CSE 571S: Network Security CSE571S



Similar documents
CSE 571S: Network Security CSE571S

CSE 571S: Network Security CSE571S

CSE 571S: Network Security CSE571S. Overview. Cyber Security Facts. Cyber Security Opportunities

CSE 473s Introduction to Computer Networks

Computer and Network Security

Computer and Network Security

BASIC ANALYSIS OF TCP/IP NETWORKS

Intrusion Detection Systems

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Network Security TCP/IP Refresher

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Networking Test 4 Study Guide

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Technical Support Information Belkin internal use only

Lab - Observing DNS Resolution

Application Delivery Networking

Internet Control Protocols Reading: Chapter 3

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

How do I get to

Mobile IP Part I: IPv4

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

RARP: Reverse Address Resolution Protocol

Hands On Activities: TCP/IP Network Monitoring and Management

Introduction to TCP/IP

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

Homework 3 TCP/IP Network Monitoring and Management

Computer Networks I Laboratory Exercise 1

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Transport and Network Layer

Network Pop Quiz 5 Brought to you by please visit our site!

EECS 489 Winter 2010 Midterm Exam

Ethernet. Ethernet. Network Devices

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

IT Data Communication and Networks (Optional)

ICS 351: Today's plan

Lesson 1 Quiz Certification Partners, LLC. All Rights Reserved. Version 2.0

Network layer: Overview. Network layer functions IP Routing and forwarding

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

SSVP SIP School VoIP Professional Certification

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas

CSE 3214: Computer Network Protocols and Applications

COMPUTER NETWORK TECHNOLOGY (300)

CompTIA Network+ (Exam N10-005)

TCP/IP, Addressing and Services

Lab - Observing DNS Resolution

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

SSVVP SIP School VVoIP Professional Certification

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Address Resolution Protocol (ARP)

Troubleshooting Tools

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

CS 450/650 Fundamentals of Integrated Computer Security

You will work in groups of two on the labs. It is OK to talk to others and help each other in the lab.

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

Networking 4 Voice and Video over IP (VVoIP)

This Lecture. The Internet and Sockets. The Start If everyone just sends a small packet of data, they can all use the line at the same.

Introduction to Network Security Lab 1 - Wireshark

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Description: Objective: Attending students will learn:

PPS Internet-Praktikum. Prof. Bernhard Plattner Institut für Technische Informatik und Kommunikationsnetze (TIK)

Themen der Praktikumsnachmittage. PPS Internet-Praktikum. Zielsetzung. Infrastruktur im ETF B5

Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper

Presentation of a Competition in Informatics and IT

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

Building Secure Network Infrastructure For LANs

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.

Business Data Communications & IT Infrastructures, 2 nd Edition

How To Understand And Understand Network Theory

Introduction to IP networking

Final for ECE374 05/06/13 Solution!!

IP address format: Dotted decimal notation:

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

8.2 The Internet Protocol

CSE 461 FINAL EXAM REVIEW

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Cryptography and Network Security: Overview

Internetworking and IP Address

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Lab Conducting a Network Capture with Wireshark

Candidates should attempt FOUR questions. All questions carry 25 marks.

Connecting to and Setting Up a Network

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

CCNA Discovery Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

Data Communications and Networking Overview

Firewall Defaults and Some Basic Rules

21.4 Network Address Translation (NAT) NAT concept

Network Basics GRAPHISOFT. for connecting to a BIM Server (version 1.0)

Communication Networks MAP-TELE 2012/13

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

CS155 - Firewalls. Simon Cooper <sc@sgi.com> CS155 Firewalls 22 May 2003

How To Pass The Information And Network Security Certificate

Written examination in Computer Networks

UPPER LAYER SWITCHING

CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006

Network Security Fundamentals

Transcription:

CSE 571S: Network Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse571-07/ 1-1

Overview! Goal of this Course! Grading! Prerequisites! Tentative Schedule! Project 1-2

Goal of This Course! Comprehensive course on network security! Includes both theory and practice! Theory: Cryptography, Hashes, key exchange, Email Security, Web Security! Practice: Hacking and Anti-Hacker techniques! Graduate course: (Advanced Topics) Lot of independent reading and writing Project/Survey paper 1-3

Incidents Reports Received 150000 100000 50000 0 CERT Statistics 1985 1990 1995 2000 2005! Computer emergency response team (CERT)! Security is a #1 concern about Internet.! Significant industry and government investment in security Year 1-4

Prerequisites! CSE 473S (Introduction to Computer Networking) or equivalent 1-5

Prerequisites! ISO/OSI reference model! TCP/IP protocol stack! Full-Duplex vs half-duplex! UTP vs Satellite link vs Wireless! Cyclic Redundancy Check (CRC)! CRC Polynomial! Ethernet! IEEE 802 MAC Addresses! Bridging and Routing! IEEE 802.11 LAN 1-6

! IP Address! Subnets Prerequisites (Cont)! Private vs Public Addresses! Address Resolution Protocol (ARP)! Internet Control Message Protocol (ICMP)! IPV6 addresses! Routing - Dijkstra's algorithm! Transport Control Protocol (TCP)! User Datagram Protocol (UDP)! TCP connection setup! TCP Checksum! Hypertext Transfer Protocol (HTTP) 1-7

Text Book! Charlie Kaufman, Radia Perlman, and Mike Speciner, "Network Security: Private Communication in a Public World," 2nd Edition, Prentice Hall, 2002, ISBN: 0130460192. 1-8

Supporting Books On 2hr reserve at WUSTL Olin Library! Ankit Fadia, "Network Security : A Hacker's Perspective," Course Technology Ptr, May-06, 415 pp., ISBN:1598631632.! Vincent J. Nestler, et al, "Computer Security Lab Manual," McGraw-Hill, 2006, 755 pp., ISBN:0072255080.! Gert DeLaet, Gert X. Schauwers, "Network Security Fundamentals," Cisco Press, Sep-04, 400 pp., ISBN:1587051672.! Richard Bejtlich, "The Tao Of Network Security Monitoring: Beyond Intrusion Detection," Addison-Wesley, Jul-04, 798 pp., ISBN:321246772.! Eric Rescorla, "SSL and TLS: Designing and Building Secure Systems," Addison-Wesley, Oct-00, 499 pp., ISBN:201615983. 1-9

Supporting Books (Cont)! Jon C. Snader, "VPNs Illustrated: Tunnels, VPNs, and IPsec," Addison-Wesley Professional, Oct-05, 480 pp., ISBN:032124544X.! Matt Bishop, "Introduction to Computer Security," Addison- Wesley Professional, Oct-04, 784 pp., ISBN:0321247442.! Saadat Malik, "Network Security Principles and Practices," Macmillan Technical Pub, Nov-02, 400 pp., ISBN:1587050250.! Jan Harrington, "Network Security: A Practical Approach," Morgan Kaufmann Pub, Mar-05, 365 pp., ISBN:123116333.! Wenbo Mao, "Modern Cryptography: Theory and Practice," Prentice Hall Ptr, Jul-03, 648 pp., ISBN:0130669431. 1-10

Tentative Schedule 1-11

Tentative Schedule (Cont) 1-12

Tentative Schedule 1-13

Grading! Mid-Terms (Best 1 of 2) 30%! Final Exam 30%! Class participation 5%! Homeworks 15%! Project 20% 1-14

Projects! A survey paper on a network security topic " Wireless Network Security " Key Exchange Protocols " Comprehensive Survey: Technical Papers, Industry Standards, Products! A real attack and protection exercise on the security of a system (web server, Mail server, ) Groups of 2 students (Hacker and Administrator)! Average 6 Hrs/week/person on project + 9 Hrs/week/person on class! Recent Developments: Last 5 to 10 years Not in books! Better ones may be submitted to magazines or journals 1-15

Projects (Cont)! Develop a hack tool to break the security of a system.! Develop a tool to protect from the hack tool.! Goal: Provide an insight (or information) not obvious before the project.! Real Problems: Thesis work, or job! Homeworks: Apply techniques learnt to your system. 1-16

Project Schedule Mon 10/8/07 Mon 10/15/07 Mon 10/29/07 Mon 11/12/07 Mon 11/19/07 Mon 12/3/07 Topic Selection/Proposal References Due Outline Due First Draft/Demo Due Reviews/comments Returned Final Report Due 1-17

Office Hours! Monday: 11 AM to 12 noon Wednesday: 11 AM to 12 noon! Office: Bryan 405D! Teaching Assistant: Chakchai So-in, Bryan 516 1 hour/week Group meeting! CSE 571 Security Lab: Bryan 516 1-18

Frequently Asked Questions! Yes, I do use curve. Your grade depends upon the performance of the rest of the class.! All homeworks are due on the following Monday unless specified otherwise.! Any late submissions, if allowed, will *always* have a penalty.! All exams are open-book and extremely time limited.! Exams consist of numerical as well as multiple-choice (truefalse) questions.! There is a negative grading on incorrect multiple-choice questions. Grade: +1 for correct. -1/(n-1) for incorrect.! Everyone including the graduating students are graded the same way. 1-19

Summary! Goal: To prepare you for a job as a secure systems administrator! There will be a lot of self-reading and writing! Get ready to work hard 1-20

Student Questionnaire! Name:! Email:! Phone:! Degree: Expected Date:! Technical Interest Area(s):! Prior networking related courses/activities:! Prior security related courses:! If you have a laptop or desktop, it s operating system: Do you have a WiFi interface?! I agree to abide by the rules and will not use the techniques on any computer other than mine or CSE 571 security lab.! Signature: Date: 1-21

Lab Homework 1: Gathering Info Learn about IPconfig, ping, arp, nslookup, whois, tracert, netstat, route, hosts file 1. Find the IP addresses of www.google.com 2. Modify the hosts file to map www.google.com to 128.252.166.33 and do a google search. Remove the modification to the host file and repeat. 3. Find the domain name of 128.272.165.7 (reverse the address and add.inaddr.arpa) 4. Find the owner of wustl.edu domain 5. Find route from your computer to www.google.com 6. Find the MAC address of your computer 7. Print your ARP cache table. Find a server on your local network. Change its ARP entry in your computer to point to your computer s MAC address. Print new ARP cache table. Now use the service and see what happens. 8. Print your routing table and explain each line (up to line #20 if too many) 9. What is the number of packets sent with destination unreachable 10. Find the location of 128.252.166.33 (use ipaddresslocation.org) 1-22

Quiz 0: Prerequisites True or False? T F!! Subnet mask of 255.255.255.254 will allow 254 nodes on the LAN.!! Time to live (TTL) of 8 means that the packet can travel at most 8 hops.!! IP Address 128.256.210.12 is an invalid IP address!! CRC Polynomial x32+x15+1 will produce a 32 bit CRC.!! DHCP server is required for dynamic IP address assignment!! DNS helps translate an name to MAC address!! Port 80 is used for FTP.!! IPv6 addresses are 32 bits long.!! New connection setup message in TCP contains a syn flag.!! 192.168.0.1 is a public address. Marks = Correct Answers - Incorrect Answers = 1-23