Lecture: Network Security
You want to know how today´s attacks against networks work? You want to learn about countermeasures and how to secure your network? Then this is your lecture! The lecture introduces actual threats on and attacks against computer networks (e.g. worms, bot-nets). You will gain a practical insight into their functioning and damage potential. During the lecture, you will be hacking systems yourself, but also learn about security protocols and state-of-the-art defense measures, including Intrusion Detection Systems and Honeypots. So, if you are interested in network security and willing to work, we would be happy to see you in the first lecture.
Course:
- Responsible: Prof. Dr. Peter Martini, Dr. Jens Tölle
- Start: Thu, April 18th 2013
- Dates: Thu 16:30 - 18:00, weekly, LBH III.03a
- Course number: 612113201
Exercises:
- Responsible: Dr. Jens Tölle, Saffija Kasem-Madani, Martin Lambertz, Rafael Uetz
- Dates: Thu 15:00 - 16:30, weekly, LBH II.27/27a
- Course number: 612213201
Other:
- Term: Master Computer Science, Diploma (Graduate)
- Requirements: Content of "High Performance Networking" is prerequisite. Basic programming skills (see below).
- Faculty: MA-INF 3201; Media Informatics; old DPO: B,C; new DPO: B
- Effort: 2.0 L + 2.0 E / 6CP(MA); 4CP(B-IT MI); 4CP(Diplom)
- Follow-up/Side-events: A seminar will take place at the end of the lecture period. Subsequent to lectures "Data Communication and Internet Technology" and "Network Security" participating in a lab is possible.
Announcements
The first lecture will be held on Thu, April 18th 2013! The first exercise will take place on April 25th 2013!
Remarks
Required Programming Skills
The lecture Network Security teaches security from a very practical point of view. This includes hands-on exercises, hacks and the development of countermeasures. For students participating in the lecture it is mandatory to have basic programming skills. We are providing a self-test, which shows the level of your skills and tells you if you are capable to deal with the practical tasks.
Application for an account in the Network Security Lab
To apply for an account in the Network Security Lab, please write an e-mail to Rafael Uetz. Your e-mail should contain your full name and your usual unix/windows login name used in the university network. With your application, you also accept the Terms of Use.
Slides and Presentations
Access to the files requires a username and a password. Both will be announced in the first lecture.
Chapter | PDF-Files |
---|---|
0 – Preface | Slides 1-23 (1.318.656 Bytes) |
1 – Introduction
| Slides 1-24 (425.225 Bytes) |
2 – Attack OverviewProtocol Attacks
| Slides 1-35 (1.531.012 Bytes) |
3 – Attack Vector SQL Injection | Slides 1-19 (243.278 Bytes) |
4 – Cryptography Basics & Networking ApplicationsEncryption
| Slides 1-73 (756.322 Bytes) |
5 – Building Secure ChannelsAuthentication and Encryption
Key Management
| Slides 1-27 (402.880 Bytes) |
6 – AuthenticationAuthentication Protocols
Authentication Frameworks
| Slides 1-43 (612.933 Bytes) |
7 – Network InfrastructureNetwork Infrastructure and Management
Layer 2 Security
| Slides 1-34 (366.574 Bytes) |
8 – FirewallsCisco Access Control Lists
UNIX iptables
Network Address Translation (NAT)
| Slides 1-40 (729.457 Bytes) |
9 – Internet Worms
| Slides 1-61 (746.584 Bytes) |
10 – Botnets | Slides 1-17 (363.273 Bytes) |
11 – Attack Vector Buffer Overflow | Slides 1-37 (659.112 Bytes) |
Assignment Sheets
The PDF files can be viewed and printed with Acrobat Reader. The program is available for free and installed on nearly all hosts of the institute.
Information on Tutorials/Exercises: Presentation [PDF] from 18.04.2013
Information on "SecLab", our security laboratory: Information Sheet [PDF] from 18.04.2013
Publication Date | PDF-file | Supplementary Material | Further Information | Submission Deadline | Scheduled Exercise |
---|---|---|---|---|---|
18.04.2013 | Sheet 1 | 24.04.2013 23:59:59 CEST | 25.04.2013 15:00 | ||
25.04.2013 | Sheet 2 | attack-trace.pcap | 01.05.2013 23:59:59 CEST | 02.05.2013 15:00 | |
02.05.2013 | Sheet 3 | 13.05.2013 23:59:59 CEST | 16.05.2013 15:00 | ||
16.05.2013 | Sheet 4 | 03.06.2013 23:59:59 CEST | 06.06.2013 15:00 | ||
06.06.2013 | Sheet 5 | 17.06.2013 23:59:59 CEST | 20.06.2013 15:00 | ||
20.06.2013 | Sheet 6 | 01.07.2013 23:59:59 CEST | 04.07.2013 15:00 | ||
04.07.2013 | Sheet 7 | 15.07.2013 23:59:59 CEST | 18.07.2013 15:00 |