CS 6262 Network Security - PowerPoint PPT Presentation

1 / 22
About This Presentation
Title:

CS 6262 Network Security

Description:

Quality of our everyday life. Development of national/world economy. ... HIPPI, fiber channel, IP routing, frame relay, ATM, IP switching/tag switching. ... – PowerPoint PPT presentation

Number of Views:162
Avg rating:3.0/5.0
Slides: 23
Provided by: fengmi5
Category:
Tags: for | life | network | relay | security

less

Transcript and Presenter's Notes

Title: CS 6262 Network Security


1
CS 6262 - Network Security
  • Dr. Wenke Lee
  • wenke_at_cc.gatech.edu

The lecture notes have incorporated course
materials developed by Dr. S. Felix Wu of UC
Davis, Dr. Fengmin Gong of IntruVert, Dr. Matt
Bishop of UC Davis, and Dr. Henning Schulzrinne
of Columbia University.
2
Course Objectives
  • Understanding of basic issues, concepts,
    principles, and mechanisms in information
    security.
  • Security goals and threats to networking
    infrastructure and applications.
  • Introduction to cryptography.
  • Network security applications.
  • System security applications.
  • Exposure to commercial as well as research
    security technologies.

3
Course Styles
  • Descriptive what is out there.
  • Critical what is wrong with ...
  • Skill oriented homework, projects, papers.
  • Explore!
  • Interactive discussion and questions encouraged
    and considered in grade
  • Students are encouraged to present their findings
  • Information sharing home page and message
    board/email list.

4
Course Outline
  • Background
  • Review of networking technologies
  • Network security threats and counter measures
  • Cryptography
  • Secret key cryptography
  • Hashes and message digests
  • Public key cryptography
  • Information hiding

5
Course Outline - Contd
  • Network and system security applications
  • Authentication and security handshakes pitfalls
  • IP security
  • Web and E-commerce
  • Attacks to routing infrastructures and counter
    measures
  • DDoS and traceback
  • Virus/worm detection, firewalls, intrusion
    detection.
  • Hacking and forensics
  • Writing secure code

6
Prerequisites
  • Networking, operating systems, discrete
    mathematics, and programming (C or C, Java).
  • The right motivations.

7
Textbooks and References
  • Required textbooks -.
  • Network security PRIVATE communication in a
    PUBLIC world by Kaufman, Perlman, and Speciner.
  • This book is very comprehensive. I will follow it
    as much as possible.
  • Network security essentials applications and
    standards by William Stallings.
  • This book contains more recent technologies and
    will be used for the second half of the course.
  • Reference text(s) and papers- see web site.

8
Course Mechanics
  • WWW page http//www.cc.gatech.edu/classes/AY2003/
    cs6262_fall/
  • For course materials, e.g., lecture slides,
    homework files, papers, tools, etc.
  • Grading 40 homework, 25 project, 15 midterm,
    and 20 final
  • Course participation 5 extra credits.

9
Course Project
  • Can be (a combination of)
  • Design of new algorithms and protocols.
  • Or new attacks!
  • Analysis/evaluation of existing algorithms,
    protocols, and systems.
  • Vulnerabilities, efficiency, etc.
  • Implementation and experimentation.
  • Small team - one to three persons.
  • Proposal, work, and final demo/write-up.
  • Topics - see web page, but you can define your
    own with my approval.

10
Introduction to Networking and Introduction to
Computer Security
11
A Motivating Example
  • Requirements of an e-Commerce site
  • Performance
  • of current transactions
  • Usability
  • Easy to follow GUIs, convenience (cookies?)
  • Security
  • Secure transmission and storage of costumer
    financial/personal data
  • Protect the Web servers and the enterprise
    network from illegitimate access
  • Provide continuous/uninterrupted services

12
Networking Technologies
13
Trends by Application Demands
  • Hunger for bandwidth
  • Hardware (Physics) breakthroughs seem to come
    easier than software
  • Wider spectrum of application sophistication
  • Best-effort to guaranteed
  • Built-in security?
  • Drive for ubiquitous access
  • Economics/profitability

14
Quest for Better Services
  • Real-time audio/video requires guaranteed
    end-to-end delay and jitter bounds.
  • Adaptive multimedia application requires minimum
    bandwidth and loss assurance.
  • Intelligent application demands reliable feedback
    from the network.
  • Security.

15
Quest for Ubiquitous Access ...
  • Information age is a reality.
  • Everything depends on reliable and efficient
    information processing.
  • Quality of our everyday life.
  • Development of national/world economy.
  • Security of national defense/world peace.
  • Networking is one critical part of this
    underlying information infrastructure!

16
Economic Pressure
  • Service providers want the most bang on their
    buck - the most profitable technology?
  • Cautious adoption of new technologies
  • Even for security
  • Emphasis on leveraging deployed technologies
  • Increased utilization of existing facilities

17
Networking Technologies
  • Switching modes.
  • Circuit switching.
  • Packet switching - Ethernet, HIPPI, fiber
    channel, IP routing, frame relay, ATM, IP
    switching/tag switching.
  • High-speed transmission media.
  • SONET/SDH, WDM.
  • Ubiquitous access media.
  • xDSL/cable modem, IEEE802.11, LEOSs.
  • We will study the common security issues.

18
The Internet
19
Layered Store-and-forward
User A
User B
Application
Transport
Network
Link
20
Security Implications
  • Vulnerabilities - from weak design, to
    feature-rich implementation, to compromised
    entity
  • Heterogeneous networking technologies adds to
    security complexity
  • But improves survivability
  • Higher-speed communication puts more information
    at risk in given time period
  • Easier to attack than to defend
  • Ubiquitous access increases exposure to risks

21
The Good News ...
  • Plenty of basic means for end-user protection -
    authentication, access control, integrity
    checking
  • Intensive RD effort on security solutions
    (government sponsored research private industry
    development)
  • Increasing public awareness of security issues
  • New crops of security(-aware) researchers and
    engineers
  • YOU!

22
The Bad News ...
  • (Existing) information infrastructure as a whole
    is very vulnerable, which makes all critical
    national infrastructure vulnerable
  • e.g., Denial-of-service attacks are particularly
    dangerous to the Internet infrastructure
  • Do we continue to band-aid or re-design?
  • Serious lack of effective technologies, policies,
    and management framework
Write a Comment
User Comments (0)
About PowerShow.com