The objective of this course is to provide a foundation of network related security issues. It builds upon concepts of security such as confidentiality, integrity and authentication and on cryptography. The course covers common attacks originating from the network, assessment of network security, prevention and detection of attacks, and response to attacks. Common attacks considered include attacks on TCP/IP and DDoS attacks. Prevention mechanisms considered include cryptographic protocols for dial-up security (PAP, CHAP, RADIUS, Diameter), WLAN security, IPSec & SSL based VPNs, e-mail
security (PGP, S/MIME); Kerberos; X.509 certificates; AAA and Mobile IP; SNMP security;.
Also perimeter defense using firewalls is considered (filters and gateways; policies and
implementation of firewall policies; Stateful firewalls; Firewall appliances). Detection and response schemes will review IDS and IPS, monitoring, housekeeping and management
schemes.
Prerequisites:
TELCOM 2810 or 2820, TELCOM 2310/2000, C or Java Programming
Contact Information:
Prashant Krishnamurthy
Office: DIST 718
Phone: 412-624-5144
E-mail: prashant AT mail DOT sis DOT pitt DOT edu
Course webpage: http://www2.sis.pitt.edu/~prashant/tel2821
Office hours: TBA
GSA: TBA
Textbooks (Required):
Network Security: Private Communication in a Public World - by C. Kaufmann, R. Perlman and M. Speciner, Prentice Hall PTR, 2002. (ISBN: 0130460192)
Firewalls and Internet Security - by W.R. Cheswick, S.M. Bellovin and A.D. Rubin, Addison-Wesley, 2003. (ISBN: 020163466X)
References:
Introduction to Network Security, by D. Jacobson, Chapman and Hall, 2009
Penetration Testing and Network Defense, by A. Whitaker and D. Newman, Cisco Press, 2005
Network Security Essentials, Second Edition, by W. Stallings, Prentice Hall, 2003.
Network Intrusion Detection: An Analyst's Handbook, by S. Northcutt and J. Novak, New Riders, Indianapolis, 2001.
Inside Network Perimeter Security, by S. Northcutt and others, New Riders,
Indianapolis, 2005.
Real 802.11 Security: Wi-Fi Protected Access and 802.11i, by J. Edney and W.A.
Arbaugh, Prentice Hall, 2004.
Mastering Networks: An Internet Lab Manual, by J. Liebeherr and M. El Zarki,
Addison-Wesley, 2003.
The Tao of Network Security Monitoring, by Richard Bejtlich, Addison-Wesley,
2004.
Computer Networks: Internet Protocols in Action, by Jeanna Matthews, John Wiley and Sons, 2005.
Network Security Assessment: Know Your Network, by Chris McNab, O'Reilly Books, 2004.
Computer Network Security by J.M. Kizza, Springer 2005.
Papers from conferences and journals
US-CERT/CERT advisories
Grading:
Homework/Labs 30%
Bi-Weekly Quiz 20%
Midterm 20%
Final 30%
Policies:
All work must be the student's own unless collaboration is explicitly
permitted. Any violation will result in an F without discussion.
Late assignments will not be accepted unless there are exceptional
circumstances.
Homework is due ONE week after it is assigned unless otherwise mentioned.
Homework will be assigned every week unless otherwise mentioned.
Check for homework on the webpage even if it is not explicitly mentioned
in class
Labs will be due TWO weeks after assignment
Students are responsible for doing the labs and submitting the reports
to the GSA
Check for lab instructions and changes on the webpage regularly
Keep checking the webpage for other changes regularly
All written work must be legible and clear to receive credit. Vagueness
in your work leading to misinterpretation is not a valid reason for credit.
Course Outline:
This schedule is only a guideline and is subject to change depending on the progression of the course. It will get updated with time.
Week 1: Introduction
Week 2: Networking basics and issues - Protocols and Architectures
Week 3: Discussion of some specific security attacks
Week 4: Prevention/Protection I: Firewalls - Types, architectures, deployment
Week 5: Prevention/Protection - II: Firewalls Continued; Cryptographic Protocols - I
Week 6: Cryptographic Protocols - II: Pitfalls
Week 7: Midterm Exam
Week 8: Link Security; Kerberos; PGP
Week 9: Wireless LAN Security
Week 10: Wireless Security II: WWANs, WPANs and Wireless Application Security
Week 11: VPNs: IPSec and SSL
Week 12: Detection - I: IDS and IPS
Week 13: Detection - II: Monitoring and Housekeeping
Week 14: Assessment of network security
Week 15: Final Exam