network security (cs6500) - department of computer ...chester/courses/19e_ns/slides/1...• computer...
TRANSCRIPT
![Page 1: Network Security (CS6500) - Department of Computer ...chester/courses/19e_ns/slides/1...• Computer Security: A Hands-on Approach Author: Wenliang Du, Syracuse University First Printing:](https://reader035.vdocuments.site/reader035/viewer/2022071419/6118668a7832ee71335d44e5/html5/thumbnails/1.jpg)
Network Security (CS6500)Chester Rebeiro
IIT Madras
![Page 2: Network Security (CS6500) - Department of Computer ...chester/courses/19e_ns/slides/1...• Computer Security: A Hands-on Approach Author: Wenliang Du, Syracuse University First Printing:](https://reader035.vdocuments.site/reader035/viewer/2022071419/6118668a7832ee71335d44e5/html5/thumbnails/2.jpg)
Connected Devices
PC: Statista 209, Global Data Analysis and Forecasts
Critical InfrastructureIoT / Smart cities
Online ServicesCloud computing
![Page 3: Network Security (CS6500) - Department of Computer ...chester/courses/19e_ns/slides/1...• Computer Security: A Hands-on Approach Author: Wenliang Du, Syracuse University First Printing:](https://reader035.vdocuments.site/reader035/viewer/2022071419/6118668a7832ee71335d44e5/html5/thumbnails/3.jpg)
Network Security (Statistics)
• In 2016, the U.S government spent a $28 billion on cyber-security.
• The potential cost of cyber-crime to the global community is $500 billion, and a data breach will cost the average company about $3.8 million (Microsoft).
• Ransomware attacks increased by 36 percent in 2017.
• 1 in 131 emails contains a malware.
• In 2017, 6.5 percent of people are victims of identity fraud resulting in fraudsters defrauding people of about $16 billion.
• Unfilled cyber security jobs are expected to reach 3.5 million by 2021 — compared to about 1 million in 2016.
![Page 4: Network Security (CS6500) - Department of Computer ...chester/courses/19e_ns/slides/1...• Computer Security: A Hands-on Approach Author: Wenliang Du, Syracuse University First Printing:](https://reader035.vdocuments.site/reader035/viewer/2022071419/6118668a7832ee71335d44e5/html5/thumbnails/4.jpg)
Network Attacks: What is it all about?
![Page 5: Network Security (CS6500) - Department of Computer ...chester/courses/19e_ns/slides/1...• Computer Security: A Hands-on Approach Author: Wenliang Du, Syracuse University First Printing:](https://reader035.vdocuments.site/reader035/viewer/2022071419/6118668a7832ee71335d44e5/html5/thumbnails/5.jpg)
Network Attacks: What is it all about?
Message Interception
Transfer $5 to account
number 3456
Transfer $5 to account number
3456
Transfer $5 to account number
3456Confidentiality
![Page 6: Network Security (CS6500) - Department of Computer ...chester/courses/19e_ns/slides/1...• Computer Security: A Hands-on Approach Author: Wenliang Du, Syracuse University First Printing:](https://reader035.vdocuments.site/reader035/viewer/2022071419/6118668a7832ee71335d44e5/html5/thumbnails/6.jpg)
Network Attacks: What is it all about?
Glean Secrets
Glean secrets
Confidentiality
![Page 7: Network Security (CS6500) - Department of Computer ...chester/courses/19e_ns/slides/1...• Computer Security: A Hands-on Approach Author: Wenliang Du, Syracuse University First Printing:](https://reader035.vdocuments.site/reader035/viewer/2022071419/6118668a7832ee71335d44e5/html5/thumbnails/7.jpg)
Network Attacks: What is it all about?
Message Modification
Transfer $5 to account
number 3456
Transfer $5 to account number
3653
Change 3456 to 3653Integrity
![Page 8: Network Security (CS6500) - Department of Computer ...chester/courses/19e_ns/slides/1...• Computer Security: A Hands-on Approach Author: Wenliang Du, Syracuse University First Printing:](https://reader035.vdocuments.site/reader035/viewer/2022071419/6118668a7832ee71335d44e5/html5/thumbnails/8.jpg)
Network Attacks: What is it all about?
Fake Messages
Transfer $5 to account
number 3653
Transfer $5 to account number
3653
Integrity
![Page 9: Network Security (CS6500) - Department of Computer ...chester/courses/19e_ns/slides/1...• Computer Security: A Hands-on Approach Author: Wenliang Du, Syracuse University First Printing:](https://reader035.vdocuments.site/reader035/viewer/2022071419/6118668a7832ee71335d44e5/html5/thumbnails/9.jpg)
Network Attacks: What is it all about?
Block Messages
Transfer $5 to account
number 3456?
Block messages
Availability
![Page 10: Network Security (CS6500) - Department of Computer ...chester/courses/19e_ns/slides/1...• Computer Security: A Hands-on Approach Author: Wenliang Du, Syracuse University First Printing:](https://reader035.vdocuments.site/reader035/viewer/2022071419/6118668a7832ee71335d44e5/html5/thumbnails/10.jpg)
Network Attacks: What is it all about?
Take control of a remote computer
Control
Availability
![Page 11: Network Security (CS6500) - Department of Computer ...chester/courses/19e_ns/slides/1...• Computer Security: A Hands-on Approach Author: Wenliang Du, Syracuse University First Printing:](https://reader035.vdocuments.site/reader035/viewer/2022071419/6118668a7832ee71335d44e5/html5/thumbnails/11.jpg)
Why are there so many threats?
Weakest Link matters!
Several possible weak links• Shared networks
• Multiple untrusted devices in a network (Hardware Trojans)
• Buggy programs (Heartbleed bug, 2014)
• Design flaws in communication protocols and in applications (WPA2 attack, 2017)
![Page 12: Network Security (CS6500) - Department of Computer ...chester/courses/19e_ns/slides/1...• Computer Security: A Hands-on Approach Author: Wenliang Du, Syracuse University First Printing:](https://reader035.vdocuments.site/reader035/viewer/2022071419/6118668a7832ee71335d44e5/html5/thumbnails/12.jpg)
Why are there so many threats?
Weakest Link matters!
Several possible weak links• Shared networks
• Multiple untrusted devices in a network (Hardware Trojans)
• Buggy programs (Heartbleed bug, 2014)
• Design flaws in communication protocols and in applications (WPA2 attack, 2017)
• User ignorance (not all users have taken CS6500)
![Page 13: Network Security (CS6500) - Department of Computer ...chester/courses/19e_ns/slides/1...• Computer Security: A Hands-on Approach Author: Wenliang Du, Syracuse University First Printing:](https://reader035.vdocuments.site/reader035/viewer/2022071419/6118668a7832ee71335d44e5/html5/thumbnails/13.jpg)
Cryptography
It is not the panacea for all network security
problems
• but provides tools to achieve confidentiality and integrity
![Page 14: Network Security (CS6500) - Department of Computer ...chester/courses/19e_ns/slides/1...• Computer Security: A Hands-on Approach Author: Wenliang Du, Syracuse University First Printing:](https://reader035.vdocuments.site/reader035/viewer/2022071419/6118668a7832ee71335d44e5/html5/thumbnails/14.jpg)
This Course (contents)
Network Protocol Attacks(Sniffing/Spoofing, TCP Attacks, DNS attacks, firewalls, and IDS)
Cryptography (basics)Public key and private key
algorithms
Using Cryptography to achieve secure communication
Key distribution and managementVirtual Private NetworkPublic Key InfrastructureTransport Layer Security
Part 1 Part 2
Part 3
(if time permits)
Anonymous Routing andDark Web
Tools for ethical hacking
Part 4
![Page 15: Network Security (CS6500) - Department of Computer ...chester/courses/19e_ns/slides/1...• Computer Security: A Hands-on Approach Author: Wenliang Du, Syracuse University First Printing:](https://reader035.vdocuments.site/reader035/viewer/2022071419/6118668a7832ee71335d44e5/html5/thumbnails/15.jpg)
This Course (What to expect?)
• Loads of Assignments (50%)• Capture the flag contests (roughly once every 3 to 4 weeks)
• Programming assignments (around 6 to 7 of them)
• Quizzes• Mid semester exam (20%)
• End semester exam (20%)
• Reading Assignment (10%)
![Page 16: Network Security (CS6500) - Department of Computer ...chester/courses/19e_ns/slides/1...• Computer Security: A Hands-on Approach Author: Wenliang Du, Syracuse University First Printing:](https://reader035.vdocuments.site/reader035/viewer/2022071419/6118668a7832ee71335d44e5/html5/thumbnails/16.jpg)
This Course (Expected Learning)
• Appreciate and recreate various network security attacks
• Be able to apply cryptography to achieve security
• Be aware of various research problems in the area of network and cyber security
![Page 17: Network Security (CS6500) - Department of Computer ...chester/courses/19e_ns/slides/1...• Computer Security: A Hands-on Approach Author: Wenliang Du, Syracuse University First Printing:](https://reader035.vdocuments.site/reader035/viewer/2022071419/6118668a7832ee71335d44e5/html5/thumbnails/17.jpg)
Textbooks
• Computer Security: A Hands-on Approach
Author: Wenliang Du, Syracuse University
First Printing: October 2017
Publisher: CreateSpace
• Cryptography Theory and Practice
Author: Douglas R. Stinson
Publisher: CRC Press
![Page 18: Network Security (CS6500) - Department of Computer ...chester/courses/19e_ns/slides/1...• Computer Security: A Hands-on Approach Author: Wenliang Du, Syracuse University First Printing:](https://reader035.vdocuments.site/reader035/viewer/2022071419/6118668a7832ee71335d44e5/html5/thumbnails/18.jpg)
Schedule
• Three theory classes a week• Monday (10:00 to 10:50AM)
• Tuesday (9:00 to 9:50AM)
• Wednesday (8:00 to 8:50AM)
• Tutorials• Friday (12:00 to 12:50PM)
• Capture the flags contests will be mostly on Friday (evening) or Saturdays and announced in the class at-least 2 weeks early
![Page 19: Network Security (CS6500) - Department of Computer ...chester/courses/19e_ns/slides/1...• Computer Security: A Hands-on Approach Author: Wenliang Du, Syracuse University First Printing:](https://reader035.vdocuments.site/reader035/viewer/2022071419/6118668a7832ee71335d44e5/html5/thumbnails/19.jpg)
Website and Communication
• Websitehttp://www.cse.iitm.ac.in/~chester/courses/19e_ns/index.html
• CommunicationGoogle groups (link will be posted on IITM moodle)
• Assignment Submissions
IITM moodle