CS 572 (Fall 2024)
Network Security
Course Information
Instructor: Yang Xiao (contact: xiaoy[AT]uky.edu)
Meeting Times: M/W/F 11:00 AM – 11:50 AM Eastern Time (location: register course to know)
Office Hour: Hardymon Rm 233, W/F 2:00 PM – 3:00 PM Eastern Time
Course Description
This course introduces students to the state of the art of network security problems and solutions. Topics include security issues in computer networks, the Public Key Infrastructure ecosystem, key exchange protocols, and security mechanisms and protocols at the application, transport, network and data link layers. It will also discuss up-to-date development in the field of network security.
Textbooks and Materials
Computer Security and the Internet: Tools and Jewels, second edition, by Paul C. van Oorschot, Springer, 2022. ISBN: 978-3-030-83410-4 (hardcopy), 978-3-030-83411-1 (eBook).
PDF of chapters is available online at the author’s personal website.
More recommended materials will be published in Canvas.
Course Schedule (Tentative)
Week |
Agenda ([R] Required Reading, [S] Suggested Reading) |
Notes |
1 |
08/26: Lec01: Course introduction.
08/28: Lec02: Basic concepts - trust, policy, risk, modeling. ([R] Ch 1.1-1.3)
08/30: Lec03: Security properties - the CIA Triad and more. ([R] Ch 1.7)
|
|
2 |
09/02: Labor Day Holiday - no class
09/04: Lec04: Networking recap - LANs, IP. ([R] Ch 10.6) (Pre-recorded lecture; Yang is in travel)
09/06: Lec05: Networking recap - TCP, UDP
|
09/06: HW1 out |
3 |
09/09: Lec06: Networking recap - DNS, HTTP
09/11: Lec07: Networking - attacks ([R] Ch 11.3)
09/13: Lec08: Crypto building blocks - information security, ciphers ([R] Ch 2.1-2.3)
|
09/13: HW2 out |
4 |
09/16: Lec09: Crypto building blocks - symmetric-key encryption/decryption, AES, cipher modes ([R] Ch 2.2)
09/18: Lec10: Crypto building blocks - public-key encryption/decryption, RSA, digital signature ([R] Ch 2.3, 2.4)
09/20: Lec11: Crypto building blocks - Cryptographic hash function, message authentication code (MAC) ([R] Ch 2.5, 2.6, 2.7)
|
09/16: HW1 due |
5 |
09/23: Lec12: User authentication ([R] Ch 3.1-3.4)
09/25: Lec13: Authentication protocols ([R] Ch 4.1, 4.2)
09/27: Lec14: Key establishment - KDC, DHKE, and MitM attacks ([R] Ch 4.3-4.5, 4.7)
|
09/25: HW2 due |
6 |
09/30: Lec15: Public-Key Infrastructure (PKI) ([R] Ch 8.1, 8.2)
10/02: Lec16: Transport Layer Security (TLS) and Web PKI([R] Ch 8.5)
10/04: Lec17: PKI problems
|
09/30: HW3 out |
7 |
10/07: Lec18: Project ideas and walk-through
10/09: Attending UK_CYBERCON, 10:00 AM – 5:00 PM (Please RSVP in advance; it is free)
10/11: Guest talk - Stephen Burr, Enterprise CISO, University of Kentucky and UK HealthCare
|
10/11: HW3 due, HW4 out |
8 |
10/14: Lec19: Web security ([R] Ch 9.1, 9.3-9.4)
10/16: Lec20: Web attacks; SQL injection ([R] Ch 9.5-9.7)
10/18: Lec21: Web3 and blockchain
|
10/18: Project proposal due |
9 |
10/21: Midterm Review
10/23: Midterm Exam, in class
10/25: Lec22: WLAN Background ([R] Ch 12-12.3)
|
10/20: HW4 due |
10 |
10/28: Fall Break - no class
10/30: Lec23: WLAN security ([R] Ch 12.4-12.6)
11/01: Lec24: Network Trust Boundaries and NAT ([R] RFC 3022)
|
10/30: HW5 out |
11 |
11/04: Lec25: Firewalls ([R] Ch 10-10.2)
11/06: Lec26: Tunnels, IPsec, VPN ([R] Ch 10.3-10.5, RFC 3715)
11/08: Lec27: SSH, Tor
|
|
12 |
11/11: Lec28: Intrusion detection systems ([R] Ch 11-11.3)
11/13: Lec29: Intrusion detection systems examples
11/15: Lec30: BGP & Inter-domain routing
| 11/10: HW5 due |
13 |
11/18: Lec31: BGP Security
11/20: Lec32: Bitcoin ([R] Ch 13.1-13.7)
11/22: Lec33: Ethereum ([R] Ch 13.8. Pre-recorded; Yang is in travel)
|
11/17: HW6 out |
14 |
11/25: Lec34: Recent security topics, buffer/catch-up
11/27: Thanksgiving Holiday - no class
11/29: Thanksgiving Holiday - no class
|
|
15 |
12/02: Project presentations (each: 10 min presentation + 2 min Q&A)
- Group 7: Massive consumer data breaches - Target and Facebook-Cambridge Analytica
- Group 4: Vehicular Network Security - CAN Injection and Tesla Model S Hack
- Group 3: SCION Internet Architecture
- Group 1: Ransomware Attacks - Colonial Pipeline Attack and Kaseya VSA Attack
12/04: Project presentations (each: 10 min presentation + 2 min Q&A)
- Group 6: CrowdStrike and AT&T Outages
- Group 11: Cryptocurrency hacks
- Group 2: Software Supply Chain Attacks - Stuxnet and SolarWinds
- Group 8: Healthcare Data Breaches
12/06: Project presentations (each: 10 min presentation + 2 min Q&A)
- Group 9: Robotext scams in Next-Gen wireless Communications
- Group 10: BGP hijacking
- Group 5: WiFi Protected Access 3 (WPA3)
|
12/02: HW6 due |
16 |
12/09: (Prep Days) Homework Problems Review
12/11: (Prep Days) Final Exam Review
12/13: No class
|
12/10: Project Report due |
17 |
12/18 (Wed): Final exam, 10:30 AM - 12:30 PM, in classroom
|
|
Learning/Research Resources
UK Libraries,
Free Tutoring and Coaching at UK,
Google Scholar,
ACM Digital Library,
IEEE Xplore,
dblp: computer science bibliography