UBE 528
NETWORK SECURITY
2017-2018 SPRING
Catalog
Data: Network
Security, 3 hour lectures
Principles of Network Attacks and Defenses, Cryptography, Authentication
and E-mail security
Instructor: PROF.DR.M.E.DALKILIC
Textbooks
·
Counter Hack, 2nd. Ed., Ed Skoudis, 2005
·
W. Stallings, Cryptography and Network Security:
Principles and Practice, 4th ed., Prentice-Hall, 2006
·
C. Kaufman, R. Perlman and M. Speciner, Network
Security 2nd ed, Pren-Hall,2003
Referenences
·
Computer Networking, 6th ed. Kurose and Ross, 2013
Goals: A survey of network security technology. Each of the basic
building blocks of network security, including conventional and public-key
cryptography, authentication, and digital signatures are covered. In
addition methods for countering hackers and viruses are explored. The
course covers important network security applications such as PGP, PEM,
Kerberos, and X509, DSS security
Prerequisites: Fundamental Concepts in Computer Networks, Graduate
standing
Topics:
·
Introduction
·
Attacks
·
Hash functions
·
User/Web authentication
·
Symmetric Encryption
·
Attacks, Denial of Service
·
Spam, Antispam
·
Wi-fi, RFID, VoIP security
·
Intruders, viruses and worms
·
Public key cryptography
·
PKI and certificates
·
IP and WEB security
·
Firewalls
·
Anonimity networks
Grading (tentative):
- Homeworks
20%
- Midterm, 25%
(date: April 4th, 2018)
- Project, 20%
- Final Exam,
35% SampleFinalExam
Final Exam date: June 6th, 2018 Important Note: Two A4 help sheet is allowed during the
midterm exam. You can write (no photocopying allowed!) on both sides of the
help sheet.
Morning section (UBI528)
exam starts at: 09:30
Evening section (UTI502) exam starts at: 18:00
BÜTÜNLEME date: June 27th, 2018 Important
Note: Two A4 help sheet is allowed during the midterm exam. You can write
(no photocopying allowed!) on both sides of the help sheet.
Morning section (UBI528) exam starts at: 09:00
Evening section (UTI502) exam starts at: 18:30
Useful material mostly from Keith
Ross’s Network Security Course
Project Dates:
· Proposal : April 11th, 2018 (e-mail to
mehmet.emin.dalkilic@ege.edu.tr)
· Presentation : last week
of the term i.e., May 23rd 2018 (in class)
· Report : During the presentation (submit
hard copy)
· Individual or two-people projects are allowed
·
Implementation projects or literature survey/ product
security analysis type projects are accepted
·
All Reports and Presentations will be in TURKISH!
·
Sample
Project topics:
1. Internet Privacy
2. Internet
anonymity
3. Malware
4. Steganography
5. Digital
Watermarking
6. Mobile
(electronic) signature
7. Smart Card
applications
8. Authentication
applications- BAN Logic
9. secure electronic
voting
10. e-money (bitcoin)
11. Latest
Firewall technology
12. Latest IDS
technology
13. White box
cryptography
14. Block Chain
Technology
Homework #1 (due: Feb. 28th,
2018)
1.Five layer Network model (Application,
Transport, Network, Data Link, Physical), briefly explain the function of
each layer.
2. For each layer
mentioned above list the most important protocol or protocols (at most two
for each layer) and briefly explain what does each protocol do.
Homework #2
(Due date: March 7th, 2018)
1. Explain the Smurf Attack.
2. Explain source routing and spoofing attack using source routing.
3. Explain (switch) port stealing and its use in a session hijacking attack.
Hint: A good source is the text: Counter Hack, 2nd ed., Ed Skoudis,
2005.
Midterm Exam date: April 4th, 2018 Important Note: An A4 help sheet is allowed during the
midterm exam. You can write (no photocoying allowed!) on both sides of the
help sheet.
Send any comments
or suggestions to dalkilic
Last revised in March, 10 1997
|