703902 Computer Network Security 712908 Computer and network Security Management Course Description Course Coordinator: Prof. Reuven Aviv, reuvenaviv@gmail.com Prerequisite: 703901 Data Networking 1. Introduction This course focuses on deep understanding of the algorithms and techniques used to overcome potential security threats to computer network systems in both closed organizations and in open networked environment like the Internet. Topics covered are described in section 4, 5, and 6. 2. Goals: By successfully passing this course you will: a. Recognize the internal working of security protocols and systems, their design considerations, and the way they are employed in organizations and in the Internet. b. Have deep understanding of application level attacks and defense mechanism against them c. Able to learn and master security topics in now being researched The first goal will be achieved by class discussions and solving and submitting problem-sets. The second goal will be achieved by submitting Attack Code Analysis Report. The third goal will be achieved by Research Project, which will include submission of Research Report and Presentation in class. 3. Final Mark The final mark will consist of the following components: a. 15% Active participation in class discussions b. 15% problem-sets (2 or 3) c. 15% Attack code analysis report (will be done by teams of 2) d. 15% Research Project – Research Report and Presentation (will be done by teams of 2) e. 15% Term Test f. 25% Final Exam 1 4. Class Discussions Topics to be discussed include: PART 1: FOUNDATION a. Introduction – Attacks, Risks and defense b. Introduction to Buffer Overflow attack – code construction and analysis1 c. Introduction to Classic cryptography, Encryption schemes d. Introduction to Public Key cryptography, hash systems, digital signature, key distribution e. The Public Key Infrastructure, certificates PART 2: PROTOCOLS f. Security with Strong Password Protocols g. Securing Web and other Internet applications – the SSL protocol h. Securing Intra organization services with KERBEROS i. Securing Internet Access with IPSEC, Virtual Private Networks j. Securing electronic mail with PGP PART 3: SYSTEM WIDE SECURITY k. Security at the Operating System level – SE Linux l. Firewalls m. Multi-layer security – SAFE 5. Attack Code Analysis Report This report (4-5) pages, done in teams of 2 students each, will summarize coding techniques used in one of the most dangerous attacks - the Buffer Overflow Attack - over a network, and methods of defense against them. The report will be based on careful reading of code examples (parts of the code are in Assembly language). Students have to identify the main issues that an attacker has to solve, the methods an attacker uses to solve them, the issues a defender has to solve, and methods used to solve them. Pointers to relevant literature are listed in section 10. 1 You will have to refresh your knowledge of the basics (not details) of Assembly Language to understand this topic. 2 6. Research Projects Research Projects are done in teams of 2 students each. Students have to study a particular topic from the literature, summarize it in a Word or PDF report of 4-5 pages, and make a 45 min presentation (15 slides) in class on one sub-topic. Students have to identify the main problems dealt with in the topic, and their solutions. The report will deal with technical issues, not cultural or social. Suggested topics and sub-topics are listed in the table below. Students can suggest other topics and sub-topics. Relevant literature should be searched for in the Internet. 7. Sub-topic (To be presented in class) Topic (to be reported in writing) Fingerprints Biometric Authentication Octopus Card Smart Cards Nimda Viruses Back Orifice Trojan Horses Steghide Steganography Group Signing Group Signature snort Intrusion Detection DigiCash Electronic Payments WAP or WPA or EPA Wireless Security Java Security Manager Class Java Security Model Achilles Man in the Middle Proxy Servers NBTScan Netbios Vulnerabilities Fiat-Shamir Protocol Zero Knowledge Protocols BB84 Protocol for key exchange Quantum Cryptography SIS Model Virus Propagation Models Submission: Problem Sets must be submitted, individually, in writing (not via electronic mail) to the Course Coordinator. Note that these docs might have formulas there, so handwritten documents are OK. 3 Clear handwriting is mandatory – remember that the course coordinator must read these documents!. The name of the student subitting the problem-set must be written at the top of the document. Submission dates will be published elsewhere. Attack Code Analysis Report file (submitted by a team of 2) must have the students full names at the top of the file. The file must be in WORD or PDF format, sent via electronic mail to the course coordinator. The name of the file must be a concatenation of the Fist Names of the two students and the string CodeAnalysis (e.g. John-Rebbeca-CodeAnalysis.pdf). The subject line of the email must be identical to the name of the file concatenated with KMUTNB (e.g. KMUTNB-John-Rebbeca-CodeAnalysis.pdf) Research report and Research Presentation files (submitted by teams of 2) must have the students full names at the top of the files. The files (WORD or PDF, and PPT, respectively) must be sent together as an attached ZIP file via electronic mail to the course coordinator. The name of the file must be a concatenation of the Fist Names of the two students and the name of the Topic (e.g. John-Rebbeca-Steganography.zip). The subject line of the email must be identical to the name of the zip file concatenated with KMUTNB (e.g. KMUTNB-John-RebbecaSteganography.zip) 8. Authenticity Policy All written materials in the assignments, project report, research report and, presentation, term test and final exam must be original. Cut & Paste are strictly forbidden and will not be tolerated. Figures from publicly available sources (but not from other students works) can be used; each must have a full reference. Failing to follow this policy will lead to a failure in the course and also to administrative actions 9. Term Test and Final Exam The schedule of the Term Test and the Final Exam will be published elsewhere. Term test and Final Exam are open book. Students are allowed to bring any written or printed material to the examination room. 4 10.Literature The main source for topics discussed in class could be any one of the textbooks a, b, c listed below2: a. W. Stallings: Cryptography and Network Security Prentice Hall, New Jersey. b. W. Stallings: Network Security Essentials, Prentice Hall, New Jersey. c. C. Kaufman, R. Perlman, M. Speciner: Network Security: Private Communication in a public world, Addison Wesley Schnier’s book is “the bible” on cryptography d. B. Schnier: Applied Cryptography, Wiley, New York Resources for the Attack Code Analysis Report are listed below Aleph One: Smashing the stack for fun and profit http://insecure.org/stf/smashstack.html Smiler: The art of writing Shell Code http://www.phiral.net/other/art-shellcode.txt Cowan: Protecting Systems from Stack Smashing Attacks http://www.cs.jhu.edu/~rubin/courses/sp03/papers/stackguard.pdf with StackGuard. Resources for the Research Projects should be looked at the Internet. 2 Textbook b is a part of textbook a. For the purpose of this course textbook b is sufficient. Textbook a includes an expanded discussion on cryptography, beyond what is covered in this course 5