Yang Xiao Home

CS 572 (Fall 2023)
Network Security

Course Information

Instructor: Yang Xiao (contact: xiaoy[AT]uky.edu)
Meeting Times: M/W/F 11:00 AM – 11:50 AM Eastern Time (location: register course to know)
Office Hour: Hardymon Rm 233, Fri 1:00 PM – 2:30 PM Eastern Time and by appointment

Course Description

This course introduces students to the state of the art of network security problems and solutions. Topics include security issues in computer networks, the Public Key Infrastructure ecosystem, key exchange protocols, and security mechanisms and protocols at the application, transport, network and data link layers. It will also discuss up-to-date development in the field of network security.

Course Schedule (Tentative)

Week Agenda ([R] Required Reading, [S] Suggested Reading) Notes
1
  • 08/21: Lec01: Course introduction.
  • 08/23: Lec02: Basic concepts - trust, policy, risk, modeling. ([R] Ch 1.1, Ch 1.2,Ch. 1.3)
  • 08/25: Lec03: Security properties - the CIA Triad and more. ([R] 1.1, 1.7)
  •  
    2
  • 08/28: Lec04: Networking recap - LANs, IP. ([R] Ch 10.7)
  • 08/30: Lec05: Networking recap - TCP, UDP
  • 09/01: Lec06: Networking recap - DNS, HTTP
  • 08/29: HW1 out
    3
  • 09/04: Labor Day Holiday - no class
  • 09/06: Lec07: Networking - attacks ([R] Ch 11.3)
  • 09/08: Lec08: Crypto building blocks - information security, ciphers ([R] Ch 2.1-2.3)
  • 09/07: HW1 due
    09/10: HW2 out
    4
  • 09/11: Lec09: Crypto building blocks - symmetric-key encryption/decryption, AES ([R] Ch 2.2)
  • 09/13: Lec10: Crypto building blocks - AES cipher modes, message authentication code (MAC) ([R] Ch 2.6, 2.7)
  • 09/15: Lec11: Crypto building blocks - public-key encryption/decryption, RSA, digital signature ([R] Ch 2.3, 2.4)
  • 5
  • 09/18: Lec12: Cryptographic hash, other topics ([R] Ch 2.5)
  • 09/20: Lec13: User authentication ([R] Ch 3.1-3.4)
  • 09/22: Lec14: Authentication protocols ([R] Ch 4.1, 4.2)
  • 09/22: HW2 due
    09/25: HW3 out
    6
  • 09/25: Guest talk - Stephen Burr, Associate CIO & Enterprise CISO, University of Kentucky
  • 09/27: Lec15: Key establishment - KDC ([R] Ch 4.3-4.5)
  • 09/29: Lec16: Key establishment - Diffie-Hellman, Men-in-the-Middle (MITM) attacks ([R] Ch 4.3, 4.7)
  • 7
  • 10/02: Lec17: Public-Key Infrastructure (PKI) ([R] Ch 8.1, 8.2)
  • 10/04: Lec18: Web PKI and TLS ([R] Ch 8.5)
  • 10/06: Lec19: Levels of certification and PKI problems
  • 10/06: HW3 due
    10/06: HW4 out
    8
  • 10/09: Lec20: Web security ([R] Ch 9.1, 9.3-9.4)
  • 10/11: Lec21: Web attacks; SQL injection ([R] Ch 9.5-9.7)
  • 10/13: Lec22: Web 3.0 and blockchain basics
  • 9
  • 10/16: Midterm Review
  • 10/18: Midterm Exam, in class
  • 10/20: Midterm go-over and Lec23: WLAN Background ([R] Ch 12-12.3)
  • 10/15: HW4 due
    10
  • 10/23: Fall Break - no class
  • 10/25: Lec24: WLAN security ([R] Ch 12.4-12.6)
  • 10/27: Lec25: 802.11 RSN and more about Wi-Fi security ([R] Ch 12.7, 12.8)
  • 10/27: HW5 out
    11
  • 10/30: Lec26: Firewalls ([R] Ch 10-10.2)
  • 11/01: Lec27: Tunnels, VPN, IPsec, SSH ([R] Ch 10.3-10.5)
  • 11/03: Lec28: Intrusion detection intro ([R] Ch 11-11.3)
  • 12
  • 11/06: Lec29: IDS/IPS systems
  • 11/08: Lec30: BGP & Inter-domain routing
  • 11/10: Lec31: RPKI and BGPsec
  • 11/10: HW5 due
    13
  • 11/13: Lec32: Bitcoin ([R] Ch 13.1-13.7)
  • 11/15: Lec33: Ethereum ([R] Ch 13.8)
  • 11/17: Lec34: Blockchain security topics
  • 14
  • 11/20: Buffer/catch-up
  • 11/22: Thanksgiving Holiday - no class
  • 11/24: Thanksgiving Holiday - no class
  • 11/20: HW6 out
    15
  • 11/27: Project presentations (12 minutes each)
    • Group 10: SCION Internet Architecture
    • Group 3: Wi-Fi Protected Access 3
    • Group 14: BGP Attacks - KLAYswap and MyEtherWallet Attack
    • Group 1: Ransomware Attacks - WannaCry and NotPetya
  • 11/29: Project presentations (12 minutes each)
    • Group 6: Front Facing Exploits
    • Group 5: Privacy Preserving Cryptocurrencies - Monero
    • Group 9: WannaCry Ransomware Attack and Bangladesh Bank Cyber Heist
    • Group 12: Heartbleed and Cloudbleed Attacks
  • 12/01: Project presentations (12 minutes each)
    • Group 7: Ethereum Proof-of-stake Transition and Sharding
    • Group 2: German Parliament Attack and DNC 2016 Attack
    • Group 11: Decentralized Identifiers and Verifiable Credentials
    • Group 4: Open ID Connect
    • Group 8: Ransomware Attacks - WannaCry and NotPetya
    11/27: HW6 due
    16
  • 12/04: (Prep Days) Homework Problems Review + extended time on report
  • 12/06: (Prep Days) Final Exam Review
  • 12/08: No class
  • 12/03: Project Report due
    17
  • 12/11 (Mon): Final exam, 10:30 AM - 12:30 PM, in classroom
  •  

    Textbooks and Materials

    Computer Security and the Internet: Tools and Jewels, second edition, by Paul C. van Oorschot, Springer, 2022. ISBN: 978-3-030-83410-4 (hardcopy), 978-3-030-83411-1 (eBook). PDF of chapters is available online at the author’s personal website. More recommended materials will be published in Canvas.

    Learning/Research Resources

    UK Libraries, Free Tutoring and Coaching at UK, Google Scholar, ACM Digital Library, IEEE Xplore, dblp: computer science bibliography