Network Security

Credit: 3




  • To understand the network security, services, attacks, mechanisms, types of attacks on TCP/IP protocol suite.

  • To comprehend and apply authentication services, authentication algorithms

  • To comprehend and apply network layer security protocols, Transport layer security protocols, Web security protocols.

  • To understand the wireless network security threats.


Unit -I

Overview of Network Security, Security services, attacks, Security Issues in TCP/IP suite- Sniffing, spoofing, buffer overflow, ARP poisoning, ICMP Exploits, IP address spoofing, IP fragment attack, routing exploits, UDP exploits, TCP exploits.



Authentication requirements, Authentication functions - Message Authentication Codes - Hash Functions - Security of Hash Functions and MACs - MD5 message Digest algorithm - Secure Hash Algorithm - RIPEMD - HMAC Digital Signatures, Authentication protocols-Kerberos, X.509.



IP Security-AH and ESP, SSL/TLS, SSH, Web Security-HTTPS, DNS Security, Electronic Mail Security (PGP, S/MIME).



Intruders, Viruses, Worms, Trojan horses, Distributed Denial-Of-Service (DDoS), Firewalls, IDS, Honey nets, Honey pots.



Introduction to wireless network security, Risks and Threats of Wireless networks, Wireless LAN Security (WEP, WPA).




  • Be able to determine appropriate mechanisms for protecting the network.

  • Design a security solution for a given application, system with respect to security of the system


Text Books:

  1. Yang Xiao and Yi Pan, “Security in Distributed and Networking Systems”, World Scientific, 2007, Chapter 1.

  2. W. Stallings, “Cryptography and Network Security: Principles and Practice”, 5/E, Prentice Hall, 2013.

  3. Aaron E. Earle, “Wireless Security Handbook”, Auerbach publications, Taylor & Francis Group, 2006.


Reference Books:

  1. Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003.