Lecture: Network Security

You want to know how today’s attacks against networks work? You want to learn about countermeasures and how to secure your network? Then this is your lecture! The lecture introduces actual threats on and attacks against computer networks (e.g. worms, bot-nets). You will gain a practical insight into their functioning and damage potential. During the lecture, you will be hacking systems yourself, but also learn about security protocols and state-of-the-art defense measures, including Intrusion Detection Systems and Honeypots. So, if you are interested in network security and willing to work, we would be happy to see you in the first lecture.

Course:

Exercises:

Other:

  • Term: Master
  • Requirements: Basic programming skills and understanding of computer networks concepts.
  • Faculty: MA-INF 3201
  • Effort: 2.0 L + 2.0 E / 6CP
  • Follow-up/Side-events: A seminar will take place at the end of the lecture period. Subsequent to the lecture, participating in a lab is possible.

Announcements

The first lecture will be held on Wed, 11.04.2018.

The first exercise will be held on Wed, 18.04.2016.

Slides and Presentations

ChapterPDF Files

1 – Preface and Introduction

  •  History: ARPAnet, evolution and security implications
  •  Characteristics of cyberspace
  •  Cybercrime
  •  Examples of important cyber incidents
  •  Cyber Warfare
  •  Security Risks

undefinedHandout Chapter 1

undefinedSlides Chapter 1

2 – Attack Overview

  •  Protection targets
  •  Cybersecurity reports
  •  Taxonomies
  •  (Cyber) Kill Chain
  •  6-Tier Attack Model and applicaton
  •  Attack techniques, e.g. DDoS, Spoofing...
  •  Attacks on Layer 1
  •  Supply Chain & Hardware-based attacks

undefinedHandout Chapter 2

undefinedSlides Chapter 2

3 – OWASP Catalogue

  •  What framewords like OWASP can provide...
  •  ... and what they can't!
  •  Detailed discussion on XSS
  •  Attacks on SSL/TLS
  •  Real-world patching
  •  Error sources and estimations

undefinedHandout Chapter 3

undefinedSlides Chapter 3

4 – Cryptography

  • Realizing confidentiality, integrity and authentication
  • Encryption, symmetric and asymmetric techniques
  • Key exchange
  • Algorithms, stream and block ciphers
  • Hashing
  • Certificates

undefinedHandout Chapter 4

undefinedSlides Chapter 4

5 – Secure Infrastructure

   Part 1 (5-1)

  • Authentication and Encryption
  • Authenticated Encryption Schemes
  • Key Management
  • Authentication Protocols

 Part 2 (5-2)

  • Secure End-to-End Communication
  • Authentication Framework
  • WEP, WPA, WPA2, resp. attacks, WPA3

Part 3 (5-3)

  • Network Infrastructure & Management
  • Layer 2 Security
  • Software Defined Networking
  • Challenges of Critical Infrastructures

undefinedHandout Chapter 5-1

undefinedSlides Chapter 5-1

 

undefinedHandout Chapter 5-2

undefinedSlides Chapter 5-2

 

undefinedHandout Chapter 5-3

undefinedSlides Chapter 5-3

6 – Security Aspects of IPv6

  • Transition of IPv4 to IPv6
  • Key aspects of IPv6
  • General aspects of IPv6 and security
  • IPv6 attack scenarios

undefinedHandout Chapter 6

undefinedSlides Chapter 6

7 – IDS, IPS & Penetration Testing

  • Intrusion Detection Systems
  • IDS in Encrypted Networks and ICS
  • Security Tests
  • Risk Assessment

undefinedHandout Chapter 7

undefinedSlides Chapter 7

 

Tutorials

ChapterPDF Files

0 – Introduction

undefinedSlides Tutorial Intro

1 – SecLab and GitLab Info Sheet

undefinedSecLab/GitLab Info

2 – Tutorial schedule

undefinedSchedule