Security Topics in Networking and Distributed Systems CS 590D



Similar documents
CS 5480 Computer Networks

CMPSCI 453 Computer Networking. Professor V. Arun Department of Computer Science University of Massachusetts Amherst

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

CSCI 4250/6250 Fall 2015 Computer and Network Security. Instructor: Prof. Roberto Perdisci

CS 5490/6490: Network Security Fall 2015

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

CSE 5392 Sensor Network Security

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

CS 464/564 Networked Systems Security SYLLABUS

EECS 588: Computer and Network Security. Introduction January 14, 2014

In what follows, we discuss the course overview, grading, books, weekly schedule, laboratory assignments and group projects.

CS 203 / NetSys 240. Network Security

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CSCD 330 Network Programming Winter Lecture 1 - Course Details

CSE 571S: Network Security CSE571S. Overview. Cyber Security Facts. Cyber Security Opportunities

CSC 474 Information Systems Security

Information Security Attack Tree Modeling for Enhancing Student Learning

Get Connected Follow- up Assignment Rev: 8/28/08

About the Authors Preface Acknowledgements List of Acronyms

FRAMEWORK for NATIONAL NETWORK & CYBER SECURITY

Protocol Rollback and Network Security

Computer and Network Security

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Computer and Network Security

CSE 571S: Network Security CSE571S

COMP 112 Assignment 1: HTTP Servers

CSE 123b Communications Software

Seminar Algorithms of the Internet

CDA Introduction to Computer Networks

Professor s Contact Information Office Phone Other Phone n/a Office Location ECS South Address

EECS 588: Computer and Network Security. Introduction

CSE 3214: Computer Network Protocols and Applications

COSC 472 Network Security

Advanced System Security

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

ECE 458 Engineering Software for Maintainability

You will work in groups of two on the labs. It is OK to talk to others and help each other in the lab.

HW/Lab 2: Network Mapping and Attacks. CS 336/536: Computer Network Security DUE at 10/19/2015 (11am)

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Data Privacy and Biomedicine Syllabus - Page 1 of 6

Introduction to Cryptography CS 355

Project 2: Penetration Testing (Phase II)

Instructor: Michael J. May. Semester 1 of 5774

The Internet. Reminders. Internet Protocol Routing: Simplified. Part 2: Networks of Networks - Internet Workings

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

Tutorial 3. June 8, 2015

HW/Lab 1: Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am)

Project 3: Network Security

CSE 473s Introduction to Computer Networks

Network Security ITP 457 (4 Units)

Instructor: Carlos E. Caicedo, Ph.D. Phone: (Office) Office: 215 Hinds Hall Office Hours: TBA

Network Security Workshop

ICOM 5018 Network Security and Cryptography

Computer Network Engineering

CSE331: Introduction to Networks and Security. Lecture 1 Fall 2004

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus

Internet Infrastructure Security

How To Pass The Information And Network Security Certificate

Network Security - ISA 656 Review

CSE 571S: Network Security CSE571S

or 30 minutes prior to the start of each class, or by prearranged appointment

Ursuline College Accelerated Program URSULINE COLLEGE

CSE598k / CSE545 Advanced Network Security

Information security versus network security in the Internet as critical infrastructure Security of Internet and Critical Infrastructures: European

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

Course Design Document. IS403: Advanced Information Security and Trust

Application Security: Threats and Architecture

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

CALIFORNIA STATE UNIVERSITY CHANNEL ISLANDS COURSE MODIFICATION PROPOSAL

CS 218 Advanced Computer Networks Quarter: Fall 2003 Course ID : CS218 Class hour : MW 8:00-10:00 pm Classroom : BH 5273

Computer Networks CS321

CS 356 Lecture 16 Denial of Service. Spring 2013

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

CS101 Lecture 19: Internetworking. What You ll Learn Today

Introduction to Networks and the Internet

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

IEEE JAVA Project 2012

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

ICS 351: Today's plan. DNS WiFi

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring Nitesh Saxena Polytechnic University

How To Understand And Understand Network Theory

Advanced Security and Mobile Networks

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Network Security Policy

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Firewalls & Intrusion Detection

Information Security Basic Concepts

Introduction to Computer Security Benoit Donnet Academic Year

Mobility (and philosophical questions about names and identity) David Andersen CMU CS The problem

Securing DNS Infrastructure Using DNSSEC

Table of Contents. Introduction. Audience. At Course Completion

Introduction to Information Technology ITP 101x (4 Units)

Please see web page for the course information.

Transcription:

Security Topics in Networking and Distributed Systems CS 590D Lecture 1 Department of Computer Sciences Purdue University Cristina Nita-Rotaru Spring 2004/Lecture1 1

Course Information Meetings Tu&Th 1:30-2:45 PM Professor contact info: Office: REC 217/CS174 Email: crisn@cs.purdue.edu Office hours: TuTh 2:45 4:30 PM in CS174 TA: Chi-Bun Chan (Ben), cbchan@cs.purdue.edu Office hours to be announced Cristina Nita-Rotaru Spring 2004/Lecture 1 2

Course Information (cont.) Class mailing list: 590D@cs.purdue.edu Class webpage http://www.cs.purdue.edu/homes/crisn/courses/cs590d IMPORTANT: all messages to me about the class should contain in the subject 590D Cristina Nita-Rotaru Spring 2004/Lecture 1 3

Grading Policy Class presentation 20% Final project 50% Homework 15% Participation in class discussions and providing feedback on your colleagues presentations 15% Cristina Nita-Rotaru Spring 2004/Lecture 1 4

Class Overview Set of topics provided Several lectures given by me providing overview on the topics with focus on one or two important papers Students give presentations of other significant papers on one of the topics. Each student should have a presentation (about 20 minutes). No books required, only research papers. ALL SUBMISSIONS are electronically PDF Cristina Nita-Rotaru Spring 2004/Lecture 1 5

Homework READ the assigned reading Before each class you will need to submit a 1 page report on one of the papers assigned to read, containing: One paragraph summary of the paper 3 strong points (what you liked about the paper) 3 weak points (what you did not like about the paper) Cristina Nita-Rotaru Spring 2004/Lecture 1 6

Project It can be on one of the topics covered in the class, but this is not a requirement, as long as it is related to a security topic in networking and distributed systems Project proposal due by Jan.29 Project progress due by March 11 Project final report due by April 20 DEADLINES ARE STRICT Cristina Nita-Rotaru Spring 2004/Lecture 1 7

Project (cont.) Work in teams of 2-3 students, please form teams, otherwise I will assign you to a team. At the end of the course each team will give a brief presentation of what the project accomplished. Team will meet with me to demonstrate the project, discuss what was accomplished and asses the contribution of each member of the team. Cristina Nita-Rotaru Spring 2004/Lecture 1 8

Course Topics (1) High-level protocols security (0.5 week) IP security and DDOS trace back (1 week) BGP, DNS, OSPF security (1 week) TCP security (0.5 week) Secure multicast (1 week) Intrusion detection (1 week) Cristina Nita-Rotaru Spring 2004/Lecture 1 9

Course Topics (2) Group communication security (2 weeks) Byzantine security/fault tolerance (Intrusion fault-tolerance) (2 weeks) Security issues in wireless networks (3 weeks) Peer-to-peer systems security (2 weeks) Anonymity and privacy (2 weeks) ANYTHING ELSE YOU THINK IT S INTERESTING and it s related to course topics Cristina Nita-Rotaru Spring 2004/Lecture 1 10

Possible projects (1) Role-based access control for groups: testcase group communication systems (will require working with Spread) and RT library. Building intrusion fault-tolerance using threshold cryptography (you can use Spread, it will require you to learn more about threshold crypto, and how it can help to design intrusion fault-tolerance systems). Cristina Nita-Rotaru Spring 2004/Lecture 1 11

Possible projects (1) Taxonomy of attacks on wireless routing networks: identify, implement and test concrete attacks for AODV or DSR Attacks on MAC protocols for wireless networks: survey on possible attack, think/design possible solutions (ECE major preferred) Key management for wireless systems: survey, implementation, comparison, analysis of results (it can be focused on sensors only, etc) Cristina Nita-Rotaru Spring 2004/Lecture 1 12

Possible projects (1) SPAM: investigate the current state of problems/losses caused by SPAM, think/implement a possible solution Viruses/Worms: identify why are they causing so much damage so quick and figure out if there any solutions to stop these type of attacks at the network level. Metrics for risk assessment (in particular network security risks): Are any of the methods applied to asses financial risk applicable to asses security risks?design a metric and try to apply it. Cristina Nita-Rotaru Spring 2004/Lecture 1 13

Possible projects (4) Use of smart-cards as way of enhancing healthcare: will involve designing a medical system where critical information is preserved on smartcards. Research challenges: preserving privacy, while allowing access to critical information. Smartcard readers(gemplus) and cards available. Cristina Nita-Rotaru Spring 2004/Lecture 1 14

Possible projects (5) Secure DNS: possible problems, focus on one of them, design solution; example: how is the data managed? C an availability be improved? What is the role/risk of caching? Cristina Nita-Rotaru Spring 2004/Lecture 1 15

Next Lecture Topic: High-level protocols security Assigned reading: V. Voydock and S. Kent. Security mechanisms in high-level network protocols R. Needham and M, Schroeder. Using Encryption for authentication in large networks K. Thompson. Reflections on Trusting Trust Cristina Nita-Rotaru Spring 2004/Lecture 1 16