The newsgroup is for questions/discussion on homeworks and programming assignments. But do not post solutions (code or write-up) to the newsgroup! Use email only when you cannot use the newsgroup, e.g., for urgent/personal questions.
This is a module for graduate and advanced undergraduate students interested in network security and privacy. A student completing this course with top marks will be able to reason and engineer practical secure networked systems, critically review existing designs, read and understand technical papers in the area of anonymous communications, privacy preserving technologies, private social networks and learn to apply the privacy-by-design methodology. The course outline containing all necessary information is available here.
A basic network programming course is a prerequisite. An equivalent
course in Operating Systems or Networking is also acceptable with the
approval of the instructor. Knowledge of prior security courses is
desirable but not essential.
Final exam 50%
Homeworks 50% (20% programming assignments, 30% paper summaries)
|L1||Course outline||Slides||Network security crossword puzzle and its solution.|
|L2||Introduction||Slides, Extra slides: Introduction to Cryptography||Chaumian mixes|
|L3||Denial of Service -- attacks||Slides||see final slide page|
|L4,L5||Denial of Service -- detection||Slides||see slides|
|L6||Denial of Service -- response||see slides|
|L7||Internet Protocol vulnerabilities: BGP and OSPF||Slides||See slides|
|L8||Internet Protocol vulnerabilities: DNS||Slides||See slides|
|L7||Decentralised networks -- unstructured topologies||Slides||Gnutella, see slides|
|L8||Decentralised networks -- structured topologies||Slides||Chord , see slides|
|L9||Routing attacks and defenses: active and passive topology attacks||Slides||Topology attacks|
|L10||Routing attacks and defenses: Misbehaviour defenses||Slides||Suicide|
|L13||Cloud Security by Prof. Mark Ryan|
|L14||Email Security by Prof. Mark Ryan|
|L16||Malware 2||Slides||See slides|
|L18||Security protocol design failures I||ScatterChat||ScatterChat design|
|L19||Security protocol design failures II||WEP||The insecurity of 802.11|