Network Security
Credit: 3
Objective
-
To understand the network security, services, attacks, mechanisms, types of attacks on TCP/IP protocol suite.
-
To comprehend and apply authentication services, authentication algorithms
-
To comprehend and apply network layer security protocols, Transport layer security protocols, Web security protocols.
-
To understand the wireless network security threats.
Unit -I
Overview of Network Security, Security services, attacks, Security Issues in TCP/IP suite- Sniffing, spoofing, buffer overflow, ARP poisoning, ICMP Exploits, IP address spoofing, IP fragment attack, routing exploits, UDP exploits, TCP exploits.
Unit-II
Authentication requirements, Authentication functions - Message Authentication Codes - Hash Functions - Security of Hash Functions and MACs - MD5 message Digest algorithm - Secure Hash Algorithm - RIPEMD - HMAC Digital Signatures, Authentication protocols-Kerberos, X.509.
Unit-III
IP Security-AH and ESP, SSL/TLS, SSH, Web Security-HTTPS, DNS Security, Electronic Mail Security (PGP, S/MIME).
Unit-IV
Intruders, Viruses, Worms, Trojan horses, Distributed Denial-Of-Service (DDoS), Firewalls, IDS, Honey nets, Honey pots.
Unit-V
Introduction to wireless network security, Risks and Threats of Wireless networks, Wireless LAN Security (WEP, WPA).
Outcome
-
Be able to determine appropriate mechanisms for protecting the network.
-
Design a security solution for a given application, system with respect to security of the system
Text Books:
-
Yang Xiao and Yi Pan, “Security in Distributed and Networking Systems”, World Scientific, 2007, Chapter 1.
-
W. Stallings, “Cryptography and Network Security: Principles and Practice”, 5/E, Prentice Hall, 2013.
-
Aaron E. Earle, “Wireless Security Handbook”, Auerbach publications, Taylor & Francis Group, 2006.
Reference Books:
-
Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003.