comparative Evaluation of Spoofing
Defenses
E. Kissel and J. Mirkovic,
USC/ISI technical report number ISI-TR-655, January 2009.
-
A Two-Constraint Approach to Risky
Cybersecurity Experiment Management
J. Wroclawski, J. Mirkovic, T. Faber and S. Schwab,
Invited paper at the 2008 Sarnoff
Symposium.
- A Practical IP Spoofing
Defense Through Route-Based Filtering
J. Mirkovic, N. Jevtic and P. Reiher,
University of Delaware CIS Department Technical Report CIS-TR-2006-332.
- Distributed
Defense Against DDOS Attacks
J. Mirkovic, M. Robinson, P. Reiher and G. Oikonomou,
University of Delaware CIS Department
Technical Report CIS-TR-2005-02.
- A
Taxonomy of DDoS Attacks and DDoS Defense
Mechanisms
J. Mirkovic, J.
Martin and P. Reiher, UCLA CSD
Technical Report CSD-TR-020018.
- Source
Router Approach to DDoS Defense
J. Mirkovic, G. Prier and P. Reiher,
UCLA CSD Technical Report CSD-TR-010042.
- iSAVE:
Incrementally Deployable Source Address Validation
J. Mirkovic, Z.
Xu, J. Li, M. Schnaider, P. Reiher and L. Zhang,
UCLA CSD
Technical Report CSD-TR-020030.
- D-WARD:
Source-End Defense Against Distributed Denial-of-Service
Attacks
J. Mirkovic,
Ph.D. Thesis, UCLA, August 2003.
- SAVE:
Source Address Validity Enforcement Protocol
J. Li, J. Mirkovic, M. Wang, P. Reiher and L. Zhang, UCLA Technical
Report CSD-TR-010004.
|
|
Grants |
Active |
- Modernizing DeterLab education support and growing and diversifying education user base
AFRL DURIP
award number FA9550-22-1-0459
Lead PI: Jelena Mirkovic, USC/ISI
- Community Labeling and Sharing of Security and Networking Test datasets (CLASSNET)
NSF CCRI
award number 8115780
Lead PI: Jelena Mirkovic, USC/ISI
Co-PI: John Heidemann, USC/ISI
Co-PI: Wes Hardaker, USC/ISI
Co-PI: Michalis Kallitsis, Merit Network Inc.
- ENS: Modernizing and Streamlining DeterLab Testbed Experimentation
NSF CCRI
award number 2016643
Lead PI: Jelena Mirkovic, USC/ISI
Co-PI: Terry Benzel, USC/ISI
- REU Site: SURF-I: Safe, Usable, Resilient and Fair Internet
NSF REU
award number 2051101
Lead PI: Jelena Mirkovic, USC/ISI
Co-PI: Luis Garcia, USC/ISI
Co-PI: Fred Morstatter, USC/ISI
Co-PI: Rafael Ferreira da Silva, USC/ISI
- SEARCCH: Sharing Expertise and Artifacts for Reuse through a Cybersecurity Community Hub
NSF OCI
award number 1925564
Lead PI: Terry Benzel, USC/ISI
Co-PI: Jelena Mirkovic, USC/ISI
Co-PI: Eric Eide, University of Utah
Co-PI: David Balenson, SRI
Co-PI: Laura Tinnel, SRI
Co-PI: Tim Yardley, University of Illinois at Urbana-Champaign
- DETER Research Education and
Operations Mission Sustainment
NSF OCI
award number 1842703
Lead PI: T. Benzel, USC/ISI
Co-PI: J. Mirkovic, USC/ISI
Co-PI: E.Kline, USC/ISI
- Distributed Workflows for Cyberexperimentation
NSF OAC Software Institutes
award number 1835608
Lead PI: J. Mirkovic, USC/ISI
Co-PI: G. Bartlett, USC/ISI
Co-PI: J. Blythe, USC/ISI
- Hardening Systems Against Low-Rate
DDoS Attacks
NSF SaTC
award number 1815495
Lead PI: J. Mirkovic, USC/ISI
Co-PI: C. Hauser, USC/ISI
- DDoS Defense In Depth for DNS
NSF OCI CICI
award number 1739034
Lead PI: J. Heidemann, USC/ISI
Co-PI: J. Mirkovic, USC/ISI
Co-PI: W. Hardaker, USC/ISI
- REU Site: Human Communication in a Connected World
NSF CNS
award number 1659886
Lead PI: J. Mirkovic, USC/ISI
Co-PI: C. Hauser, USC/ISI
- Modeling Student Activity and
Learning on Cybersecurity Testbeds
NSF Cybercorps SFS
award number 1723717
Lead PI: J. Mirkovic USC/ISI
Co-PI: Richard Weiss, Evergreen College
Co-PI: Jens Mache, Lewis and Clarke College
-
SENSS: Security Service for the Internet
DHS DDoSD
award number D15PC00184
Lead PI: J. Mirkovic USC/ISI
Co-PI: M. Yu, Yale University
| Completed |
- Revitalizing Cyber Security
Education and Research through Competitions
NSF SaTC
award number 1224035
Lead PI: J. Mirkovic USC/ISI
Co-PI: Ronald Pike, CSU Pomona
-
FRADE: Model Human Behavior for Flash
cRowd Attack DEfense
NSF SaTC
award number 1319215
Lead PI: J. Mirkovic USC/ISI
-
[email protected]: Content-Rich Traffic Trace
Repository from Real-Time, Anonymous, User Contributions
NSF SaTC
award number 1224035
Lead PI: J. Mirkovic USC/ISI
-
Traffic modeling and generation
with custom fidelity for cyber security experimentation
NSF SDCI
award number 1127388
Lead PI: J. Mirkovic USC/ISI
-
Privacy-safe sharing of network data
via secure queries
NSF CNS Trusted Computing
award number 0914780
Lead PI: J. Mirkovic USC/ISI
-
Investigating Network Testbed Usage
NSF EAGER
award number 1049758
Lead PI: J. Mirkovic USC/ISI
-
Hands-on exercises on DETER testbed for
security education
NSF DUE Course, Curriculum and Laboratory Improvement (CCLI)
award number 0920719
Lead PI: J. Mirkovic, USC/ISI
Co-PI: P. Reiher, UCLA
Co-PI: D. Massey, Colorado State University
Co-PI: Mooi-Choo Chuah, Lehigh University
Co-PI: B. Hoon Kang, UNC Charlotte
-
Beyond Testbeds: Catalyzing Transformative Research and Education
through Cybersecurity Collaboratories (BTCT)
NSF CNS Cyber Trust
award number 0831491
Lead PI: J. Wroclawski, USC/ISI
Co-PI: J. Mirkovic, USC/ISI
- Enabling Routers to Detect and Filter
Spoofed Traffic
NSF CNS Cyber Trust
award number 0716452
Lead PI: J. Mirkovic, USC/ISI
Co-PI: P. Reiher, UCLA
- Transparent, Secure and Reliable Virtual Infrastructure Management
USC-InfoSys Center for Research and Education in Advanced Software
Technologies (CAST)
Lead PI: J. Mirkovic, USC/ISI
Co-PI: T. Faber, USC/ISI
- iSim - Simulator of Internet-scale
Events
NSF CNS Computing Research Infrastructure (CRI) - planning grant
award number: 0708774
Lead PI: J. Mirkovic, USC/ISI
- Benchmarks for DDoS Defense
Homeland Security Advanced Research Projects Agency
award number FA8750-05-2-0197
Lead PI: J. Mirkovic, USC/ISI
Co-PI: P. Reiher, UCLA
Co-PI: S. Fahmy, Purdue University
Co-PI: R. Thomas, SPARTA, Inc.
- DefCOM - Distributed Defense Against
DDoS Attacks
NSF CNS Cyber Trust
award number 0430228
Lead PI: J. Mirkovic, University of Delaware
Co-PI: P. Reiher, UCLA
- Securing DefCOM operation from inside and
outside threats
NSF Research Experiences for Undergraduates (REU) Supplement
award number 0430228
Lead PI: J. Mirkovic, University of Delaware
- Machine Learning for Worm Defense
University of Delaware Research Foundation
Lead PI: J. Mirkovic, University of Delaware
|
|
Program Committee Service |
- PC chair for PAM 2015, NPSec (Workshop on Secure Network Protocols) 2009,
CSET (Workshop on Cyber Security Experimentation and Test) 2008 and
2009.
- Local chair for PAM 2014.
- Track chair for ACM CCS 2021.
- TPC member USENIX Security 2023, IMC 2022, USENIX Security 2022, ACM CCS 2022, USENIX Security 2021, RAID 2021, IMC 2021, International Workshop on Traffic Measurement for Cybersecurity 2021, NDSS 2020, Euro S&P 2020, SOSR 2020, Usenix Security 2020, CoNext 2019, IMC 2019, DIMVA 2019, PAM 2019, Usenix Security 2019, RAID 2019, NDSS 2018, CSET 2017, ASE 2017, LASER 2017, CSET
2016, ASE 2016, Oakland S&P 2015, IMC 2014, PAM 2014, CANS 2013,
ACSAC 2012, IMC 2012, ICDCS 2011, Securecomm 2009, Global Internet
2008 and 2009, Chinacom 2009, IEEE Consumer Communications and
Networking Conference 2008, Applied Cryptography and Network
Security 2008, INFOCOM 2006, IWQoS (International Workshop on
Quality of Service) 2006, 2007 and 2008, ICCCN (IEEE International
Conference on Computer Communications and Networks) 2006, 2007 and
2008, WSPWN (International Workshop on Research Challenges in Mobile
and Wireless Networks Security and Privacy) 2006, NPSec (Workshop on
Secure Network Protocols) 2005, 2006, 2008 and 2013, WORIA
(International Workshop on Rapid Internet Attacks) 2005.
- Invited session chair for "Network Security" session at the
Sarnoff Symposium 2007 and 2008.
- Publicity chair for SIGCOMM 2007, NPSec (Workshop on Secure
Network Protocols) 2007.
|
Reviewer Service |
- NSF Cyber Trust, NeTS, CAREER and REU program panelist
- ACM CCR (Computer Communications Review), ACM Transactions
on Internet Technology, ACM Symposium on Applied Computing, ACM
Operating Systems Review, ACM Computing Surveys
- IEEE Transactions on Dependable and Secure Computing, IEEE
Transactions on Computers, IEEE Transactions on Dependable and Secure
Computing, IEEE Transactions on Parallel and Distributed Systems, IEEE
Transactions on Mobile Computing, IEEE Transactions on Cloud
Computing, IEEE Journal on Selected Areas in
Communications, IEEE Security and Privacy Magazine, IEEE Computer
Magazine, IEEE Communications Letters
- International Journal of Information Security
- Elsevier International Journal of Computer and
Telecommunications Networking, Elsevier Ad Hoc Networks Journal, Elsevier Computer Networks Journal
- EURASIP Journal on Advances in Signal Processing
- SpringerLink International Journal of Information Security
- The Handbook of Information Security, The Handbook of Computer Networks
- ETRI Journal
|