CS 598MCC: Network Security: Syllabus

Textbooks

There are no official texts for the course. As background, we suggest several texts:

Grading

Your final grade for the course will be based on the following weights:

The project in this course is an open-ended research project, ideally done in groups of two. The project requires a proposal, a checkpoint status report, a poster presentation, and a final report.

An essential component of the course is to read and understand the core technologis and techniques used in network security. You will be required to submit paper summaries before class and to participate in classroom discussion. 

Schedule

Date Presenter Topics Notes Readings
Tu 01/15 MCC Course Overview
Slide deck 1 [pdf]
Symantec: Internet Security Threat Report. (no review due)
Part 1: Physical Network Security
Th 01/17 MCC Physical Layer Security Slide deck 2 [pdf] Security and Protection in a Google Data Center (Youtube video)
(no review due)
Tu 01/22MCC
Physical Network Security: Copper Media
Slide deck 2 [pdf]Introduction to Copper Cabling: Chapters 5, 8, and 12 (click on the link next to "online access")
Th 01/24MCCPhysical Network Security: Optical Media Slide deck 2 [pdf]Optical Network Survivability: Read Chapters 9.0 and 9.1, skim 9.2-9.7 to get the main ideas.
Part 2: Data Center and Enterprise Networks
Tu 01/29MCCLAN SecuritySlide deck 3 [pdf]The Six Dumbest Ways to Secure a Wireless LAN. Do google/wikipedia searches as necessary to understand the terms you don't know (EAP, SSID, etc.)
Th 01/31MCC
LAN Security II
Slide deck 3 [pdf] LAN Switch Security: Read Chapter 1, the introductions of Chapters 2-7, and Chapter 18.
Lecture proposal paragraph due
Tu 02/05MCCLAN Security IIISlide deck 3 [pdf]Building Resilient IP Networks: Read Chapter 2, Skim Chapter 9, then use the index to lookup and understand the following terms: RootGuard, BPDUGuard, uRPF, Control Plane Policing, dynamic ARP inspection
Th 02/07MCC
Resilient Network Topologies I Slide deck 3 [pdf] Building Resilient IP Networks: Use the index to lookup and understand the following terms: BFD, Five nines availability, OIR, Route Processor Redundancy, SSO, NSF, HSRP, VRRP, FCAPS,  ECMP, Fast Reroute, GD release, Hello Packets, L2TP, life cycle management, MTBF and MTTR, MIB, MPLS, MBGP, NetFlow, NAT, operations: IP SLAs, the items under "optimization", soft reset, PVLANs, P and PE routers, PVST, reverse proxy caching, RSTP
Part 3: Router Mechanisms for Security
Tu 02/12MCCRouter and Switch ArchitecturesSlide deck 4 [pdf]Network Algorithmics: Skim Chapters 13 and 15 to get the main ideas.
Th 02/14MCCLookup and Classification AlgorithmsSlide deck 4 [pdf]Network Algorithmics: Skim Chapters 10, 11, 12 to get the main ideas.
Project proposal paragraph due
Tu
02/19
MCCPacket scheduling and fair queuingSlide deck 4 [pdf]Network Algorithmics: Read first half of Chapter 14.
Th 02/21MCCQueuing and Scheduling AlgorithmsSlide deck 4 [pdf]Network Algorithmics: Read second half of Chapter 14.

Lecture outline due. Sample lecture outline
Part 4: Network Configuration and Defense
Tu 02/26MCCInternet Policy RoutingSlide deck 5 [pdf]BGP Routing Policies in ISP Networks
Lecture reading assignment due. 
Th 02/28Everyone

Initial Project Proposal PresentationsInitial project presentations due.
Tu 03/05MCCInternet Policy Routing IISlide deck 5 [pdf]A Survey of BGP Security Issues and Solutions
Part 5: Securing Distributed and Networked Systems
Th 03/07MCCSecuring Distributed Algorithms Slide deck 6 [pdf]
Tu 03/12 MCC Securing Distributed Algorithms
Slide deck 6 [pdf] Lecture slides draft due. 
Part 6: The Big Picture
Th 03/14Devasia ManuelPhysical Security: Wireless MediaDevasia's slides [pdf]Intro to Cellular Networks
Satellite Communications
Spring Break: March 16 through March 24
Tu 03/26Michael Rogers,
Leena Winterrowd
Malware
Michael and Leena's slides [pdf]Malware Analyst's Cookbook: Read Chapter 5, skipping 5-3 and 5-4.
Th 03/28
Rakesh Kumar, Aaron PhelpsQoS and Multicast
Rakesh and Aaron's slides [pdf]Fundamental Design Issues for the Future Internet
RFC 3710
Tu 04/02
MCCSpecial Mystery LectureLook up Illinois faculty working in network security (skip me): go here, click on "by research" --> "sys" --> "networking". For each, go to the publications page on their web site, pick a paper that looks cool and is related to security, and read its abstract. Just get a general sense of what that paper is about. 
Part 7: Hot Topics in Network Security
Th 04/04Yiwei Yang,
Faraz Faghri
Web and DNS securityYiwei's slides [pdf]
Faraz's slides [pdf]
Network Security with OpenSSL: Read Chapter 3.
and
Pro DNS and BIND 10: Read Chapters 10.1 and 11.1  
Optional: Collateral Damage of Internet Censorship
Optional: DNS Amplification DDoS Attack
Optional: DNS Video 1, DNS Video 2,
Tu 04/09Shehla Rana
Furquan Shaikh
Wireless SecurityShehla and Furquan's slides [pdf]Wireless Security in the Enterprise (whitepaper)
Th 04/11Rashid Tahir
Corbin Souffrant
Covert Channels in NetworksRashid's Slides [pdf]

Corbin's Slides [pdf]
Required: A Survey of Covert Channels and Countermeasures
Optional: Hey, You, Get Off of My Cloud
(To read these and other articles behind paywalls for free, when you are off-campus: First, create a bookmark in your browser with this as the URL. Then open the paywall page and click your bookmark link. This will automatically proxy you through UIUC's library link. Log in and you can read the article for free.)
Tu 04/16Zak Estrada,
Bertrand Bonnefoy-Claudet
Quantum Cryptography/ CommunicationZak and Bertrand's slides [pdf]Quantum Cryptography: As Awesome as it is Pointless
Quantum Mechanics
Th 04/18Abhishek Sharma,
Rohan Sharma,
Hilfi Alkaff
Security of Internet ArchitecturesAbhishek, Rohan, and Hilfi's slides [pdf]NSF FIA project web site
Information Centric Networking
Tu 04/23 Muhammed Naveed (first half of class), Fred Douglas (second half of class) Secure Multiparty Computation (first half of class), Resilient Network topologies (second half of class) Muhammed's slides [pdf] Faster Secure Two-Party Computation Using Garbled Circuits
and
(optional) Read first five pages of: Optimizing Network Topology for Cascade
Th 04/25Anupam Das (first half of class), Tim Boerner (second half of class)Anomaly Detection and Traffic Analysis (first half of class), Operational Network Security (second half of class) Anupam's slides [pdf]
Tim's slides [pdf]
Varun Chandola, Arindam Banerjee, and Vipin Kumar, "Anomaly Detection : A Survey", ACM Computing Surveys, Vol. 41(3), Article 15, July 2009.
and
Skim Chapter 1 of this Cisco Security Architectures for the Enterprise
Tu 04/30Craig Buchanan, Philip ChanIntrusion Detection AlgorithmsCraig's slides [pdf]
Philip's slides [pdf]
Network Algorithmics: Read Chapter 16, skim Chapter 17 to get the main ideas.
(optional) Data Mining for Intrusion Detection
(optional) Network Traffic Anomaly Detection
M 05/06MCC, Phuong CaoSpecial extra class! Traffic Anomaly Detection and DHT Security.Phuong's slides [pdf]
MCC's slides [pdf]
Tu 05/07

Poster session -- Atrium outside 2405 Siebel Center.  Poster due Final project poster due
Su 05/12


Project writeup due Final project writeup due