Welcome to 18-731: Network Security
Instructor: Adrian
Perrig, office hours Friday 4-5pm in CIC 2110.
TAs: Charles Fry (office hours Tuesday 4:30-5:30pm in CIC 2214),
Ahren Studer (office
hours Wednesday 1:30-3pm in CIC 2214), and Akash Zaveri (office hours
Monday
2-4pm in INI 225).
We will meet Monday and Wednesday in Hamerschlag Hall B103
4:30-5:50pm.
Course Description:
Some of
today's most damaging attacks on computer systems involve exploitation
of network infrastructure, either as the target of attack or as a
vehicle to advance attacks on end systems. This course provides an
in-depth study of network attack techniques and methods to defend
against them. Topics include firewalls and virtual private networks;
network intrusion detection; denial of service (DoS) and distributed
denial-of-service (DDoS) attacks; DoS and DDoS detection and reaction;
worm and virus propagation; tracing the source of attacks; traffic
analysis; techniques for hiding the source or destination of network
traffic; secure routing protocols; protocol scrubbing; and advanced
techniques for reacting to network attacks.
The course will involve a substantial research project and some smaller
programming projects in C, students are expected to have a solid
foundation in
C and Unix programming.
Students are also expected to have passed the introductory security
classes
18-630 or 18-730 and understand concepts of applied cryptography. To
refresh this material, you can read the following chapters in Bruce
Schneier's
Applied
Cryptography: 2, 3, 4, 5, 7, 8, 9, 11, 12, 18, 19.3, 22. Students
that took 18-630 need to review Chapter 9, as we did not cover that
material
in 18-630.
Syllabus
Suggested (optional) Textbook:
Cryptography
and Network Security: Principles and Practice (4th edition) by
Stallings.
Late Policy:
The deadline for any assignment can be extended with a 10% penalty per
day. No deadline can be extended by more than two days. so assignments
will NOT be accepted 48 hours after the due date.
Collaboration Policy:
Students are encouraged to talk to each other, to the TAs, to the
instructor, or to anyone else about any of the assignments. Any
assistance, though, must be limited to discussion of the problem and
sketching general approaches to a solution. Each student must write out
his or her own
solutions to the homeworks. Consulting another student's or group's
solution
is prohibited, and submitted solutions may not be copied from any
source.
These and any other form of collaboration on assignments constitute
cheating.
If you have any question about whether some activity would constitute
cheating,
please feel free to ask.
Grading:
Your final grade for the course will be based on the following weights
for the individual assignments:
- 20% Homeworks
- 20% Small projects
- 25% Research project
- 25% Midterm
- 10% Participation
The midterm and final exams will be closed-book.