CS407
NETWORK SECURITY
Objectives
- To understand the network security, services, attacks, mechanisms, types of attacks
- To comprehend and apply authentication services, authentication algorithms
- To comprehend and apply network layer security protocols, Transport layer security protocols, Web security protocols.
Outcomes
- Be able to determine appropriate mechanisms for protecting the network.
- Design a security solution for a given application, system with respect to security of the system
Unit – I
Overview of Network Security, Security services, attacks, Security Issues in TCP/IP suiteSniffing, spoofing, buffer overflow, ARP poisoning, ICMP Exploits, IP address spoofing, IP fragment attack, routing exploits, UDP exploits, TCP exploits.
Unit – II
Authentication requirements, Authentication functions - Message Authentication Codes - Hash Functions - Security of Hash Functions and MACs - MD5 message Digest algorithm - Secure Hash Algorithm - RIPEMD - HMAC Digital Signatures, Authentication protocols-Kerberos, X.509.
Unit – III
IP Security-AH and ESP, SSL/TLS, SSH, Web Security-HTTPS, DNS Security, Electronic Mail Security (PGP, S/MIME).
Unit – IV
Intruders, Viruses, Worms, Trojan horses, Distributed Denial-Of-Service (DDoS), Firewalls, IDS, Honey nets, Honey pots.
Unit – V
Introduction to wireless network security, Risks and Threats of Wireless networks, Wireless LAN Security (WEP, WPA).
TEXT BOOKS
- W. Stallings, “Cryptography and Network Security: Principles and Practice”, 5/E, Prentice Hall, 2013
- Yang Xiao and Yi Pan, “Security in Distributed and Networking Systems”, World Scientific, 2007, Chapter 1.
- Aaron E. Earle, “Wireless Security Handbook”, Auerbach publications, Taylor & Francis Group, 2006.
REFERENCE
- Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003