UoB Logo



Course Staff

Dr. Shishir Nagaraja
Email: nagaraja
Office: 238, School of Computer Science
Hours: Wednesdays 4-5 pm
Lectures: 22
Location: 245
Credits: 20
Mailing list: mod-net-sec@cs.bham.ac.uk

The newsgroup is for questions/discussion on homeworks and programming assignments. But do not post solutions (code or write-up) to the newsgroup! Use email only when you cannot use the newsgroup, e.g., for urgent/personal questions.

Joe Gardiner
Teaching Assistant

Network Security

Spring 2014

Course Essentials


This is a module for graduate and advanced undergraduate students interested in network security and privacy. A student completing this course with top marks will be able to reason and engineer practical secure networked systems, critically review existing designs, read and understand technical papers in the area of anonymous communications, privacy preserving technologies, private social networks and learn to apply the privacy-by-design methodology. The course outline containing all necessary information is available here.


A basic network programming course is a prerequisite. An equivalent course in Operating Systems or Networking is also acceptable with the approval of the instructor. Knowledge of prior security courses is desirable but not essential.


Final exam 50%
Homeworks 50% (20% programming assignments, 30% paper summaries)


As an alternative to set homeworks, I encourage interested students to consider opting for a mini-project instead. A list of projects from last year can be found here. You can also propose your own projects. Projects are due at the end of the term.
Course projects


Slides posted
Introduction, motivation, and some interesting case studies on SCADA, DC-10 and NASA's Challenger crashes

Slides posted
Lecture slides for Denial of Service attacks


Topic Lecture material Reading
L1 Course outline Slides Network security crossword puzzle and its solution.
L2 Introduction Slides, Extra slides: Introduction to Cryptography Chaumian mixes
L3 Denial of Service -- attacks Slides see final slide page
L4,L5 Denial of Service -- detection Slides see slides
L6 Denial of Service -- response see slides
L7 Internet Protocol vulnerabilities: BGP and OSPF Slides See slides
L8 Internet Protocol vulnerabilities: DNS Slides See slides
L7 Decentralised networks -- unstructured topologies Slides Gnutella, see slides
L8 Decentralised networks -- structured topologies Slides Chord , see slides
L9 Routing attacks and defenses: active and passive topology attacks Slides Topology attacks
L10 Routing attacks and defenses: Misbehaviour defenses Slides Suicide
L11 Sybil attacks
L12 Sybil defenses
L13 Cloud Security by Prof. Mark Ryan
L14 Email Security by Prof. Mark Ryan
L15 Malware 1
L16 Malware 2 Slides See slides
L18 Security protocol design failures I ScatterChat ScatterChat design
L19 Security protocol design failures II WEP The insecurity of 802.11

Plagiarism notice: please note that homework efforts are individual efforts i.e. not group efforts and not copied off the Internet. Consult the school's plagiarism policy for more information.