Quick links: Appointments Education Publications Grants Program Committee Service Reviewer Service

Jelena Mirkovic
CURRICULUM VITAE

USC Information Sciences Institute
4676 Admiralty Way ste 1001
Marina Del Rey, CA 90292
310-448-9170
E-mail: sunshine@isi.edu
Homepage: http://www.isi.edu/~mirkovic

Appointments
Project Leader
University of Southern California, Information Sciences Institute
1/2013 - present
Research Faculty
University of Southern California
8/2010 - present
Computer Scientist
University of Southern California, Information Sciences Institute
8/2007 - 12/2012
Assistant Professor
Computer and Information Sciences Department, University of Delaware
9/2003 - 8/2007
Research Assistant
Computer Science Department, University of California Los Angeles
10/2000 - 8/2003
Lecturer
Center for Excellence in Engineering and Diversity, University of California Los Angeles
4/2000
Teaching Assistant
Computer Science Department, University of California Los Angeles
10/1998 - 8/2000
Research Assistant
School of Electrical Engineering, University of Belgrade, Serbia
9/1997 - 9/1998
Education
University of California Los Angeles
Ph.D. in Computer Science
(specializing in Network Security)
Thesis: D-WARD: Source-End DDoS Defense
Advisor: Prof. Peter Reiher
GPA: 3.84/4.00
9/2003
University of California Los Angeles
M.S. in Computer Science

GPA: 3.82/4.00
12/2000
School of Electrical Engineering, University of Belgrade, Serbia
B.Sc. in Computer Science

GPA: 9.33/10.00
7/1998
Publications
Books
  1. John Wroclawski, Terry Benzel, Jim Blythe, Ted Faber, Alefiya Hussain, Jelena Mirkovic and Stephen Schwab, Chapter on "DETERLab and DETER project" in The GENI Book,
    Rick McGeer, Mark Berman, Chip Elliott and Robert Ricci, Springer, 2016.
  2. Chapter on "Collaborative DDoS Defenses" in Encyclopedia of Cryptography and Security, 2nd Edition
    Henk C.A. van Tilborg, Sushil Jajodia, Editors-in-Chief,
    Springer, 2011.
  3. Internet Denial of Service: Attack and Defense Mechanisms
    Jelena Mirkovic, Sven Dietrich, David Dittrich and Peter Reiher,
    Prentice Hall PTR, ISBN 0-13-147573-8, 2005.
Journals
  1. Optimal application allocation on multiple public clouds
    S. Woo and J. Mirkovic,
    Elsevier Computer Networks, February 2014.
  2. Teaching Cybersecurity with DeterLab
    J. Mirkovic and T. Benzel.
    IEEE Security and Privacy Magazine, January/February 2012, Vol. 10, No. 1, pp. 73-76. (invited paper).
  3. Comparative Evaluation of Spoofing Defenses
    J. Mirkovic and E. Kissel,
    IEEE Transactions on Dependable and Secure Computing, March-April 2011, Vol. 8, No. 2, pp 218-232.
  4. Tools for worm experimentation on the DETER testbed
    S.Wei, A. Hussain, J. Mirkovic and C. Ko,
    International Journal of Communication Networks and Distributed Systems (IJCNDS), 2010, Vol. 5, No. 1/2, pp. 151-171.
  5. Accurately Measuring Denial of Service in Simulation and Testbed Experiments
    J. Mirkovic, A. Hussain, S. Fahmy, P. Reiher and R. Thomas,
    IEEE Transactions on Dependable and Secure Computing, Vol. 6, No. 2, pp. 81-95, April-June 2009.
  6. Testing a Collaborative DDoS Defense in a Red Team/Blue Team Exercise
    J. Mirkovic, P. Reiher, C. Papadopoulos, A. Hussain, M. Shepard, M. Berg and R. Jung,
    IEEE Transactions on Computers, Vol. 57, No. 8, pp 1098-1112, August 2008.
  7. Learning the valid incoming direction of IP packets
    J. Li, J. Mirkovic, T. Ehrenkranz, M. Wang, P. Reiher and L. Zhang,
    Computer Networks, Vol. 52, No. 2, February 2008, pp 399-417.
  8. D-WARD: A Source-End Defense Against Flooding Denial-of-Service Attacks
    J. Mirkovic and P. Reiher,
    IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 3, July-September 2005, pp. 216-232.
Conferences and workshops
  1. Do You See Me Now? Sparsity in Passive Observations of Address Liveness
    Jelena Mirkovic,Genevieve Bartlett, John Heidemann, Hao Shi and Xiyue Deng
    Proceedings of Traffic Measurement and Analysis Conference (TMA), 2017.
  2. Hiding Debuggers from Malware with Apate
    Hao Shi, Jelena Mirkovic,
    Proceedings of ACM SAC, 2017. (acceptance rate 16%)
  3. Enabling SDN Experimentation in Network Testbeds
    Sivaramakrishnan Ramanathan, Pravein Kannan, Chan Mun Choon, Jelena Mirkovic, Keith Sklower,
    Proceedings of ACM SDNNFV Security Workshop, 2017.
  4. Improving Recall and Security of Passphrases through Use of Mnemonics
    Simon Woo, Jelena Mirkovic,
    Proceedings of Passwords Conference, 2016.
  5. Life-Experience Passwords (LEPs)
    Simon Woo, Elsi Keiser, Ron Artstein, Jelena Mirkovic,
    Proceedings of ACSAC, 2016 (acceptance rate 22.8%)
  6. Good Automatic Authentication Question Generation
    Simon Woo, Zuyao Li, Jelena Mirkovic,
    Proceedings of International Natural Language Generation conference, 2016
  7. Engaging Novices in Cybersecurity Competitions: A Vision and Lessons Learned at ACM Tapia 2015
    Jelena Mirkovic, Aimee Tabor, Simon Woo, Portia Pusey,
    Proceedings of USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE), 2015.
  8. Expressing Different Traffic Models Using The LegoTG Framework
    G. Bartlett and J. Mirkovic.
    In Proceedings of the Workshop on Computer and Networking Experimental Research using Testbeds (CNERT), 2015 (Best Paper)
  9. Critter: Content-Rich Traffic Trace Repository
    V. Sharma, G. Bartlett and J. Mirkovic.
    In Proceedings of Workshop on Information Sharing and Collaborative Security (WISCS), 2014.
  10. Cardinal Pill Testing of System Virtual Machines
    H. Shi, A. Alwabel, and J. Mirkovic.
    In Proceedings of the USENIX Security Symposium, 2014.
    (acceptance rate ~67/350=19%)
  11. Class Capture-the-Flag Exercises
    J. Mirkovic, P. A. H. Peterson.
    In Proceedings of the USENIX Summit on Gaming, Games and Gamification in Security Education 2014.
  12. Safe and Automated Live Malware Experimentation on Public Testbeds
    A. Alwabel, H. Shi, G. Bartlett, and J. Mirkovic.
    In Proceedings of the 7th Workshop on Cyber Security Experimentation and Test, 2014.
  13. Life-Experience Passwords (LEPs)
    S. Woo, J. Mirkovic, E. Kaiser and R. Artstein.
    In Proceedings of the Who are you? Adventures in Authentication Workshop 2014.
  14. Reducing Allocation Errors in Network Testbeds
    J. Mirkovic, H. Shi and A. Hussain.
    In Proceedings of the Internet Measurement Conference (IMC) 2012.
    (acceptance rate ~45/183=24.6%)
  15. Beyond Disk Imaging for Preserving User State in Network Testbeds
    J. Mirkovic, A. Alwabel and T. Faber.
    In Proceedings of the Workshop on CyberSecurity Experimentation and Test (CSET) 2012.
  16. A Semantic Framework for Data Analysis in Networked Systems
    A. Viswanathan, A. Hussain, J. Wroclawski, S. Schwab and J. Mirkovic.
    In Proceedings of the Networked System Design and Implementation (NSDI) 2011.
    (acceptance rate ~27/157=17.2%)
  17. Teaching Security with Network Testbeds
    J. Mirkovic, M. Ryan, J. Hickey, K. Sklower, P. Reiher, P. A. H. Peterson, B. H. Kang, M. C. Chuah, D. Massey, G. Ragusa.
    In Proceedings of the ACM SIGCOMM Workshop on Education, 2011.
  18. The DETER Project: Advancing the Science of Cyber Security Experimentation and Test
    J. Mirkovic, T. Benzel. S. Schwab, J. Wroclawski, T. Faber and B. Braden.
    In Proceedings of the IEEE Homeland Security Technologies Conference (IEEE HST), 2010.
  19. RAD: Reflector Attack Defense Using Message Authentication Codes
    E. Kline, M. Beaumont-Gay, J. Mirkovic and P. Reiher.
    In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2009. (acceptance rate ~44/240=18.3%)
  20. Modeling Human Behavior for Defense against Flash Crowd Attacks
    G. Oikonomou and J. Mirkovic,
    Proceedings of the IEEE International Conference on Communications (ICC), 2009.
  21. Tools for Worm Experimentation on the DETER testbed
    S. Wei, C. Ko, J. Mirkovic and A. Hussain,
    Proceedings of the IEEE Create-Net International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (Tridentcom), 2009.
  22. How to Test DDoS Defenses
    J. Mirkovic, S. Fahmy, P. Reiher and R. Thomas,
    Proceedings of the Cybersecurity Applications & Technology Conference For Homeland Security (CATCH) 2009.
  23. Current Developments in DETER Cybersecurity Testbed Technology
    T. Benzel, B. Braden, T. Faber, J. Mirkovic, S. Schwab, K. Sollins and J. Wroclawski,
    Proceedings of the Cybersecurity Applications & Technology Conference For Homeland Security (CATCH) 2009.
  24. Building Accountability into the Future Internet
    J. Mirkovic and P. Reiher,
    Proceedings of the IEEE ICNP Workshop on Secure Network Protocols (NPSec), 2008.
  25. Correcting Congestion-Based Error in Network Telescope's Observations of Worm Dynamics
    S. Wei and J. Mirkovic,
    Proceedings of the IEEE Internet Measurement Conference (IMC), 2008. (6-page paper, overall acceptance rate 32/185=17%)
  26. Privacy-Safe Network Trace Sharing via Secure Queries
    J. Mirkovic,
    Proceedings of the ACM CCS Workshop on Network Data Anonymization (NDA), 2008.
  27. Managing the Health of Security Experiments
    J. Mirkovic, K. Sollins and J. Wroclawski,
    Proceedings of the USENIX Cyber Security Experimentation and Test Workshop (CSET), 2008.
  28. Combining Speak-up with DefCOM for Improved DDoS Defense
    M. Mehta, K. Thapar, G. Oikonomou and J. Mirkovic,
    Proceedings of the IEEE International Conference on Communications (ICC), 2008.
  29. Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations
    M. Natu and J. Mirkovic,
    Proceedings of the ACM SIGCOMM Large-Scale Attack and Defense Workshop (LSAD), 2007.
  30. Automating DDoS Experimentation
    J. Mirkovic, B. Wilson, A. Hussain, S. Fahmy, P. Reiher, R. Thomas and S. Schwab,
    Proceedings of the USENIX DETER workshop, 2007
  31. Towards User-Centric Metrics for Denial-Of-Service Measurement,
    J. Mirkovic, A. Hussain, B. Wilson, S. Fahmy, P. Reiher, R. Thomas, W. Yao and S. Schwab,
    Proceedings of the ACM FCRC Workshop on Experimental Computer Science (ExpCS), 2007.
  32. DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed
    J. Mirkovic, S. Wei, A. Hussain, B. Wilson, R. Thomas, S. Schwab, S. Fahmy, R. Chertov and P. Reiher,
    Proceedings of the IEEE Create-Net International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (Tridentcom), 2007.
  33. Benchmarks for DDoS Defense Evaluation
    J. Mirkovic, E.Arikan, S. Wei, S. Fahmy, R. Thomas and P. Reiher,
    Proceedings of the IEEE AFCEA MILCOM 2006.
  34. Measuring Denial-of-Service
    J. Mirkovic, P. Reiher, S. Fahmy, R. Thomas, A. Hussain, S. Schwab and C. Ko,
    Proceedings of the ACM CCS Quality of Protection Workshop (QoP), 2006.
  35. A Framework for Collaborative DDoS Defense
    G. Oikonomou, J. Mirkovic, P. Reiher and M. Robinson,
    Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2006. (acceptance rate 32/135=27%)
  36. Building Reputations for Internet Clients
    S. Wei and J. Mirkovic,
    Proceedings of the ESORICS International Workshop on Security and Trust Management (STM), 2006.
  37. A Realistic Simulation of Internet-Scale Events
    S. Wei and J. Mirkovic,
    Proceedings of the the Create-Net International Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS), 2006.
  38. Profiling and Clustering Internet Hosts
    S. Wei, J. Mirkovic and E. Kissel,
    Proceedings of the WORLDCOMP International Conference on Data Mining (DMIN), June 2006.
  39. Distributed Worm Simulation with a Realistic Internet Model
    S. Wei, J. Mirkovic and M. Swany,
    Proceedings of the ACM IEEE SCS Workshop on Principles of Advanced and Distributed Simulation (PADS), 2005.
  40. Alliance Formation for DDoS Defense
    J. Mirkovic, M. Robinson, P. Reiher and G. Kuenning,
    Proceedings of the ACM SIGSAC New Security Paradigms Workshop (NSPW), 2003. (acceptance rate 13/43=30%)
  41. Challenges of Source-End DDoS Defense
    J. Mirkovic, G. Prier and P. Reiher,
    Proceedings of the IEEE International Symposium on Network Computing and Applications (NCA), 2003. (acceptance rate 40/155=26%)
  42. Attacking DDoS at the Source
    J. Mirkovic, G. Prier and P. Reiher,
    Proceedings of the IEEE International Conference on Network Protocols (ICNP), 2002. (acceptance rate 32/217=15%)
  43. Implementing Address Assurance in the Intel IXP Router
    M. Burns, G. Prier, J. Mirkovic, P. Reiher,
    Proceedings of the Network Processors Conference (NPC), 2002.
  44. SAVE: Source Address Validity Enforcement Protocol
    J. Li, J. Mirkovic, M. Wang, P. Reiher and L. Zhang,
    Proceedings of the IEEE INFOCOM, 2002. (acceptance rate 192/938=20.5%)
  45. A Self-Organizing Approach to Data Forwarding In Large-Scale Sensor Networks
    J. Mirkovic, G. P. Venkataramani, S. Lu and L. Zhang,
    Proceedings of the IEEE International Conference on Communications (ICC), 2001.
Other refereed publications
  1. Software-Defined Security Service
    M. Yu, Y. Zhang, J. Mirkovic and A. Alwabel
    Open Networking Summit, 2014.
  2. When Is Service Really Denied? A User-Centric DoS Metric
    J. Mirkovic, A. Hussain, B. Wilson, S. Fahmy, W. Yao, P. Reiher, S. Schwab and R. Thomas,
    Poster paper at the ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS), 2007.
  3. A Taxonomy of DDoS Attacks and Defense Mechanisms
    J. Mirkovic and P. Reiher,
    ACM SIGCOMM Computer Communications Review, Vol. 34, Num. 2, April 2004, pp. 39-54.
  4. Genetic Search Based on Multiple Mutations
    V. Milutinovic, D. Cvetkovic and J. Mirkovic,
    IEEE Computer, pp. 118-119, November 2000.
Tech reports / thesis / other
  1. J. Mirkovic and G. Bartlett
    LegoTG: Composable Traffic Generation with a Custom Blueprint, USC/ISI Technical Report # ISI-TR-699, 2015.
  2. J. Mirkovic, T. Faber. P. Hsieh, G. Malayandisamu, R. Malavia
    DADL: Distributed Application Description Language,
    USC/ISI Technical Report # ISI-TR-664, 2010.
  3. Comparative Evaluation of Spoofing Defenses
    E. Kissel and J. Mirkovic,
    USC/ISI technical report number ISI-TR-655, January 2009.
  4. A Two-Constraint Approach to Risky Cybersecurity Experiment Management
    J. Wroclawski, J. Mirkovic, T. Faber and S. Schwab,
    Invited paper at the 2008 Sarnoff Symposium.
  5. A Practical IP Spoofing Defense Through Route-Based Filtering
    J. Mirkovic, N. Jevtic and P. Reiher,
    University of Delaware CIS Department Technical Report CIS-TR-2006-332.
  6. Distributed Defense Against DDOS Attacks
    J. Mirkovic, M. Robinson, P. Reiher and G. Oikonomou,
    University of Delaware CIS Department Technical Report CIS-TR-2005-02.
  7. A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms
    J. Mirkovic, J. Martin and P. Reiher,
    UCLA CSD Technical Report CSD-TR-020018.
  8. Source Router Approach to DDoS Defense
    J. Mirkovic, G. Prier and P. Reiher,
    UCLA CSD Technical Report CSD-TR-010042.
  9. iSAVE: Incrementally Deployable Source Address Validation
    J. Mirkovic, Z. Xu, J. Li, M. Schnaider, P. Reiher and L. Zhang,
    UCLA CSD Technical Report CSD-TR-020030.
  10. D-WARD: Source-End Defense Against Distributed Denial-of-Service Attacks
    J. Mirkovic,
    Ph.D. Thesis, UCLA, August 2003.
  11. SAVE: Source Address Validity Enforcement Protocol
    J. Li, J. Mirkovic, M. Wang, P. Reiher and L. Zhang,
    UCLA Technical Report CSD-TR-010004.
Grants
Active
  1. Revitalizing Cyber Security Education and Research through Competitions
    NSF SaTC
    award number 1224035
    Lead PI: J. Mirkovic USC/ISI
    Co-PI: Ronald Pike, CSU Pomona
  2. FRADE: Model Human Behavior for Flash cRowd Attack DEfense
    NSF SaTC
    award number 1319215
    Lead PI: J. Mirkovic USC/ISI
Completed
  1. Critter@home: Content-Rich Traffic Trace Repository from Real-Time, Anonymous, User Contributions
    NSF SaTC
    award number 1224035
    Lead PI: J. Mirkovic USC/ISI
  2. Traffic modeling and generation with custom fidelity for cyber security experimentation
    NSF SDCI
    award number 1127388
    Lead PI: J. Mirkovic USC/ISI
  3. Privacy-safe sharing of network data via secure queries
    NSF CNS Trusted Computing
    award number 0914780
    Lead PI: J. Mirkovic USC/ISI
  4. Investigating Network Testbed Usage
    NSF EAGER
    award number 1049758
    Lead PI: J. Mirkovic USC/ISI
  5. Hands-on exercises on DETER testbed for security education
    NSF DUE Course, Curriculum and Laboratory Improvement (CCLI)
    award number 0920719
    Lead PI: J. Mirkovic, USC/ISI
    Co-PI: P. Reiher, UCLA
    Co-PI: D. Massey, Colorado State University
    Co-PI: Mooi-Choo Chuah, Lehigh University
    Co-PI: B. Hoon Kang, UNC Charlotte
  6. Beyond Testbeds: Catalyzing Transformative Research and Education through Cybersecurity Collaboratories (BTCT)
    NSF CNS Cyber Trust
    award number 0831491
    Lead PI: J. Wroclawski, USC/ISI
    Co-PI: J. Mirkovic, USC/ISI
  7. Enabling Routers to Detect and Filter Spoofed Traffic
    NSF CNS Cyber Trust
    award number 0716452
    Lead PI: J. Mirkovic, USC/ISI
    Co-PI: P. Reiher, UCLA
  8. Transparent, Secure and Reliable Virtual Infrastructure Management
    USC-InfoSys Center for Research and Education in Advanced Software Technologies (CAST)
    Lead PI: J. Mirkovic, USC/ISI
    Co-PI: T. Faber, USC/ISI
  9. iSim - Simulator of Internet-scale Events
    NSF CNS Computing Research Infrastructure (CRI) - planning grant
    award number: 0708774
    Lead PI: J. Mirkovic, USC/ISI
  10. Benchmarks for DDoS Defense
    Homeland Security Advanced Research Projects Agency
    award number FA8750-05-2-0197
    Lead PI: J. Mirkovic, USC/ISI
    Co-PI: P. Reiher, UCLA
    Co-PI: S. Fahmy, Purdue University
    Co-PI: R. Thomas, SPARTA, Inc.
  11. DefCOM - Distributed Defense Against DDoS Attacks
    NSF CNS Cyber Trust
    award number 0430228
    Lead PI: J. Mirkovic, University of Delaware
    Co-PI: P. Reiher, UCLA
  12. Securing DefCOM operation from inside and outside threats
    NSF Research Experiences for Undergraduates (REU) Supplement
    award number 0430228
    Lead PI: J. Mirkovic, University of Delaware
  13. Machine Learning for Worm Defense
    University of Delaware Research Foundation
    Lead PI: J. Mirkovic, University of Delaware
Program Committee Service
  • PC chair for PAM 2015, NPSec (Workshop on Secure Network Protocols) 2009, CSET (Workshop on Cyber Security Experimentation and Test) 2008 and 2009.
  • Local chair for PAM 2014.
  • TPC member for Oakland S&P 2015, IMC 2014, PAM 2014, CANS 2013, IMC 2012, ICDCS 2011, Securecomm 2009, Global Internet 2008 and 2009, Chinacom 2009, IEEE Consumer Communications and Networking Conference 2008, Applied Cryptography and Network Security 2008, INFOCOM 2006, IWQoS (International Workshop on Quality of Service) 2006, 2007 and 2008, ICCCN (IEEE International Conference on Computer Communications and Networks) 2006, 2007 and 2008, WSPWN (International Workshop on Research Challenges in Mobile and Wireless Networks Security and Privacy) 2006, NPSec (Workshop on Secure Network Protocols) 2005, 2006, 2008 and 2013, WORIA (International Workshop on Rapid Internet Attacks) 2005.
  • Invited session chair for "Network Security" session at the Sarnoff Symposium 2007 and 2008.
  • Publicity chair for SIGCOMM 2007, NPSec (Workshop on Secure Network Protocols) 2007.
Reviewer Service
  • NSF Cyber Trust, NeTS, CAREER and REU program panelist
  • ACM CCR (Computer Communications Review), ACM Transactions on Internet Technology, ACM Symposium on Applied Computing, ACM Operating Systems Review
  • IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Computers, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Parallel and Distributed Systems, IEEE Transactions on Mobile Computing, IEEE Transactions on Cloud Computing, IEEE Journal on Selected Areas in Communications, IEEE Security and Privacy Magazine, IEEE Computer Magazine, IEEE Communications Letters
  • International Journal of Information Security
  • Elsevier International Journal of Computer and Telecommunications Networking, Elsevier Ad Hoc Networks Journal, Elsevier Computer Networks Journal
  • EURASIP Journal on Advances in Signal Processing
  • SpringerLink International Journal of Information Security
  • The Handbook of Information Security, The Handbook of Computer Networks
  • ETRI Journal