Network Security

Credit: 3

 

Objective

 

  • To understand the network security, services, attacks, mechanisms, types of attacks on TCP/IP protocol suite.

  • To comprehend and apply authentication services, authentication algorithms

  • To comprehend and apply network layer security protocols, Transport layer security protocols, Web security protocols.

  • To understand the wireless network security threats.

 

Unit -I

Overview of Network Security, Security services, attacks, Security Issues in TCP/IP suite- Sniffing, spoofing, buffer overflow, ARP poisoning, ICMP Exploits, IP address spoofing, IP fragment attack, routing exploits, UDP exploits, TCP exploits.

 

Unit-II

Authentication requirements, Authentication functions - Message Authentication Codes - Hash Functions - Security of Hash Functions and MACs - MD5 message Digest algorithm - Secure Hash Algorithm - RIPEMD - HMAC Digital Signatures, Authentication protocols-Kerberos, X.509.

 

Unit-III

IP Security-AH and ESP, SSL/TLS, SSH, Web Security-HTTPS, DNS Security, Electronic Mail Security (PGP, S/MIME).

 

Unit-IV

Intruders, Viruses, Worms, Trojan horses, Distributed Denial-Of-Service (DDoS), Firewalls, IDS, Honey nets, Honey pots.

 

Unit-V

Introduction to wireless network security, Risks and Threats of Wireless networks, Wireless LAN Security (WEP, WPA).

 

Outcome

 

  • Be able to determine appropriate mechanisms for protecting the network.

  • Design a security solution for a given application, system with respect to security of the system

 

Text Books:

  1. Yang Xiao and Yi Pan, “Security in Distributed and Networking Systems”, World Scientific, 2007, Chapter 1.

  2. W. Stallings, “Cryptography and Network Security: Principles and Practice”, 5/E, Prentice Hall, 2013.

  3. Aaron E. Earle, “Wireless Security Handbook”, Auerbach publications, Taylor & Francis Group, 2006.

 

Reference Books:

  1. Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003.