Lecture: Network Security
You want to know how today’s attacks against networks work? You want to learn about countermeasures and how to secure your network? Then this is your lecture! The lecture introduces actual threats on and attacks against computer networks (e.g. worms, bot-nets). You will gain a practical insight into their functioning and damage potential. During the lecture, you will be hacking systems yourself, but also learn about security protocols and state-of-the-art defense measures, including Intrusion Detection Systems and Honeypots. So, if you are interested in network security and willing to work, we would be happy to see you in the first lecture.
Course:
- Responsible: Prof. Dr. Peter Martini, Dr. Jens Tölle
- Start: 14.04.2016
- Dates: Thu 16:30 - 18:00, weekly, LBH III.03
- Course number: 612113201
Exercises:
- Responsible: Dr. Jens Tölle, Jonathan Chapman, Martin Clauß, Martin Lambertz, Christian Meier
- Start: 28.04.2016
- Dates: Thu 15:00 - 16:30, bi-weekly, LBH II.27/27a
- Course number: 612213201
Other:
- Term: Master Computer Science
- Requirements: Content of "High Performance Networking" is a prerequisite. Basic programming skills (see below).
- Faculty: MA-INF 3201; B-IT Media Informatics;
- Effort: 2.0 L + 2.0 E / 6CP(MA); 4CP(B-IT MI);
- Follow-up/Side-events: A seminar will take place at the end of the lecture period. Subsequent to lectures "High Performance Networking" and "Network Security" participating in a lab is possible.
Announcements
The first lecture will be held on Thu, 14.04.2016.
The first exercise will be held on Thu, 28.04.2016.
Remarks
Required Programming Skills
The lecture Network Security teaches security from a very practical point of view. This includes hands-on exercises, hacks and the development of countermeasures. For students participating in the lecture it is mandatory to have basic programming skills. We are providing a self-test, which shows the level of your skills and tells you if you are capable to deal with the practical tasks.
Application for an account in the Network Security Lab
Please see "Information on Tutorials/Exercises" below.
Slides and Presentations
Chapter | PDF Files |
---|---|
0 – Preface
| |
1 – Introduction
| |
2 – Attack OverviewProtocol Attacks
| |
3 – Attack Vector SQL Injection | |
4 – CryptographyBasics & Networking Applications Encryption
| |
5 – Building Secure ChannelsAuthenticated Encryption Schemes
| |
6 – AuthenticationAuthentication Protocols:
| |
7 – Network InfrastructureNetwork Infrastructure and Management
| |
8 – FirewallsCisco Access Control Lists
| |
9 – Malware spreading
| |
10 – Botnets | |
11 – Attack Vector Buffer Overflow | |
Assignment Sheets
Information on Tutorials/Exercises: Exercise-Organization.pdf
Information on "SecLab", our security laboratory: seclabinfo.pdf
How to cite correctly: how_to_cite_correctly.pdf
Publication Date | PDF File | Supplementary Material | Submission Deadline | Scheduled Exercise |
---|---|---|---|---|
Thu, 14.04.2016 | Assignment Sheet 1 | none: voluntary sheet | Thu, 28.04.2016 | |
Thu, 28.04.2016 | Assignment Sheet 2 | traffic.pcap | Tue, 10.05.2016 23:59:59 | Thu, 12.05.2016 |
Thu, 12.05.2016 | Assignment Sheet 3 | Tue, 24.05.2016 23:59:59 | Thu, 02.06.2016 | |
Thu, 26.05.2016 | Assignment Sheet 4 | sniffer.py | Tue, 07.06.2016 23:59:59 | Thu, 09.06.2016 |
Thu, 09.06.2016 | Assignment Sheet 5 | Tue, 21.06.2016 23:59:59 | Thu, 23.06.2016 | |
Thu, 23.06.2016 | Assignment Sheet 6 | Tue, 05.07.2016 23:59:59 | Thu, 07.07.2016 | |
Mon, 11.07.2016 | Assignment Sheet 7 | none: voluntary sheet | Thu, 21.07.2016 |