Lecture: Network Security
You want to know how today´s attacks against networks work? You want to learn about countermeasures and how to secure your network? Then this is your lecture! The lecture introduces actual threats on and attacks against computer networks (e.g. worms, bot-nets). You will gain a practical insight into their functioning and damage potential. During the lecture, you will be hacking systems yourself, but also learn about security protocols and state-of-the-art defense measures, including Intrusion Detection Systems and Honeypots. So, if you are interested in network security and willing to work, we would be happy to see you in the first lecture.
Course:
- Responsible: Prof. Dr. Peter Martini, Dr. Jens Tölle, Wolfgang Moll
- Dates: Thu 15 (c.t.) - 17, weekly, AVZ III / HS 2
- Course number: 612113201
Exercises:
- Responsible: Prof. Dr. Peter Martini, Dr. Jens Tölle
- Dates: by arrangement, SR N102
- Course number: 612213201
Other:
- Term: Master Computer Science, Diploma (Graduate)
- Requirements: Content of "High Performance Networking" is prerequisite. Basic programming skills (see below)
- Faculty: MA-INF 3201; old DPO: B,C; new DPO: B
- Effort: 2.0 L + 1.0 E / 4.0 CP
- Follow-up/Side-events: A seminar will take place at the end of the lecture period. Subsequent to lectures "Data Communication and Internet Technology" and "Network Security" participating in a lab is possible.
Required Programming Skills
The lecture Network Security teaches security from a very practical point of view. This includes hands-on exercises, hacks and the development of countermeasures.
For students participating in the lecture it is mandatory to have basic programming skills. We are providing a self-test, which shows the level of your skills and tells you if you are capable to deal with the practical tasks. A "network programming" crash course is offered for those who might need a fresh-up in that area (c.f. below)
"Network Programming" crash course
We will also provide a "network programming" crash/fresh-up course as additional offer during the first two weeks of the lecture. The course does not teach basic programming but helps people that are not familiar with network programming to cope with the practical exercises more easily. The dates are:
Mailing List - "Network-Security"
The mailing list "Network-Security" is used for news concerning the lecture "Network Security". An additional purpose is to discuss problems, e.g. with viewing or printing slides or assignment sheets. More information on subscribing the mailing list can be found here.
Registration for Oral Exam
Slides and Presentations
Access to the files requires a username and password. Both will be announced in the first lecture.
Chapter | PDF-Files |
---|---|
0 – Preface | Slides 1-29 |
1 - Introduction | Slides 1-10 |
2 - Protocol Attacks | Slides 1-35 |
3 - Internet Worms | Slides 1-60 |
Worm Challenge | Slides 1-7 |
4 - Honeypots | Slides 1-20 |
5 - Cryptography | Slides 1-73 |
6 - Firewalls | Slides 1-39 |
7 - Network Infrastructure | Slides 1-44 |
8 - Building Secure Channels | Slides 1-21 |
9 - Botnets | Slides 1-28 |
10 - Security Protocols | Slides 1-72 |
11 - Authentication | Slides 1-39 |
12 - Attack Vectors | Slides 1-52 |
Assignment Sheets
The PDF-Files can be viewed and printed with Acrobat Reader. The program is available for free and installed on nearly all hosts of the institute.
Information on Tutorials/Exercises
PDF-file | Supplementary Slides | Further Information |
---|---|---|
sheet1 | ||
sheet2 | ||
sheet3 | attack trace | |
sheet4 | ||
sheet5 | deepinspect | |
sheet6 | ||
sheet7 | ||