CS 5490/6490: Network Security Fall 2015



Similar documents
CS 5480 Computer Networks

Cryptography and network security CNET4523

CMPSCI 453 Computer Networking. Professor V. Arun Department of Computer Science University of Massachusetts Amherst

CS Final Exam

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Weighted Total Mark. Weighted Exam Mark

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

How To Protect Your Data From Attack

CS 494/594 Computer and Network Security

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

EXAM questions for the course TTM Information Security May Part 1

Chapter 8. Network Security

CRYPTOG NETWORK SECURITY

CS 450/650 Fundamentals of Integrated Computer Security

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CRYPTOGRAPHY AND NETWORK SECURITY

NETWORK ADMINISTRATION AND SECURITY

Computer and Network Security

CSC 474 Information Systems Security

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Wireless Mobile Internet Security. 2nd Edition

Security Protocols/Standards

Gujarat University Syllabus M.Tech (Networking & Communications) II

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

CSCI 454/554 Computer and Network Security. Final Exam Review

Chapter 10. Network Security

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Boston University MET CS 690. Network Security

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Chapter 7 Transport-Level Security

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

VALLIAMMAI ENGINEERING COLLEGE

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Table of Contents. Bibliografische Informationen digitalisiert durch

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Security vulnerabilities in the Internet and possible solutions

B.TECH. CSE with Specialization in Cyber Security and Hacking

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Network Security Part II: Standards

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

CSE/EE 461 Lecture 23

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

CSCI 4250/6250 Fall 2015 Computer and Network Security. Instructor: Prof. Roberto Perdisci

Transport Level Security

Netzwerksicherheit: Anwendungen

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

IT Networks & Security CERT Luncheon Series: Cryptography

Lecture 17 - Network Security

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

CNT Computer and Network Security Review/Wrapup

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

(d-5273) CCIE Security v3.0 Written Exam Topics

Computer Security CS 426. CS426 Fall 2010/Lecture 40 1

Protocol Rollback and Network Security

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Curran, K. Tutorials. Independent study (including assessment) N/A

Network Access Security. Lesson 10

CS 758: Cryptography / Network Security

Authentication requirement Authentication function MAC Hash function Security of

Lecture 9 - Network Security TDTS (ht1)

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Savitribai Phule Pune University

CSci 530 Midterm Exam. Fall 2012

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

ICTTEN8195B Evaluate and apply network security

Network Security Essentials:

MW , TU 1-3; and other times by appointment

CISCO IOS NETWORK SECURITY (IINS)

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

Bit Chat: A Peer-to-Peer Instant Messenger

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Communication Systems SSL

Recommended Wireless Local Area Network Architecture

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Tim Bovles WILEY. Wiley Publishing, Inc.

How To Pass The Information And Network Security Certificate

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING

Transcription:

CS 5490/6490: Network Security Fall 2015 Professor Sneha Kumar Kasera School of Computing 1 What is this course about? Comprehensive introduction to network security Ø learn principles of network security Ø learn practice of network security Ø Internet security architecture/protocols as case study Goals: Ø learn a lot (not just factoids, but principles and practice) Ø have fun (well, it should be interesting, at least) 2 1

Course Information Ø Who is this course for? q MS/PhD students, undergrads juniors/seniors Ø Prerequisites: q Computer networks class, and/or good practical experience with networking Socket programming required, some understanding of TCP/IP (protocol functions, header structure) 3 Course Materials Ø Primary text: Networks Security: Private Communication in a Public World, 2 nd Edition, Kaufman, Perlman & Speciner, PH 2002. Ø Secondary texts: q Cryptography and Network Security: Principles and Practice, Stallings, 6 th edition, Pearson q Security in Computing, Pfleeger, Pfleeger, & Margulies, Pearson Ø Other sources q Internet Denial-of-service by Mirkovic et al q SSL by Rescorla q IEEE Security and Privacy Magazine q Ø Class notes (no slides, most of the time) 4 2

Course Information (more) Ø Class WWW site (same for cs5490 and cs6490): www.eng.utah.edu/~cs6490 Ø everything will be posted on this site! q topics and schedule q assignments nothing will be handed out in class :-) Ø working on having this class on canvas 5 Course Information (more) Ø Mailing Lists: cs6490@list.eng.utah.edu, teachcs6490@list.eng.utah.edu q announcements, discussions, questions q join by going to https://sympa.eng.utah.edu/sympa Coursework approx approx % written HW 5 25% Ø Workload: programming assigns. 2 15% programming questions (in written HW) 5% midterm exams 2 35% course project 20% Ø Cheating policy: http://www.cs.utah.edu/graduate/cheating_policy.pdf Please read, sign academic misconduct acknowledgment form 6 3

Course Information (more) Ø cs5490 vs cs6490 same lectures cs6490 more questions in HW & Exams, extra credit for cs5490 Ø TA: Shishir Bhargav, Office hour: TBA Ø Professor s meeting hour: Tuesday 10 11 AM Ø could also ask questions by sending email to the class mailing list, meet (briefly) after class 7 Course Information (more) Ø Grading guidelines: q 90-100 A q 80-89 A- q 70-79 B-, B, B+ q 60-69 C-, C, C+ q 50-59 D-, D, D+ q < 50 (or caught cheating) E The ranges as well as the thresholds could be shifted/changed depending on the overall performance of the class in the midterm exams, home works, programming assignments, and final project Ø in-class style: interaction, questions (please!) Ø please read Chapter 8 from Kurose and Ross > = 4 th edition 8 4

Networked Systems Cellular Access Network Public Switched Telephone Network voice Wireless LAN data Gateway Mobile Adhoc Network Sensor Network Internet Home Network 9 Course Overview: Part 1: Cryptography Ø Introduction Ø Secret key crypto q permutations & substitutions, block ciphers q stream ciphers, one time pads Ø Modes of operation q encrypting large messages (CBC), multiple enc/dec (3DES) 10 5

Course Overview: Part 1: Cryptography Ø Hashes and message digests q birthday paradox, Unix password hash, MD*, SHA, HMAC Ø Public key crypto q elementary number theory, RSA, Euclid s theorem, Chinese remainder theorem q Diffie Hellman key exchange q zero knowledge proof systems q finite fields, elliptic curves 11 Course Overview: Part 2: Authentication Ø Overview Ø Authentication of people q reliably verifying identity of someone (or something) Ø Security handshake pitfalls q minor variants of authentication protocols can have security holes, e.g., timer-based & reflection attacks q mediated authentication SOJZKXS KDGS I 12 6

Course Overview: Part 2: Authentication Ø Strong password protocols q Lamport s hash q secure even when password broken by offline dictionary attacks 13 Course Overview: Part 3: Standards Ø Kerberos, PKI (Certificates) Ø SSL - handshake, data exchange, export rules Ø IPsec q AH, ESP q IKE q IPsec over NAT q firewall friendliness Mary had a little key (It s all she could export) And all the email that she sent Was opened at the Fort. Ø Wireless security 2G/3G/4G, WiFi, M2M 14 7

Course Overview: Part 4: Topics in Security Ø Denial-of-service q general concepts, formulations q Pushback q IP traceback find attacker locations q KillBots distinguish flash crowds from DDoS, Bloom filters q new Internet architectures 15 Course Overview: Part 4: Topics in Security Ø Anonymity, End-point hiding Midterm Exam II Ø Digital Pests: Viruses, Buffer overflow, worms Ø Software Defined Networks Ø Firewalls, Intrusion detection (if time permits) No Final Exam 16 8

Ø looked at several courses offered elsewhere q Radia Perlman s course at Harvard q security courses offered at U. Delaware, Virginia, Columbia U., Purdue U. Ø those with security experiences please provide your input to the class Ø very hot, constantly evolving field - will need everybody s help Questions, comments,??? 17 9