UoB Logo

Home

Projects

Course Staff

Instructor:
Dr. Shishir Nagaraja
Email: nagaraja
Phone:
Office: 238, School of Computer Science
Hours: Wednesdays 4-5 pm
Lectures: 22
Location: 245
Credits: 20
Mailing list: mod-net-sec@cs.bham.ac.uk

The newsgroup is for questions/discussion on homeworks and programming assignments. But do not post solutions (code or write-up) to the newsgroup! Use email only when you cannot use the newsgroup, e.g., for urgent/personal questions.

Joe Gardiner
Teaching Assistant
Email:j.gardiner





Network Security

Spring 2014

Course Essentials

Goals

This is a module for graduate and advanced undergraduate students interested in network security and privacy. A student completing this course with top marks will be able to reason and engineer practical secure networked systems, critically review existing designs, read and understand technical papers in the area of anonymous communications, privacy preserving technologies, private social networks and learn to apply the privacy-by-design methodology. The course outline containing all necessary information is available here.

Pre-requisites

A basic network programming course is a prerequisite. An equivalent course in Operating Systems or Networking is also acceptable with the approval of the instructor. Knowledge of prior security courses is desirable but not essential.

Grading

Final exam 50%
Homeworks 50% (20% programming assignments, 30% paper summaries)


Projects

As an alternative to set homeworks, I encourage interested students to consider opting for a mini-project instead. A list of projects from last year can be found here. You can also propose your own projects. Projects are due at the end of the term.
Course projects

Announcements

Slides posted
Introduction, motivation, and some interesting case studies on SCADA, DC-10 and NASA's Challenger crashes
14/01/2014

Slides posted
Lecture slides for Denial of Service attacks
22/01/2014


Lectures

Topic Lecture material Reading
L1 Course outline Slides Network security crossword puzzle and its solution.
L2 Introduction Slides, Extra slides: Introduction to Cryptography Chaumian mixes
L3 Denial of Service -- attacks Slides see final slide page
L4,L5 Denial of Service -- detection Slides see slides
L6 Denial of Service -- response see slides
L7 Internet Protocol vulnerabilities: BGP and OSPF Slides See slides
L8 Internet Protocol vulnerabilities: DNS Slides See slides
L7 Decentralised networks -- unstructured topologies Slides Gnutella, see slides
L8 Decentralised networks -- structured topologies Slides Chord , see slides
L9 Routing attacks and defenses: active and passive topology attacks Slides Topology attacks
L10 Routing attacks and defenses: Misbehaviour defenses Slides Suicide
L11 Sybil attacks
L12 Sybil defenses
L13 Cloud Security by Prof. Mark Ryan
L14 Email Security by Prof. Mark Ryan
L15 Malware 1
L16 Malware 2 Slides See slides
L17
L17
L18 Security protocol design failures I ScatterChat ScatterChat design
L19 Security protocol design failures II WEP The insecurity of 802.11
L20
L21
L22


Plagiarism notice: please note that homework efforts are individual efforts i.e. not group efforts and not copied off the Internet. Consult the school's plagiarism policy for more information.