Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: International Computing Institute

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Z:\wwwhome\courses\Z_528_files\menustart.gif

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Z:\wwwhome\courses\Z_528_files\menu0.gif

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Z:\wwwhome\courses\Z_528_files\menusep.gif

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Z:\wwwhome\courses\Z_528_files\menu1.gif

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Z:\wwwhome\courses\Z_528_files\menusep.gif

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Z:\wwwhome\courses\Z_528_files\menu2.gif

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Z:\wwwhome\courses\Z_528_files\menusep.gif

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Z:\wwwhome\courses\Z_528_files\menu3.gif

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Z:\wwwhome\courses\Z_528_files\menusep.gif

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Z:\wwwhome\courses\Z_528_files\menu4.gif

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Z:\wwwhome\courses\Z_528_files\menusep.gif

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Z:\wwwhome\courses\Z_528_files\menu5.gif

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Z:\wwwhome\courses\Z_528_files\menuend.gif

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: This is the current page!
 

 

UBE 528
NETWORK SECURITY
2017-2018 SPRING


 

Catalog Data: Network Security, 3 hour lectures
Principles of Network Attacks and Defenses, Cryptography, Authentication and E-mail security

Instructor: PROF.DR.M.E.DALKILIC


Textbooks

·         Counter Hack, 2nd. Ed., Ed Skoudis, 2005

·         W. Stallings, Cryptography and Network Security: Principles and Practice, 4th ed., Prentice-Hall, 2006

·         C. Kaufman, R. Perlman and M. Speciner, Network Security 2nd ed, Pren-Hall,2003

 

Referenences

·         Computer Networking, 6th ed. Kurose and Ross, 2013


Goals: A survey of network security technology. Each of the basic building blocks of network security, including conventional and public-key cryptography, authentication, and digital signatures are covered. In addition methods for countering hackers and viruses are explored. The course covers important network security applications such as PGP, PEM, Kerberos, and X509, DSS security

Prerequisites: Fundamental Concepts in Computer Networks, Graduate standing

 

Topics:

 

·         Introduction

·         Attacks

·         Hash functions

·         User/Web authentication

·         Symmetric Encryption

·         Attacks, Denial of Service

·         Spam, Antispam

·         Wi-fi, RFID, VoIP security

·         Intruders, viruses and worms

·         Public key cryptography

·         PKI and certificates

·         IP and WEB security

·         Firewalls

·         Anonimity networks

 



Grading (tentative):

  • Homeworks 20%
  • Midterm, 25% (date: April 4th, 2018)
  • Project, 20%
  • Final Exam, 35% SampleFinalExam

 

Final Exam date: June 6th, 2018 Important Note: Two A4 help sheet is allowed during the midterm exam. You can write (no photocopying allowed!) on both sides of the help sheet.

Morning section (UBI528) exam starts at: 09:30

Evening section (UTI502) exam starts at: 18:00

 

BÜTÜNLEME date: June 27th, 2018 Important Note: Two A4 help sheet is allowed during the midterm exam. You can write (no photocopying allowed!) on both sides of the help sheet.

Morning section (UBI528) exam starts at: 09:00

Evening section (UTI502) exam starts at: 18:30

 

 

Useful material mostly from Keith Ross’s Network Security Course

 

Project Dates:

· Proposal : April 11th, 2018 (e-mail  to mehmet.emin.dalkilic@ege.edu.tr)

· Presentation :  last week of the term i.e., May 23rd 2018 (in class)

· Report :  During the presentation (submit hard copy)

· Individual or two-people projects are allowed

·         Implementation projects or literature survey/ product security analysis type projects are accepted

·         All Reports and Presentations will be in TURKISH!

·         Sample Project topics:

1.      Internet Privacy

2.      Internet anonymity

3.      Malware

4.   Steganography 

5.      Digital Watermarking

6.      Mobile (electronic) signature

7.      Smart Card applications

8.      Authentication applications- BAN Logic

9.      secure electronic voting 

10.  e-money (bitcoin)

11. Latest Firewall technology

12. Latest IDS technology

13. White box cryptography

14. Block Chain Technology

 

Homework #1 (due: Feb. 28th, 2018)

1.Five layer Network model (Application, Transport, Network, Data Link, Physical), briefly explain the function of each layer.

2. For each layer mentioned above list the most important protocol or protocols (at most two for each layer) and briefly explain what does each protocol do.

 

Homework #2

(Due date: March 7th, 2018)

1. Explain the Smurf Attack.

2. Explain source routing and spoofing attack using source routing.

3. Explain (switch) port stealing and its use in a session hijacking attack.

Hint: A good source is the text: Counter Hack, 2nd ed., Ed Skoudis, 2005.

 

 

 

Midterm Exam date: April 4th, 2018 Important Note: An A4 help sheet is allowed during the midterm exam. You can write (no photocoying allowed!) on both sides of the help sheet.

 

 


Send any comments or suggestions to dalkilic
Last revised in March, 10 1997

 

 

 

 

 

 

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Z:\wwwhome\courses\Z_528_files\substart.gif

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Z:\wwwhome\courses\Z_528_files\subsep.gif

Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Z:\wwwhome\courses\Z_528_files\subend.gif