CSE598k / CSE545 Advanced Network Security Lecture 1 - Introduction Prof. Patrick McDaniel Systems and Internet Infrastructure Security Laboratory (SIIS) 1
Oops... 2
Network Security No really good definition, so we will accept the following for this course: The study of the security of systems, applications, infrastructure, and tools that relate to online computing. Implication Networks: physical layer, protocols, and flows Applications: how they are designed and People and Policy: how do we use these system and what kinds of security do we need? 3
Network Security Questions How is this different than other types of security? Is the distinction between network security and other types of security meaningful any more? Is there anything more to study? 4
CERT Reports AOL Media Playback OpenSSL FIPS Questions What are the vulnerabilities? How can you exploit them? What is the cause? 5
Why are we here? -- Goals Our goal: to provide you with the tools to perform research in. Evaluating network security techniques Designing network security solutions Attacking network infrastructure Developing analysis methods This is going to be a time-consuming course. The key to success is sustained effort. Failure to keep up with readings and assignments will likely result in poor grades, and little understanding of the course material. Pay-off: network security research competence is a necessary, rare, valuable skill 6
Course Materials Website - We are maintaining the course website at http://www.cse.psu.edu/~mcdaniel/cse545/index.html Course assignments, slides, and other artifacts will be made available on the course websites 7
Course Calendar The course calendar as all the relevant readings, assignments and test dates Please check the website frequently for announcements and changes to the schedule. Students are responsible for any change on the schedule (we will try to make announcements in class). 8
Grades Grading policy 40% Course Project 20% Assignments 25% Final Exam 15% Class Participation, quizzes Lateness policy - Assignments are assessed a 10% per-day late penalty, up to a maximum of 4 days. Unless the problem is apocalyptic, don't give us excuses. Students with legitimate reasons who contact the professor before the deadline may apply for an extension. 9
Activities Homework reductions, logic problems, etc. readings, readings, readings... Projects perform some limited attack or desgin perform analysis of something interesting Quizzes if you don t do the reading... 10
Ethics Statement This course considers topics involving personal and public privacy and security. As part of this investigation we will cover technologies whose abuse may infringe on the rights of others. As an instructor, I rely on the ethical use of these technologies. Unethical use may include circumvention of existing security or privacy measurements for any purpose, or the dissemination, promotion, or exploitation of vulnerabilities of these services. Exceptions to these guidelines may occur in the process of reporting vulnerabilities through public and authoritative channels. Any activity outside the letter or spirit of these guidelines will be reported to the proper authorities and may result in dismissal from the class. When in doubt, please contact the instructor for advice. Do not undertake any action which could be perceived as technology misuse under any circumstances unless you have received explicit permission from Professors Jaeger or McDaniel. 11
Read for Next week Jerome H. Saltzer, David P. Reed, and David D. Clark. Endto-end arguments in system design. ACM Transactions on Computer Systems 2, 4 (November 1984) pages 277-288. K. Thompson, "Reflections on Trusting Trust," Communications of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763. J.H. Saltzer and M.D. Schroeder. Part I-A of The Protection of Information in Computer Systems. Proceedings of the IEEE, 63(9):1278-1308, 1975. 12
Assignment: Due 1/28 Follow these steps: 1. Download on Linux or OS/X a VM system 2. Install a Linux operating system running in a VM 3. Install different kinds of network servers 4. Download and install Metasploit tool 5. Compromise the server over the network Write a report, with screen shots and log files that describes a network attacks ~ at least 1 page text each in deep detail of the attack and how it works. 13