CSC524-F: Networks and Security
Prof. B. Rosenberg
Spring Semester, 2006 (062)
MWF 1:25-2:15
Memorial Building, Room 300
Announcements
- See Spring
2005 for an idea about this course.
- I am on a conference Mon, Feb 28, and the first week of May.
Textbooks
Suggested reading
- Security Engineering: A Guide to Building Dependable Distributed Systems, Ross Anderson.
- Radia Perlman, Interconnects: Bridges, Routers, Switches and
Internetworking Protocols.
- Douglas Comer, Internetworking with TCP/IP, Vol I: Principles, Protocols,
and Architecture.
- William R. Cheswick and Steven M. Bellovin, Firewalls and Internet
Security: Repelling the Wily Hacker.
Class notes
- Networking Concepts:
- ISO OSI Model: Physical, Link, Network and Transport Layers
- ISO OSI Model: Session, Presentation and Application Layers
- SDU's and PDU's, Peer-to-peer protocols
- LAN's v. WAN's
- Design criteria for networks
- Design Characteristics of a LAN
- Packet v. Connection
- Reliable communication using positive acknowledgement
- Address Models
- Physical Transmission of Data and the Datalink layer
- RS-232, serial communications
- Ethernet
- Wi-Fi
- Bridges, Switches, Hubs and Repeaters
- IP protocols: the Network and Transport layers
- Essential Network Services
- L3 Routing protocols
- Distance Vector: RIP
- Link State: OSPF
- DNS
- RFC 1034: Domain Names - Concepts and Facilities
- RFC 1035:
Domain Names - Implementation and Specification
- BOOTP and DHCP
- FTP, TFTP
- SMB, CIFS
- Accessing Network Resources
- Network Security
Assignments
-
Reading due Monday, 30 January:
-
Read Cisco's Introduction to Internetworking.
-
Read about LAN's and WAN's
-
Read about Ethernet
- Write a chat server/client.
Do this over this week, due Monday! We will move on to harder UDP based
protocols then.
- Teams of two allowed .. client and server.
- Use Sockets and UDP. See Beej's tutorial for information and examples.
-
Write an TFTP client/server.
Due: Monday, 13 March, 2006.
-
Setup a DNS server. Return the conf and database files and a script of
a client accessing the server.
Documentation
References
-
General Networking
-
Software engineering for security
-
WEP
- My RC4 example.
- CRC-32 failure of WEP.
- SecurityFocus review
- My RC4 example.
- CRC-32 failure of WEP.
- Attacks
on RC4 and WEP, Fluhrer, Mantin, Shamir, Cryptobytes Vol 5., No. 2, 2002,
pp 26-34.
-
KoreK attacks in chopper.
Korek
explains some of them.
-
Weakness in the Key Scheduling
Algorithm of RC4 Scott Fluhrer, Itsik Mantin, Adi Shamir.
-
Using the Fluhrer, Mantin, and
Shamir Attack to Break WEP Adam Stubblefield, John
Ioannidis, Aviel Rubin.
-
AirSnort source code.
Exploits
- Virus
-
Open Source Security Response Philosophy
-
Secure Operating Systems
- RFC's
- IPv6
- Port Knocking
- Cookies
- Topics for next term
- CAS, Yale CAS, UM CAS, and single signon
- Keychains, methods of key diversity
- Spam and Phishing counter-measures
- CDSA
- PKI and certificates