COMS W4180 — Network Security: Lectures
Sep-05-06 Session 1: Introduction
Sep-07-06 Session 2: Threats and Attacks
Reading:
Chapter 1 of Kaufman et al.
Chapter 1 of Cheswick et al.
Sep-12-06 Session 3: Introduction to Cryptography
Reading:
Chapters 4-6 of Kaufman et al.
Appendix A of Cheswick et al. or section 13.1 of
that part of the first
edition.
Sep-14-06 Session 4: Public key; hash functions; MACs
Reading:
-
Whitfield Diffie and Martin E. Hellman,
"New Directions in Cryptography",
IEEE Transactions on Information Theory
IT-22:6, November 1976.
Use this link
to find the journal, then navigate to the issue.
-
W. Diffie,
"The First Ten Years of Public Key Cryptography",
Proceedings of the IEEE
76:5, May 1988.
Navigate from here.
-
R. L. Rivest, A. Shamir, L. Adleman,
"A method for obtaining digital signatures and public-key cryptosystems",
Communications of the ACM
21:2, February 1978. (Recommended)
Use this link
from campus, or navigate from
here.
-
John Gordon,
"The Story of Alice and Bob",
excerpt from
after-dinner speech at the Zurich Seminar, April 1984.
(Recommended, and very funny in a geeky sort of way...)
Sep-19-06 Session 5: MACs, authentication, certificates
Reading:
Robert H. Morris and Ken Thompson,
Password security: a case history,
Communications of the ACM 22:11, November 1979
Sep-21-06 Session 6: Key exchange protocols; Kerberos
Readings:
Sep-26-06 Session 7: SSL
(slides courtesy of Prof. Angelos Keromytis)
Reading:
Chapter 19 of Kaufman et al.
Sep-28-06 Session 8: Web Security
Readings:
- Chapter 25 of Kaufman et al.
- Chapter 4 of Cheswick et al.
Oct-03-06 Session 9: Email security
Readings:
Oct-05-06 Session 10: IPsec
Reading:
Chapter 17 of Kaufman et al.
Oct-10-06 Session 11: IPsec key management: IKE
Reading:
Chapter 18 of Kaufman et al.
Oct-12-06 Session 12: SSH
Readings:
Oct-17-06 Session 13: SIP and VoIP
Reading:
Section 26 of RFC 3261
Oct-19-06 Session 14: Networked Storage
Readings:
-
RFC 3723 Securing Block Storage Protocols over IP. B. Aboba, J. Tseng, J.
Walker, V. Rangan, F. Travostino. April 2004.
-
RFC 4086: Randomness Requirements for Security. D. Eastlake, 3rd, J.
Schiller, S. Crocker. June 2005.
Oct-24-06 Session 15: Firewalls
Readings:
Oct-26-06 Session 16: Firewalls
Readings:
Oct-31-06 Session 17: Midterm
Grade histogram uploaded to Courseworks
Nov-02-06 Session 18: Scanning
Reading:
The nmap man page (available on the CLIC machines)
Nov-09-06 Session 19: Intrusion Detection Systems
Nov-14-06 Session 20: IDS: Practical issues
Readings:
-
Stalking the wily hacker,
Cliff Stoll,
Communications of the ACM 31:5, May 1988.
-
An Evening with Berfered,
Chapter 10 of the first edition of
Firewalls and Internet
Security: Repelling the Wily Hacker,
William R. Cheswick and Steven M. Bellovin,
Addison-Wesley, 1994, or Chapter 16 of the second edition.
-
Shadow Hawk Busted Again,
Phrack 16, File 11 (Nov 1987) (recommended)
-
Chicago Phone
Freak Gets Prison Term, Risks Digest 8:29, 22 February 1989 (recommended)
- Chapter 15 of Cheswick et al. (recommended)
Nov-16-06 Session 21: Worms
Readings:
Nov-21-06 Session 22: Denial of Service Attacks
Readings:
Nov-28-06 Session 23: Routing Security
Nov-30-06 Session 24: Wireless Security
Readings:
Dec-05-06 Session 25: Privacy
Readings:
Dec-07-06 Session 26: Review