T. Andrew Yang
|
last updated: 10/26: Lab 2
posted 9/20: Lab 1.5 updated 9/7/2022: Research project
posted 8/31/2022: Lab 1 posted 8/27/2022: first posted |
Total: 100
points
1)
(5 pts) Traffic Analysis
2)
(5
pts) Smurf attack
3)
(5 pts) Replay attacks
4)
(5 pts) Explain the
relationship between replay attacks and
Denial of Service attacks.
5)
(5
pts) Man-in-the-Middle Attacks
6)
(5
pts) Explain the relationship between DNS poisoning attacks and man-in-the-middle attacks.
7)
(5 pts) confidentiality
8)
(5 pts) integrity
9)
(5 pts) origin integrity
10)
(5 pts) availability
11)
(5 pts) non-repudiability
12)
(5 pts) How would the Layer-3 header (i.e., IP header) be
structured? Hint: Show the source address and the destination address.
13)
(5 pts) How would the Layer-2 header be structured? Hint: Show the
source address and the destination address.
14)
(5 pts) Explain how John’s default router would process the
packet sent from John’s computer.
15)
(5
pts) What are the forward
certificates and the reverse
certificates of entity W (a CA).
16)
(5
pts) In the given example, entity A can acquire the following
certificates from the directory to establish a certification path to B:
X<<W>> W<<V>>
V<<Y>> Y<<Z>> Z<<B>>
Explain
how A would verify this certification path in order to obtain the public
key of B. Hint: A’s certificate is issued by CA X; therefore
it is implied that A has X’s certificate pre-installed in its local directory.
17)
(5
pts) Suppose B wants to have C’s public key (for sending a confidential
message to C or to verify a signature signed by C). Show how the certification
path to C would be structured.
18)
(5
pts) Suppose a new entity, say D, has acquired a certificate from CA Y,
that is, Y<<D>>. Would B be able to verify D’s certificate? Justify
your answer. Hint: How would the certification path to D be structured?
19)
(5
pts, continued from above) Would A be able to verify D’s certificate? Justify
your answer. Hint: How would the certification path to D be structured?
Go
to the Index
Total: 100 points
Go
to the Index
Research topic: What is Zero Trust? Is it a hype or a new paradigm?
To help you get started, view
the following videos:
-
Zero
Trust: https://youtu.be/VukTt8Y22yg
-
The
Fallacy of the "Zero-Trust Network": https://www.youtube.com/watch?v=tFrbt9s4Fns&t=735s
Note 1: This is an individual project.
Note 2: Make sure you properly cite the work of other researchers
or professionals. Visit http://sce.uhcl.edu/yang/citing.htm
for more information about cited references. Warning: Missing or improper cited references in your
draft paper and/or the final report will result in poor score for your research
project. Do either quotations or re-paraphrasing properly in your paper.
Copying multiple sentences or paragraphs from publications or online pages is
NOT a proper way of citing others’ work.
The goal of this project is for you to visit refereed publications
(as well as some relevant web sites) to perform a detailed investigation of the
research topic. The University Library has online databases that could be used
as a starting point of your literature search.
Items to be submitted:
The draft
paper should be 1-2 pages long (single-spaced), and contains the following
sections:
(1) Research topic
(2) Your name and an email address that you
check regularly (that is, at least once a day)
(3) Class name (i.e., CSCI5235 Network
Security)
(4) The abstract of your paper, including a
general description of the topic and what you plan to accomplish in the final
paper
(5) Survey of related work: Discuss at
least three articles related to your chosen topic.
(6) A tentative outline (agenda) of your final
report. That is, the sections/subsections that you plan to include in the final
paper.
To submit the draft paper, create a thread in the Blackboard
discussion board (with the subject line “Draft paper: <your full name>”)
and post your draft paper in that thread. Check the syllabus for the due date.
Review at least five draft papers posted by your
classmates. NOTE: This task should be completed within two weeks after
the draft paper’s due date.
1.
The
final paper should be 5-10 pages long (single-spaced), and include your
findings about the chosen topic.
2.
The
following is a suggested outline of your final report:
i. Title
ii. Your name (and email address)
iii. An abstract (50-100 words)
iv. Introduction to the topic
v. Significance of the chosen topic with
respect to this course
vi. Survey of related work
vii. Implemented demonstrations, if applicable
viii.
Your
findings
ix. Future work: research ideas and projects
related to the topic
x. Conclusion
xi. Appendix (if any)
To submit the final paper, create a thread
in the Blackboard discussion board (with the subject line “Final paper:
<your full name>”) and post your paper in that thread. Check the syllabus
for the due date.
Warning
again: Missing or improper
cited references in your draft paper and/or the final report will result in
poor score for your research project.
Go to the Index