1 / 11

Network Security — Welcome and introduction

Network Security — Welcome and introduction. T-110.5241 Network security, Nov-Dec 2011 Tuomas Aura Aalto University. Lecturer. Lecturer: Tuomas Aura PhD from Helsinki University of Technology in 2000 Microsoft Research , UK, 2001–2009 Professor at Aalto 2008– Research:

Download Presentation

Network Security — Welcome and introduction

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network Security — Welcome and introduction T-110.5241 Network security, Nov-Dec 2011 Tuomas Aura Aalto University

  2. Lecturer • Lecturer: Tuomas Aura • PhD from Helsinki University of Technology in 2000 • Microsoft Research, UK, 2001–2009 • Professor at Aalto 2008– • Research: • Network security • DoS resistance • Security protocol engineering • Security of mobility protocols (Mobile IPv6, SEND, etc.) • Privacy of mobile users

  3. Required background • Students are expected to understand: • Networking technologies: TCP/IP, 802.11, UMTS etc. • Basic security concepts, e.g. T-110.4206 Information security technology • Basic cryptography, e.g. T-110.5211 Cryptosystems

  4. Lectures • Lecturer: Tuomas Aura • 12 lectures in Nov-Dec 2011 • Wednesdays 14:15-16 T4 • Thursdays 14:15-16 T6 • Attendance not mandatory but much of the material will only be covered in the lectures • No tutorial or exercise sessions

  5. Exercises • 5 exercise rounds, starting next week • Exercise problems in Noppa by Sunday each week (first round on 6 November) • Deadline on the following Sunday 23:59; reports to be returned to Rubyric • Course assistants • Aapo Kalliola and Jaakko Salo • email: t-110.5241@tkk.fi • Course assistants available in the Playroom for advice and equipment: • Tuesdays 16:15-18 room A120 • Thursdays 16:15-18 room A120 • Any exercises not returned in period II can be done in period III on a similar weekly schedule • Please do not ask to redo exercises unless critical to pass the course

  6. Advice for exercises • Try to solve all problems at least partly • The goal in many of the exercises is to learn how to find information and read standards • Individual work: It is ok to discuss with other students but do not copy or even read the written answers of others students. Do all practical experiments independently • You are allowed to cut and paste relevant short passages from standards, but mark it clearly as a ”quotation” and give the source, e.g. [RFC 1234, section 5.6.7]

  7. Assessment • First examination 12 Dec 2011 9-12 in T1 • Register for exams 1-2 weeks before • Examination scope: lectures, protocol standards, recommended reading material, exercises, good general knowledge of the topic area • Exercises are not mandatory but strongly recommended • Marking: • exam max. 30 points • exercises max 5 x 20 = 100 points • grading based on total points = exam + (exercises / 10) (total max 30+10=40 points) • Course feedback is mandatory

  8. Goals • Know common communications systems, classic security mechanisms, standard security solutions, and some of the latest ideas • Understand network security technologies, their properties and limitations to use them right • Be aware of the pitfalls in security engineering: security is not just mathematics or just code • Learn the adversarial mindsetof security engineering • Basic security analysis of network security protocols • Starting point for learning more on the job or in further studies • Another goal: learning to read protocol standards

  9. Tentative course outline • Network security threats and goals • Email security, advanced PKI • TLS / SSL internals • Security protocol design, Kerberos • WLAN security • Multicast and routing security • Firewalls, IPsec • Cellular network security • Securing mobility • Network intrusion detection (NN) • Denial of service (Aapo Kalliola) • Anonymity Changes to this plan are likely.

  10. Recommended reading • William Stallings,Network security essentials: applications and standards, 4th ed., Pearson Prentice Hall, 2010 (or 3rd ed.) • Kaufman, Perlman, and Speciner, Network security: PRIVATE communication in a PUBLIC world, Prentice-Hall, 2002 (somewhat old) • RFCs and standards, web links from Wikipedia

  11. Course feedback and development • Students felt the course was not too much work.Credits increased from 4 to 5. The weight of the exercises in the grading increased accordingly. • We have increased the role of hands-on exercises, which were popular. • The fall semester is rather busy for many students. We added the option to do all or some exercises in period III. • No introductory wireshark exercise because it was already familiar to students. • Leaving out parts that overlap with more basic courses. Slides on some such topics are included in the reading material, though. • Trying to explain better the purpose of the standards-related exercises. The aim is to learn to read protocol standards and to find authoritative answers to questions. Thus, it is not sufficient to Google for the answers in Wikipediabut everyone should refer to the original standard text. • Adding a protocol design or analysis puzzle to each lecture. Decided to do this instead of additional homeworkto limit the course workload.

More Related