Resilient Networks. 00. Preliminaries. Who is who. Organizational Issues. P2P, TK What do we do. Exercise course Rough time line Examination

Size: px
Start display at page:

Download "Resilient Networks. 00. Preliminaries. Who is who. Organizational Issues. P2P, TK What do we do. Exercise course Rough time line Examination"

Transcription

1 Resilient Networks 00. Preliminaries Who is who P2P, TK What do we do Organizational Issues Exercise course Rough time line Examination Fachbereich Informatik P2P Group and Telecooperation Group Thorsten Strufe and Mathias Fischer 1

2 Who is Who Prof. Dr. Thorsten Strufe Dr. Mathias Fischer Teaching Assistants We have none, you re depending on us alone :-) Questions? Feel free to contact any of the PhD students of TK-SSI or P2P Consultation Just drop us an , ask any PhD student, pass by our offices Fachbereich Informatik P2P Group and Telecooperation Group Thorsten Strufe and Mathias Fischer 2

3 What do we do? P2P Group Decentralized dist. systems (P2P) & online social networks (OSN)! P2P P2P extremely robust, resilient, and very efficient, so How can we learn from BitTorrent and Skype to make other systems better? Hence: understand the secrets behind P2P and apply them to other domains OSN Predominant service on the Internet today (fb has more hits than google) Used by entire population (even my dad at >70y! ;-) ) how do people use them? (make them better!) Extreme privacy threat Current research projects: QuaP2P (resilient p2p cloud), Safebook, Social P2P-IPTV Fachbereich Informatik P2P Group and Telecooperation Group Thorsten Strufe and Mathias Fischer 3

4 What do we do? Telecooperation Group Secure Smart Infrastructures Secure and resilient services Secure group communication Monitoring and intrusion detection Botnet resilience and detection Resilience in cyber physical systems Fachbereich Informatik P2P Group and Telecooperation Group Thorsten Strufe and Mathias Fischer 4

5 Course Schedule Lecture Tuesdays 11:40 am 1:20 pm Exercise course Thursdays 11:40 am 1:20 pm Summer semester 2013 starts April 1st and ends July 19th Lecture starts April 23th and ends July 16th Exercise starts May 2nd, ends July 18th Some exceptions: 09.05, Fachbereich Informatik P2P Group and Telecooperation Group Thorsten Strufe and Mathias Fischer 5

6 Some Words Regarding this Course Main topic of the course is the security of deployed, crucial networks, networking functions, and network protocols. Considering the Internet: networking is an essential service, hence the networking infrastructure is/may be the main target of attacks! Now what!? There will be some ex-cathedra parts, but please ask and discuss as much as possible! Slide history Based on several former courses given at TU Ilmenau, Uni Mannheim, and TU Darmstadt Heavily derived from Protection of Communication Infrastructures of/with Prof. G. Schäfer in Ilmenau Course Language Slides are in English, presentation as you prefer (we made an election) Fachbereich Informatik P2P Group and Telecooperation Group Thorsten Strufe and Mathias Fischer 6

7 Preliminary Course Overview 1. Introduction 2. Graph Theory 3. Resilient Network Design 4. Resilient Routing 5. Domain Name System (DNS) Security 6. Denial of Service Attacks and Countermeasures 7. Resilient Peer-to-Peer Networking 8. Intrusion Detection and Response Fachbereich Informatik P2P Group and Telecooperation Group Thorsten Strufe and Mathias Fischer 7

8 The Exercise Course Exercise course will be organized as a reading group Papers (links) available on the webpage (soon) Read papers early One paper with relation to lecture topics will be presented (by a random one of you!) and discussed (by you!) each week (please take note of the emphasize on YOU :-) ) Fachbereich Informatik P2P Group and Telecooperation Group Thorsten Strufe and Mathias Fischer 8

9 The Exam There will be an exam. Preferably an oral exam, if numbers permit You need to register! (with us! In addition to any other registrations, send me an by June 30th, please!) Procedures: Questions available in German (and English upon request) Answers given in German (and English upon request) No written material allowed (books, slides, notes) Except language dictionaries for non-native speakers (German/English), without any personal add-ons, handwritten comments, supplements, etc. If needed, we will provide a list of important equations Fachbereich Informatik P2P Group and Telecooperation Group Thorsten Strufe and Mathias Fischer 9

10 Questions? Fachbereich Informatik P2P Group and Telecooperation Group Thorsten Strufe and Mathias Fischer 10

Simulation and Evaluation of Computer Networks. 00. Preliminaries. Who is who TK What do we do. Organizational Issues. Rough time line Examination

Simulation and Evaluation of Computer Networks. 00. Preliminaries. Who is who TK What do we do. Organizational Issues. Rough time line Examination Simulation and Evaluation of Computer Networks 00. Preliminaries Who is who TK What do we do Organizational Issues Rough time line Examination SS 14 Fachbereich Informatik Telecooperation Group SECoN Mathias

More information

Seminar TK: Ubiquitous Computing

Seminar TK: Ubiquitous Computing Seminar TK: Ubiquitous Computing Seminar 4 CP, Summer Term 2014 Immanuel Schweizer schweizer@tk.informatik.tu-darmstadt.de Based on slides by Dr. Leonardo Martucci, Florian Volk General Information What?

More information

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus COMP-530 Cryptographic Systems Security *Requires Programming Background University of Nicosia, Cyprus Course Code Course Title ECTS Credits COMP-530 Cryptographic Systems 10 Security Department Semester

More information

Peer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf

Peer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems Chapter 13 Online Social Networks Introduction to Online Social Networks

More information

TCOM 562 Network Security Fundamentals

TCOM 562 Network Security Fundamentals TCOM 562 Network Security Fundamentals George Mason University Fall 2009 Jerry Martin Fairfax Campus Tel: (703) 993-3810 Email: gmartin@gmu.edu Office Hours: by appointment only 1. Announcements The class

More information

Peer-to-Peer Networks Organization and Introduction 1st Week

Peer-to-Peer Networks Organization and Introduction 1st Week Peer-to-Peer Networks Organization and Introduction 1st Week Department of Computer Science 1 Peer-to-Peer Networks Organization 2 2 Web & Dates Web page http://cone.informatik.uni-freiburg.de/lehre/vorlesung/

More information

CSCI 4541/6541: NETWORK SECURITY

CSCI 4541/6541: NETWORK SECURITY 1 CSCI 4541/6541: NETWORK SECURITY COURSE INFO CSci 4541/6541 Tuesdays 6:10pm 8:40pm Bell Hall 108 Office Hours: Tuesdays 2:30pm 4:30pm Dr. Nan Zhang Office: SEH 4590 Phone: (202) 994-5919 Email: nzhang10

More information

CSSW REGISTRATION GUIDE FALL 2015. Tips, hints, and quick hits to help you navigate the Fall registration process.

CSSW REGISTRATION GUIDE FALL 2015. Tips, hints, and quick hits to help you navigate the Fall registration process. CSSW REGISTRATION GUIDE FALL 2015 Tips, hints, and quick hits to help you navigate the Fall registration process. 1 Table of Contents FALL 2015 REGISTRATION... 3 INTRODUCTION... 3 REGISTRATION RESOURCES...

More information

CSSW REGISTRATION GUIDE SPRING 2015. Tips, hints, and quick hits to help you navigate the Spring registration process.

CSSW REGISTRATION GUIDE SPRING 2015. Tips, hints, and quick hits to help you navigate the Spring registration process. CSSW REGISTRATION GUIDE SPRING 2015 Tips, hints, and quick hits to help you navigate the Spring registration process. 1 Table of Contents SPRING 2015 REGISTRATION...3 INTRODUCTION...3 REGISTRATION RESOURCES...3

More information

Academic Calendar 2015-2016

Academic Calendar 2015-2016 Academic Calendar 2015-2016 Fall 2015 - Full/TCAT Session August 24, 2015 - December 10, 2015 Fall 2015-1st Session August 24, 2015 - October 9, 2015 Fall 2015-2nd Session October 14, 2015 - December 10,

More information

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras Cryptography & Network Security Introduction Chester Rebeiro IIT Madras The Connected World 2 Information Storage 3 Increased Security Breaches 81% more in 2015 http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-02.pdf

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

IST359 INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS

IST359 INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS IST359 INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS 1. COURSE DETAILS COURSE (SECTION): IST359 (M005) TERM: Fall 2012 INSTRUCTOR: Yang Wang PHONE: 443-3744 (Office) OFFICE: Hinds 342 EMAIL: ywang@syr.edu

More information

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS COURSE PROFILE Course Name Code Semester Term Theory+PS+Lab (hour/week) Local Credits ECTS Network Security IT527 Fall 3 + 0 + 0 3 8 Prerequisites None Course Language Course Type Course Lecturer Course

More information

Software Defined Networking Seminar

Software Defined Networking Seminar Software Defined ing Seminar Introduction - Summer Term 2014 Net Jeremias Blendin jblendin@ps.tu-darmstadt.de Prof. Dr. David Hausheer hausheer@ps.tu-darmstadt.de PS Peer-to-Peer Systems Engineering Prof

More information

Advanced Networking (MSCSP) + Wireless Internet (II, IN)

Advanced Networking (MSCSP) + Wireless Internet (II, IN) Advanced Networking (MSCSP) + Wireless Internet (II, IN) Summer Semester 2012 Integrated Communication Systems Group Ilmenau University of Technology Outline Motivation Objectives Organizational Stuff

More information

Faculty of Business Management. Graduate Programme English Courses - Descriptions

Faculty of Business Management. Graduate Programme English Courses - Descriptions Faculty of Business Management Graduate Programme English Courses - Descriptions Summer Semester 2016 Fachhochschule Kiel - University of Applied Sciences Faculty of Business Management Christina Abraham

More information

MS Information Security (MSIS)

MS Information Security (MSIS) MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in

More information

Course Title: ITAP 3471: Web Server Management

Course Title: ITAP 3471: Web Server Management Course Title: ITAP 3471: Web Server Management Semester Credit Hours: 4 (3,1) I. Course Overview The primary objective of this course is to give students a comprehensive overview of the tools and techniques

More information

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group 1 CYBER SECURITY SPECIALIZATION Dr. Andreas Peter Services, Cyber Security, and Safety Group 2 CYBER SECURITY Why Cyber Security? Our world increasingly becomes digital and connected Cyber Security is

More information

Wireless Internet/Advanced Networking

Wireless Internet/Advanced Networking Wireless Internet/Advanced Networking Master Ingenieurinformatik, Remote Engineering Track, 4 LP/credits Master Ingenieurinformatik, MIKS Track, 2 LP/credits Master Communications and Signal Processing,

More information

Online Lecture Schedule Details from August 2015 to October 2015: Certificate Programs

Online Lecture Schedule Details from August 2015 to October 2015: Certificate Programs Online Lecture Schedule Details from August 2015 to October 2015: Certificate Programs Sr. 1 2015-08-16 12:30:00 Sunday Business Communication and Etiquette Session 1 2 2015-08-22 19:00:00 Saturday Business

More information

INSPIRE: INcreasing Security and Protection through Infrastructure REsilience

INSPIRE: INcreasing Security and Protection through Infrastructure REsilience INSPIRE: INcreasing Security and Protection through Infrastructure REsilience Salvatore D Antonio Consorzio Interuniversitario Nazionale per l Informatica saldanto@unina.it CRITIS 2008 - Frascati (Italy)

More information

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu MS in Computer Science with specialization in Computer Security Prof. Clifford Neuman bcn@isi.edu Computer Security Specialization Computer Security is a hot area of study with a critical need Needed by

More information

Information, Network & Cyber Security

Information, Network & Cyber Security School COMSC Information, Network & Cyber Security Information security officers are faced with strategic decisions on a daily basis, and are required to make informed decisions on the security options

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

Network Security Course Specifications2011-2012

Network Security Course Specifications2011-2012 Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and

More information

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7 1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network

More information

Peer-to-Peer Networks

Peer-to-Peer Networks Peer-to-Peer Networks Chapter 1: Introduction Jussi Kangasharju Chapter Outline Course outline and practical matters Peer-to-peer (P2P) overview Definition of P2P What is P2P and how it is different from

More information

Randolph Community College INT 110 International Business Syllabus Spring 2008

Randolph Community College INT 110 International Business Syllabus Spring 2008 Randolph Community College INT 110 International Business Syllabus Spring 2008 COURSE INFORMATION: Section 01, Tuesday & Thursday 11:40-1:00 PM, BEC 103 INSTRUCTOR INFORMATION: Dr. Ralphael L. Brown Program

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun CSCI 454/554 Computer and Network Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Assistant Professor of Computer Science http://www.cs.wm.edu/~ksun/ Phone: (757) 221-3457 Email: ksun@wm.edu

More information

Transatlantic Academic Programs in Mechanical Engineering: The TU Darmstadt and Virginia Tech bilateral senior year abroad and dual-ms degree programs

Transatlantic Academic Programs in Mechanical Engineering: The TU Darmstadt and Virginia Tech bilateral senior year abroad and dual-ms degree programs Transatlantic Academic Programs in Mechanical Engineering: The TU Darmstadt and Virginia Tech bilateral senior year abroad and dual-ms degree programs Prof. Jan Helge Bøhn, Ph.D. Mechanical Engineering

More information

Korea s experience of massive DDoS attacks from Botnet

Korea s experience of massive DDoS attacks from Botnet Korea s experience of massive DDoS attacks from Botnet April 12, 2011 Heung Youl YOUM Ph.D. SoonChunHyang University, Korea President, KIISC, Korea Vice-chairman, ITU-T SG 17 1 Table of Contents Overview

More information

European Network for Cyber Security

European Network for Cyber Security European Network for Cyber Security Cyber Security: a fundamental basis for Smart Grids Project Summary December 19, 2014 Introduction Smart grids are crucial to support the use of more sustainable energy

More information

Collaborative Research Center 2013-2017

Collaborative Research Center 2013-2017 MAKI - Multi-Mechanism Adaptation for the future Internet Collaborative Research Center 2013-2017 Antragsteller: Dr. rer. nat. Natalia Akchurina Prof. Alejandro Buchmann, Ph.D. Prof. Dr.-Ing. Wolfgang

More information

Security and Privacy in Cloud Computing

Security and Privacy in Cloud Computing Security and Privacy in Cloud Computing Ragib Hasan Johns Hopkins University en.600.412 Spring 2010 Lecture 2 02/01/2010 Threats, vulnerabilities, and enemies Goal Learn the cloud computing threat model

More information

Penetration Testing. University of Sunderland CSEM02 Harry R Erwin, PhD

Penetration Testing. University of Sunderland CSEM02 Harry R Erwin, PhD Penetration Testing University of Sunderland CSEM02 Harry R Erwin, PhD Resources Qinetiq Information Security Foundation Course (2002) Tittle, Stewart, and Chapple, 2004, CISSP: Certified Information Systems

More information

AUGUST 2014 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31

AUGUST 2014 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 AUGUST 2014 17 18 19 20 22 23 SEPTEMBER 2014 5 6 OCTOBER 2014 26 27 ACADEMIC CALENDAR 2014-2015 Fall Semester 2014 AUGUST 18 First Day for Faculty 22 Opening Convocation Payment Deadline, 5 pm 25 Classes

More information

The Impact of Cybercrime on Business

The Impact of Cybercrime on Business The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted

More information

Seminar Algorithms of the Internet

Seminar Algorithms of the Internet HEINZ NIXDORF INSTITUT Seminar Algorithms of the Internet 2004-04-19 1 Motivation The Internet is the public global wide-area interconnection network for computers grows exponentially evolves The evolution

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

COURSE CATALOG. BS Networking and System Administration

COURSE CATALOG. BS Networking and System Administration COURSE CATALOG BS Networking and System Administration Program Overview Networking, the technology of interconnecting computing devices so information can flow between them, includes the design, deployment,

More information

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2. CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and

More information

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu CIS 6930/4930 Computer and Network Security Dr. Yao Liu About Instructor Dr. Yao Liu, Office: ENB 336 Phone: 813-974-1079 Email: yliu@cse.usf.edu URL: http://www.cse.usf.edu/~yliu/ Office hour: TR 2:00pm

More information

ICBA Summary of FFIEC Cybersecurity Assessment Tool

ICBA Summary of FFIEC Cybersecurity Assessment Tool ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy Jeremy.Dalpiaz@icba.org www.icba.org ICBA Summary

More information

Information Security Course Specifications2011-2012

Information Security Course Specifications2011-2012 Assiut University Faculty of Computers & Information Information Systems Department Quality Assurance Unit Information Security Course Specifications2011-2012 Relevant program Department offers the program

More information

Architecture and Implementation of Database Systems

Architecture and Implementation of Database Systems Architecture and Implementation of Database Systems Winter 2010/11 Wilhelm-Schickard-Institut für Informatik Universität Tübingen 1.1 Chapter 1 Preliminaries and Architecture and Implementation of Database

More information

EECS 588: Computer and Network Security. Introduction January 14, 2014

EECS 588: Computer and Network Security. Introduction January 14, 2014 EECS 588: Computer and Network Security Introduction January 14, 2014 Today s Class Welcome! Goals for the course Topics, what interests you? Introduction to security research Components of your grade

More information

Information for EPE master students (beginners 2012/2013) Servicezentrum FB 18 Dr.-Ing. Andreas Haun building S3 06, room 36

Information for EPE master students (beginners 2012/2013) Servicezentrum FB 18 Dr.-Ing. Andreas Haun building S3 06, room 36 Information for EPE master students (beginners 2012/2013) Servicezentrum FB 18 Dr.-Ing. Andreas Haun building S3 06, room 36 WS 2012/2013 Fachbereich 18 Servicezentrum Dr.-Ing. Andreas Haun 1 topics Students

More information

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless

More information

Intermediate Economics II: Macroeconomics Economics 512: ONLINE Spring 2015

Intermediate Economics II: Macroeconomics Economics 512: ONLINE Spring 2015 Intermediate Economics II: Macroeconomics Economics 512: ONLINE Spring 2015 Purdue University Krannert School of Management Department of Economics Instructor Matthew Hoelle E-mail: Skype: Google Hangout:

More information

PSY 272 Introduction to Industrial/Organizational Psychology Spring 2009 Monday, Wednesday, Friday: 10:30 11:20 UNIV 317.

PSY 272 Introduction to Industrial/Organizational Psychology Spring 2009 Monday, Wednesday, Friday: 10:30 11:20 UNIV 317. PSY 272 Introduction to Industrial/Organizational Psychology Spring 2009 Monday, Wednesday, Friday: 10:30 11:20 UNIV 317 Instructor: Rustin Meyer, M.S. Office: PSY 2192 Office Hours: Wednesdays 1:00-2:00

More information

Computer and Information Security

Computer and Information Security Computer Computer and Information Lecture 1 Introduction Computer Course Description Course Work Course Description This course builds on Operating Systems Network and System Administration 1 Lectures

More information

CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION

CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,

More information

Advanced Digital Forensics ITP 475 (4 Units)

Advanced Digital Forensics ITP 475 (4 Units) Advanced Digital Forensics ITP 475 (4 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are becoming

More information

P2P-Enabling for Critical Infrastructure Protection

P2P-Enabling for Critical Infrastructure Protection AUTONOMICS 2009 P2P-Enabling for Critical Infrastructure Protection Abdelmajid Khelil, Hamza Ghani, Daniel Germanus and Neeraj Suri Technische Universität Darmstadt, Germany Cyprus, Sept. 10, 2009 Dependable

More information

Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe

Peer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe Chapter 2: Initial (real world) systems Thorsten Strufe 1 Chapter Outline Overview of (previously) deployed P2P systems in 3 areas P2P file sharing and content distribution: Napster, Gnutella, KaZaA, BitTorrent

More information

Seminar: Security Metrics in Cloud Computing (20-00-0577-se)

Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions

More information

Welcome to Distributed Systems Engineering

Welcome to Distributed Systems Engineering Welcome to Distributed Systems Engineering Help during the semester Ms Irina Karadschow Secretary of Prof. Fetzer (chairman of the examination board) room APB 3107 se@mailbox.tu-dresden.de Phone: 0351

More information

Peer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf

Peer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems Organizational Information Organisational matters Lecturer Jun.-Prof.

More information

UVic Department of Electrical and Computer Engineering

UVic Department of Electrical and Computer Engineering UVic Department of Electrical and Computer Engineering COURSE OUTLINE Elec 567 Advanced Network Security and Forensics Spring 2014 Instructor: Office Hours: Dr. Issa Traore Days: Monday, Thursday Phone:

More information

Cryptography and Network Security Chapter 1

Cryptography and Network Security Chapter 1 Cryptography and Network Security Chapter 1 Acknowledgments Lecture slides are based on the slides created by Lawrie Brown Chapter 1 Introduction The art of war teaches us to rely not on the likelihood

More information

Orientation Program for Students of Our MSc. Programs Business Administration, Economics and MEMS. Information Systems. Prof. Dr.

Orientation Program for Students of Our MSc. Programs Business Administration, Economics and MEMS. Information Systems. Prof. Dr. Orientation Program for Students of Our MSc. Programs Business Administration, Economics and MEMS Information Systems Prof. Dr. Stefan Lessmann Agenda What it is about Information Systems Who we are What

More information

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan CNT5412/CNT4406 Network Security Course Introduction Zhenhai Duan 1 Instructor Professor Zhenhai Duan (duan@cs.fsu.edu) Office: 162 LOV Office hours: 1:00PM to 2:00PM, T/Th Or by appointment Email: duan@cs.fsu.edu

More information

After completing SI- 539, students will have a working personal portfolio website in production.

After completing SI- 539, students will have a working personal portfolio website in production. SI 539, Fall 2014 Complex Web Design Lecture: Friday: 1:00pm 3:00pm *Must leave by 3:15 Discussion Sections Varies Office Hours*: Tues: 11:35 12:35 Wed mornings *Please check my Google Calendar for updates

More information

How To Become A Computer Scientist

How To Become A Computer Scientist EIT Education & the EIT ICTLabs Master School Prof. Fabrizio Granelli Local Master School Coordinator, UNITN Education, EIT & UNITN Maurizio Marchese Fabrizio Granelli Director of Education Local MS coordinator

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification 1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer

More information

Academic Calendar for Faculty

Academic Calendar for Faculty Summer 2013 Term June 3, 2013 (Monday) June 3-4, 2013 (Monday Tuesday) June 5, 2013 (Wednesday) June 5-6, 2013 (Wednesday Thursday) June 6, 2013 (Thursday) July 3, 2013 (Wednesday) July 4, 2013 (Thursday)

More information

Network Security Welcome and introduction. T-110.5241 Network security Nov-Dec 2012 Tuomas Aura Aalto University

Network Security Welcome and introduction. T-110.5241 Network security Nov-Dec 2012 Tuomas Aura Aalto University Network Security Welcome and introduction T-110.5241 Network security Nov-Dec 2012 Tuomas Aura Aalto University Course learning objectives Know common communications systems, classic security protocols

More information

MS in Medical Physiology Required Course Descriptions Total of 18 Credit Hours (30 Credit Hours Required for the Degree)

MS in Medical Physiology Required Course Descriptions Total of 18 Credit Hours (30 Credit Hours Required for the Degree) MS in Medical Physiology Required Course Descriptions Total of 18 Credit Hours (30 Credit Hours Required for the Degree) Medical Physiology I and II (PHOL 481 and 482, 6 credit hours each, a total of 12

More information

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming. Elective course in Computer Science University of Macau Faculty of Science and Technology Department of Computer and Information Science SFTW498 Information Security Syllabus 2nd Semester 2011/2012 Part

More information

VIA COLLAGE Deployment Guide

VIA COLLAGE Deployment Guide VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram. Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech

More information

HUMAN RESOURCE MANAGEMENT SYLLABUS

HUMAN RESOURCE MANAGEMENT SYLLABUS HUMAN RESOURCE MANAGEMENT SYLLABUS HRM 305 Section 002 6:00-8:45 p.m. Tuesday Fall 2015 Micron Business and Economics Building Room 1209 Gundars (Gundy) Kaupins Description Strategic Management Workforce

More information

How To Write A Cybersecurity Framework

How To Write A Cybersecurity Framework NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order

More information

Technology Courses. The following chart outlines the required courses in each of these three categories for the Ph.D. curriculum:

Technology Courses. The following chart outlines the required courses in each of these three categories for the Ph.D. curriculum: ITP PH.D. PROGRAM CONTENTS Overview... 2 Course Requirements... 3 Core Course Requirement... 4 Technology Course Requirement... 5 Business/Economic/Policy Course Requirement... 6 Preliminary Exam... 7

More information

CS 5480 Computer Networks

CS 5480 Computer Networks CS 5480 Computer Networks Professor Sneha Kumar Kasera School of Computing 1 My Background PhD - Computer Science dept, UMass Amherst (1999) Bell Labs research (1999 2003) research interests computer networks

More information

The FBI and the Internet

The FBI and the Internet The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements

More information

Cyber-Physical System Security of the Power Grid

Cyber-Physical System Security of the Power Grid Course on: Cyber-Physical System Security of the Power Grid April 9-11, 2013 at KTH Royal Institute of Technology, Stockholm, Sweden Background Cyber Security is essential to today s power grid operation

More information

Programme Specification (Postgraduate)

Programme Specification (Postgraduate) Programme Specification (Postgraduate) 1. Programme Title(s): MSc/PGDip*/PGCert* Data Analysis for Business Intelligence *Exit awards only 2. Awarding body or institution: University of Leicester 3. a)

More information

Computer and Network Security

Computer and Network Security Computer and Network Security Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 Durresi@csc.LSU.Edu These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601_07/ Louisiana

More information

Network Security in Building Networks

Network Security in Building Networks Network Security in Building Networks Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is) Westphalian University of Applied Sciences Gelsenkirchen, Germany www.if-is.net Content

More information

Introduction to Organizational Behavior (Business 260)

Introduction to Organizational Behavior (Business 260) Introduction to Organizational Behavior (Business 260) Faculty of Business Administration University of Regina Professor Dr. Sandeep Mishra Faculty of Business Administration E-mail: mishrs@gmail.com Office

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security

More information

Welcome in the Master programme

Welcome in the Master programme Welcome in the Master programme Prof. Axel Görlitz, HHU Düsseldorf 19.10.2015 Master Programme in Physics Physics Focus (Schwerpunkt) Plasma Physics, Quantum Optics and Quantum Information, Solid State

More information

BIO 226: APPLIED LONGITUDINAL ANALYSIS COURSE SYLLABUS. Spring 2015

BIO 226: APPLIED LONGITUDINAL ANALYSIS COURSE SYLLABUS. Spring 2015 BIO 226: APPLIED LONGITUDINAL ANALYSIS COURSE SYLLABUS Spring 2015 Instructor: Teaching Assistants: Dr. Brent Coull HSPH Building II, Room 413 Phone: (617) 432-2376 E-mail: bcoull@hsph.harvard.edu Office

More information

SOUTHWESTERN MICHIGAN COLLEGE SCHOOL: Arts and Sciences Niles, Michigan COURSE SYLLABUS Fall Semester 2014

SOUTHWESTERN MICHIGAN COLLEGE SCHOOL: Arts and Sciences Niles, Michigan COURSE SYLLABUS Fall Semester 2014 SOUTHWESTERN MICHIGAN COLLEGE SCHOOL: Arts and Sciences Niles, Michigan COURSE SYLLABUS Fall Semester 2014 COURSE TITLE: Spanish for the Workplace COURSE # Spanish 170 SECTION# 2859 CREDITS/CONTACTS: FINAL

More information

ECE PhD Program Orientation

ECE PhD Program Orientation 1 / 10 ECE PhD Program Orientation Prof. Kathleen E. Wage Electrical and Computer Engineering Department George Mason University August 27, 2015 2 / 10 Outline 1 Introduction 2 Program Requirements 3 Things

More information

Software Systems Engineering

Software Systems Engineering Software Systems Engineering Introductory Meeting WS 2011/2012 Prof. Gerhard Lakemeyer, Ph.D. Dipl.-Inform. Stefan Schiffer, Patrick Selders RWTH Aachen University Knowledge-Based Systems Group (Lehr-

More information

Strategic Information Management

Strategic Information Management Strategic Information Management Course Profile Type Lecture + Tutorial Lecturer Prof. Dr. Nils Urbach Hours per Week 2 + 1 SWS ECTS 6 Language English Start date April 08 th, 2014 Course Description The

More information

Business Information Technology Bachelor of Science in Business Information Technology

Business Information Technology Bachelor of Science in Business Information Technology Bachelor of Science in Career profile that is relevant and knowledge that is up to date are key drivers of business success. Efficient information and communication systems support innovative business

More information

Web Hosting 101. with Patrick McNeil

Web Hosting 101. with Patrick McNeil Web Hosting 101 with Patrick McNeil Alphabet soup Why learn the technical side? To help your clients solve problems To help you work better with your tech team To better understand how the web works To

More information

Chapter 11 Cloud Application Development

Chapter 11 Cloud Application Development Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How

More information

the Council of Councils initiative

the Council of Councils initiative Author: Andrea Renda, Senior Research Fellow, Centre for European Policy Studies May 3, 2013 Editor's note: This brief is a feature of the Council of Councils initiative, gathering opinions from global

More information

Advanced Mobile Communication Networks

Advanced Mobile Communication Networks Advanced Mobile Communication Networks (replaces previous courses Advanced Networking for MSCSP, Mobile Comm. Networks for RCSE and Wireless Internet for II & IN) Course Description and Introduction Integrated

More information

Summer School on Fuzzy Cognitive Maps Methods, Learning Algorithms and Software Tool for Modeling and Decision Making. 4-8 July 2015 (5 days)

Summer School on Fuzzy Cognitive Maps Methods, Learning Algorithms and Software Tool for Modeling and Decision Making. 4-8 July 2015 (5 days) Summer School on Fuzzy Cognitive Maps Methods, Learning Algorithms and Software Tool for Modeling and Decision Making 4-8 July 2015 (5 days) Organized by Prof. Elpiniki Papageorgiou Technological Educational

More information