T. Andrew Yang

 

Email: yang@uhcl.edu

Web page:  http://sce.uhcl.edu/yang/

Tel.: (281) 283-3835

Last updated:

7/24/2012: updated  schedule and slides

7/10/2012: updated  schedule and slides

6/26/2012: updated schedule

6/19/2012: slides updated

6/14/2012: Cisco resources, slides updated

6/8/2012: topics rescheduled

6/4/2012: first published

 

CSCI 5235 Network Security
Summer 2012   (6/4
8/4)

 

·       Class Notes, Topics & Schedule

 

·       Projects            TA Hours

- Before each class, print out the class notes and bring them to the class.

  • Discussion group for this class:
    • If you have not joined the class discussion group yet, check your email to find an invitation to join http://groups.google.com/group/csci5235-summer-2012. Send an email to the instructor if you cannot find the invitation or if there is any issue joining in.
    • Check the discussion group for announcements & reminders. 
    • Feel free to send questions to the group for discussions.

Time & Classroom

Tues. & Thur. 6-8:30pm (Delta 202)

Course Prerequisite:  CSCI5233 Computer Security and CSCI4132 Network Protocols (or csci5132 Internet Protocols), or the instructors approval.

Course Objectives:  This course provides an essential study of computer security issues and methods in networking systems. Topics to be covered include review of networking, advanced cryptography, access control, distributed authentication, TCP/IP security, firewalls, IPSec, Virtual Private Networks, intrusion detection systems, and advanced topics such as wireless security, identity management, etc.

Class Format:  Lectures are combined with discussions and, if applicable, student presentations and discussions of advanced topics.  Students are expected to be active participants, by studying the relevant chapters and/or research papers, and participating at in-class discussions.

Learning Outcomes: The student, after having successfully completed the class, should be able to

1.     Understand fundamental security issues in computer networks

2.     Understand the common mechanisms used in securing a network

3.     Design a TCP/IP network with IP Security

4.     Design and deploy firewalls to secure a private network

5.     Design and deploy a virtual private network to secure remote connections

6.     Select appropriate methods to detect and counter intrusions to a network

7.     Understand other advanced issues related to network security


Instructor:   Dr. T. A. Yang

(office) Delta 106

(phone#) (281) 283-3835 (Please leave a message if not available.) 

NOTE: If the suite office is locked, you may use the phone outside the office to call me (by entering the extension 3835).

(email address) yang@uhcl.edu Note: Emails without a subject line or signature will be considered as potential viruses and be discarded.  Here is a sample subject line: "CSCI5235 project #1, question 1".

(web site)  http://sce.uhcl.edu/yang NOTE: Find the assignments and/or projects at the Assignments & Projects page.

 

Office Hours : See http://sce.uhcl.edu/yang/teaching/officeHours.htm

NOTE: In addition, you are highly encouraged to send your questions to me by e-mails (yang@uhcl.edu). Try to provide sufficient details in your email message, such as the problem(s) you have encountered, the solution(s) you have tried, and the outcome you have got from these solution(s).

Teaching assistant info and office hours:

 

TA Kiran Chamarthi (chamarthi.kiran@gmail.com)

 

TA Office Hours Note: The hours are subject to change until the end of the first week. Contact the instructor immediately if youve got any problem with the TA.

Tue  16:00 - 18:00

Wed 18:00 - 21:00

Thu  16:00 - 18:00


Required Text:

Yusuf Bhaiji. Network Security Technologies and Solutions (CCIE Professional Development). Cisco Press/Pearson Education. 2008. (ISBN: 1587052466

+ Instructor's handout and Web-based resources

  • Supplemental Materials

RFC 2828 Internet Security Glossary. R. Shirey. May 2000.

To find a particular RFC, visit the RFC Search site.

  • Cisco Resources

o   Network Security Baseline (2008, local copy)

o   IP Addressing Services

Protecting Your Core: Infrastructure Protection Access Control Lists

Transit Access Control Lists: Filtering at Your Edge

o   Cisco IOS Commands Master List (Release 12.4): http://www.cisco.com/en/US/docs/ios/mcl/124mainlinemcl/124_book.html

o   Cisco Security Appliance Command Line Configuration Guide, Version 8.0: http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/conf_gd.html

o   Configuration Guide for the Cisco Secure PIX Firewall Version 6.0: http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_60/config/index.htm

o   PIX Command Reference: http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094885.shtml

o   Cisco Command Summary: http://networking.ringofsaturn.com/Cisco/ciscocommandguide.php

o   Other useful sites:

http://www.groupstudy.com/

  • Additional info

For fundamental knowledge about computer cryptography, visit the CSCI5233 class at http://sce.uhcl.edu/yang/teaching/currentCourses.htm to review the lecture notes/slides.

Check out the research papers about WLAN security, mobile security, etc. by clicking this link.


Topics and Notes

  • The following schedule will be followed as much as possible, although changes are probable.  Always check with your instructor if you are not sure what would be covered next week.

wk (dates)

Topics (Sections)

Due

1 (6/5)

-  Syllabus

I. Fundamentals & Perimeter Security

-     Overview: security components and mechanisms

Join the discussion group.

Tour of the Computer Security Lab (D158A)

1  (6/7)

-     Overview (cont.)

-     The OSI 7-layer Model

Publish your team membership (names + email addresses) to the class discussion group.

2 (6/12)

-     Overview of networking security (Ch 1)

-     Another overview

-     ITU's Recommendation X.800

 

2 (6/14)

-     Access Control Lists (Ch 2)

-     Device security (Ch 3)

3 (6/19)

-     Security Features on Switches (Ch 4)

+ Exercise on switching and VLAN

Choose and publish your topic of presentation in the discussion group.

3  (6/21)

-     Secure Routing

-     NAT and security

-     Firewalls: Introduction

 

4 (6/26)

-     IOS Firewalls (Ch 5)

4 (6/28)

-     Attacks and Mitigations (Ch 7)

5 (7/3)

Exam (sample old exam)

Exam #1

5 (7/5)

Demo of project 1

 

-     PIX Firewalls (Ch 6)

Project 1 (new)

6 (7/10)

II. Identity Management and Access Control

-     AAA Security Services and Protocols (Ch 8)

6 (7/12)

-     WLAN Security (Ch 12) Kiran

-     Cisco ACS and Multifactor Authentication (Ch 9, 10)

7 (7/17)

-     Layer 2 Access Control (Ch 11)

-     + IEEE 802.1x protocol + VLAN Insecurity

-     Beyond 802.1x: NAC (Ch 13)

 

III. End-to-End Security

-     IPsec VPN (Ch 15) Rommel

+ IP Security

 

7 (7/19)

Demo of project 3

Project 3 (new)

8 (7/24)

-     Overview of VPNs

-     L2TP

-     Secure Socket Layer (SSL)

-     MPLS VPN (Ch 19)

-     Dynamic Multipoint VPN (DMVPN) (Ch 16)

 

IV. Security Monitoring

-     Network Intrusion Prevention (Ch 20) - Amruta

8 (7/26)

-     Anomaly Detection & Mitigation (Ch 22) -Andrew

-     Security Monitoring & Correlation (Ch 23)

9 (7/31)

Demo of project 2

 

V. Security Management

-     Security & Policy Management (Ch 24)

-     Security Framework & Regulatory Compliance (Ch 25)

V. Advanced Topics

-     Securing Cloud Computing

-     Control Systems networks vs IP-based networks - Bryan

Project 2 (new)

9 (8/2)

Exam

Exam #2

 


  Computer Labs & Hours

·       NT account information at:  http://sce.uhcl.edu/accountSearch.html

·       All the software that is available for use in the NT labs can be found at the following web pages: http://sce.uhcl.edu/NTLabIntroduction.asp.

Evaluation:

category

percentage

Participation

5%

Team projects

25%

Research project

20%

Exam #1

25%

Exam #2

25%

Grading Scale:

Percentile

Grade

93% or above

A

90% - 92%

A-

87% - 89%

B+

84% - 86%

B

80% - 83%

B-

77% - 79%

C+

74% - 76%

C

70% - 73%

C-

60%-69%

D

59% or below

F

Projects:

The projects will involve the design and implementation of networking protocols and/or application. Students are expected to employ the theories and techniques learned in the class to design the system. Network simulation environments, such as Wire Shark and NS-2, may be used in implementing the projects.

Details of the projects are available at Assignments & Projects


Tests:

Both analytic and synthetic abilities will be tested. Being able to apply the learned knowledge toward problem solving is highly emphasized in the tests. 

Assignments and Late Penalty:

Assignments and projects will be posted at the class web site. Assignments & projects are due before the beginning of the class on the due day.  See Topics and Notes for the due dates. 

Points will be deducted from late assignments: 20% for the first 24 hours after the due time, 40% for the next 24 hours, 70% for the third 24 hours, and 100% after that. No extension will be granted except for documented emergency. Starting to work on the assignments as early as possible is always the best strategy.

NOTE: Unless otherwise specified, all assignments and projects are individual work. 

Students should take caution not to violate the academic honesty policies. 

For details about the policy, click this link.

 

Assignments Guidelines:

a. Identification page: All assignments must have your name, and course name/number/section number (e.g., CSCI5235-01) at the top of the first page.

b. Proper stapling:  Staple all the pages together at the top-left corner. NOTE: Do not use paper clips.

c. Order ! Order!  Arrange the solutions following the sequence of the questions. Write the question number at the top-right corner of each page.

d. Word processing:  It is required that you type your reports (e.g., print them using a printer). Use a word processor and appropriate typesetting and drawing tools to do the assignments. Spell-check the whole document before printing it. You may lose points due to spelling or grammatical errors.


Attendance Policy:

You are expected to attend all classes. If you ever miss a class, it is your responsibility to get hold of whatever may have been discussed in the class.

Instructor's Notes:

  • Unless due to unexpected and documented emergency, no make-up exams will be given. No make-up exams will be granted once the exams have been corrected and returned to the class. 
  • Important:   If you think you have lost some points due to grading errors, make sure you approach the instructor within a week after the assignment, project, or test is returned to you.  
  • To get the most out of this class, you need to read the textbooks and spend time using computers regularly.  Be prepared for a class by preview the material to be covered in that class and participate in discussions and problem-solving exercises, if applicable, in the class.
  • Due to the intensive nature of graduate classes, 15-20 hours per week are expected of students in studying the textbook/notes and working on the assignments, in addition to class attendance.   Expect to spend more hours during summer sessions.

Go to the  Index