T. Andrew Yang
|
last updated: 9/4: Figure 4.6 added to
Q1.5 8/21/2024: first posted |
Total: 100
points
1)
(5 pts) Traffic Analysis
2)
(5
pts) Smurf attack
3)
(5 pts) Replay attacks
4)
(5 pts) Explain the
relationship between replay attacks and
Denial of Service attacks.
5)
(5
pts) Man-in-the-Middle Attacks
6)
(5
pts) Explain the relationship between DNS poisoning attacks and man-in-the-middle attacks.
7)
(5 pts) confidentiality
8)
(5 pts) integrity
9)
(5 pts) origin integrity
10)
(5 pts) availability
11)
(5 pts) non-repudiability
12)
(5 pts) How would the Layer-3 header (i.e., IP header) be
structured? Hint: Show the source address and the destination address.
13)
(5 pts) How would the Layer-2 header be structured? Hint: Show the source
address and the destination address.
14)
(5 pts) Explain how John’s default router would process the
packet sent from John’s computer.
15)
(5
pts) What are the forward
certificates and the reverse
certificates of entity W (a CA).
16)
(5
pts) In the given example, entity A can acquire the following
certificates from the directory to establish a certification path to B:
X<<W>> W<<V>>
V<<Y>> Y<<Z>> Z<<B>>
Explain
how A would verify this certification path in order to obtain the public
key of B. Hint: A’s certificate is issued by CA X; therefore it is implied that
A has X’s certificate pre-installed in its local directory.
17)
(5
pts) Suppose B wants to have C’s public key (for sending a confidential
message to C or to verify a signature signed by C). Show how the certification
path to C would be structured.
18)
(5
pts) Suppose a new entity, say D, has acquired a certificate from CA Y,
that is, Y<<D>>. Would B be able to verify D’s certificate? Justify
your answer. Hint: How would the certification path to D be structured?
19)
(5
pts, continued from above) Would A be able to verify D’s certificate? Justify
your answer. Hint: How would the certification path to D be structured?
Go
to the Index
Total: 100 points
Go
to the Index
Research topic: The Impact of Generative Artificial Intelligence (GAI) on Network
Security
GAI technologies
like ChatGPT and Bard use large language models (LLMs) and artificial neural
networks (ANN) to produce human-like responses or even creative work. GAI has
been adopted by corporations and companies to improve business efficiency. In
addition, the potential impact of GAI on network security is worthy of study.
In this project, you will conduct a survey to explore the intersection of those
two fields. First, would GAI help to improve network security; secondly, would
the use of GAI introduce new threats to the security of networks? You are
encouraged to investigate specific case studies and examples.
Note
1: This is an individual project.
Note 2: Make sure you properly cite the work of
other researchers or professionals. Visit http://sce.uhcl.edu/yang/citing.htm for
more information about cited references. Warning: Missing or improper cited references in your draft paper and/or the
final report will result in poor score for your research project. Do either
quotations or re-paraphrasing properly in your paper. Copying multiple
sentences or paragraphs from publications or online pages is NOT a proper way
of citing others’ work.
The goal of this
project is for you to visit refereed publications (as well as some relevant web
sites) to perform a detailed investigation of the research topic. The
University Library has online databases that could be used as a starting point
of your literature search.
Items to be
submitted:
A. The draft paper (including at least an abstract & initial
literature survey)
-
Research
topic
-
Your
name and an email address that you check regularly (that is, at least once a
day)
-
Class
name
-
The abstract of
your paper, including a general description of the topic and what you plan to
accomplish in the final paper
-
Survey
of related work: Discuss at least three articles related to
your chosen topic.
-
A
tentative outline (agenda) of your final report. That is, the
sections/subsections that you plan to include in the final paper.
To submit the
draft paper:
a. Create a thread in the Canvas discussion
board (with the subject line “Draft paper: <your full name>”) and post
your draft paper in that thread. Check the syllabus for the due date.
b. In addition, submit your abstract in
Canvas’s assignments page.
B. Online reviews of others’ draft papers
Review at least five draft
papers posted by your classmates. NOTE: This task should be completed within
one week after the draft paper’s due date.
C. The final paper
-
The final
paper should be 5-10 pages long (single-spaced), and include your
findings about the chosen topic.
-
The
following is a suggested outline of your final report:
-
Title
-
Your
name (and email address)
-
An
abstract (50-100 words)
-
Introduction
to the topic
-
Significance
of the chosen topic with respect to this course
-
Survey
of related work
-
Implemented
demonstrations, if applicable
-
Your
findings
-
Future
work: research ideas and projects related to the topic
-
Conclusion
-
Appendix
(if any)
To submit the
draft paper:
a. Create a thread in the Canvas discussion
board (with the subject line “Draft paper: <your full name>”) and post
your draft paper in that thread. Check the syllabus for the due date.
b. In addition, submit your abstract in
Canvas’s assignments page.
Warning
again: Missing or
improper cited references in your draft paper and/or the final report will
result in poor score for your research project.
Go to the Index