There are no official texts for the course. As background, we suggest several texts:
Date | Presenter | Topics | Notes | Readings |
---|---|---|---|---|
Tu 01/15 | MCC | Course Overview |
Slide deck 1 [pdf] |
Symantec: Internet Security Threat Report. (no review due) |
Part 1: Physical Network Security |
||||
Th 01/17 | MCC | Physical Layer Security | Slide deck 2 [pdf] | Security and Protection in a Google Data Center (Youtube video) (no review due) |
Tu 01/22 | MCC | Physical Network Security: Copper Media | Slide deck 2 [pdf] | Introduction to Copper Cabling: Chapters 5, 8, and 12 (click on the link next to "online access") |
Th 01/24 | MCC | Physical Network Security: Optical Media | Slide deck 2 [pdf] | Optical Network Survivability: Read Chapters 9.0 and 9.1, skim 9.2-9.7 to get the main ideas. |
Part 2: Data Center and Enterprise Networks |
||||
Tu 01/29 | MCC | LAN Security | Slide deck 3 [pdf] | The Six Dumbest Ways to Secure a Wireless LAN. Do google/wikipedia searches as necessary to understand the terms you don't know (EAP, SSID, etc.) |
Th 01/31 | MCC | LAN Security II | Slide deck 3 [pdf] | LAN Switch Security: Read Chapter 1, the introductions of Chapters 2-7, and Chapter 18. Lecture proposal paragraph due |
Tu 02/05 | MCC | LAN Security III | Slide deck 3 [pdf] | Building Resilient IP Networks: Read Chapter 2, Skim Chapter 9, then use the index to lookup and understand the following terms: RootGuard, BPDUGuard, uRPF, Control Plane Policing, dynamic ARP inspection |
Th 02/07 | MCC | Resilient Network Topologies I | Slide deck 3 [pdf] | Building Resilient IP Networks:
Use the index to lookup and understand the following terms: BFD, Five
nines availability, OIR, Route Processor Redundancy, SSO, NSF, HSRP,
VRRP, FCAPS, ECMP, Fast Reroute, GD release, Hello Packets, L2TP,
life cycle management, MTBF and MTTR, MIB, MPLS, MBGP, NetFlow, NAT,
operations: IP SLAs, the items under "optimization", soft reset,
PVLANs, P and PE routers, PVST, reverse proxy caching, RSTP |
Part 3: Router Mechanisms for Security | ||||
Tu 02/12 | MCC | Router and Switch Architectures | Slide deck 4 [pdf] | Network Algorithmics: Skim Chapters 13 and 15 to get the main ideas. |
Th 02/14 | MCC | Lookup and Classification Algorithms | Slide deck 4 [pdf] | Network Algorithmics: Skim Chapters 10, 11, 12 to get the main ideas. Project proposal paragraph due |
Tu 02/19 | MCC | Packet scheduling and fair queuing | Slide deck 4 [pdf] | Network Algorithmics: Read first half of Chapter 14. |
Th 02/21 | MCC | Queuing and Scheduling Algorithms | Slide deck 4 [pdf] | Network Algorithmics: Read second half of Chapter 14. Lecture outline due. Sample lecture outline |
Part 4: Network Configuration and Defense | ||||
Tu 02/26 | MCC | Internet Policy Routing | Slide deck 5 [pdf] | BGP Routing Policies in ISP Networks Lecture reading assignment due. |
Th 02/28 | Everyone | Initial Project Proposal Presentations | Initial project presentations due. | |
Tu 03/05 | MCC | Internet Policy Routing II | Slide deck 5 [pdf] | A Survey of BGP Security Issues and Solutions |
Part 5: Securing Distributed and Networked Systems | ||||
Th 03/07 | MCC | Securing Distributed Algorithms | Slide deck 6 [pdf] | |
Tu 03/12 | MCC | Securing Distributed Algorithms |
Slide deck 6 [pdf] | Lecture slides draft due. |
Part 6: The Big Picture | ||||
Th 03/14 | Devasia Manuel | Physical Security: Wireless Media | Devasia's slides [pdf] | Intro to Cellular Networks Satellite Communications |
Spring Break: March 16 through March 24 | ||||
Tu 03/26 | Michael Rogers, Leena Winterrowd | Malware | Michael and Leena's slides [pdf] | Malware Analyst's Cookbook: Read Chapter 5, skipping 5-3 and 5-4. |
Th 03/28 | Rakesh Kumar, Aaron Phelps | QoS and Multicast | Rakesh and Aaron's slides [pdf] | Fundamental Design Issues for the Future Internet RFC 3710 |
Tu 04/02 | MCC | Special Mystery Lecture | Look up Illinois faculty working in network security (skip me): go here, click on "by research" --> "sys" --> "networking". For
each, go to the publications page on their web site, pick a paper that
looks cool and is related to security, and read its abstract. Just get
a general sense of what that paper is about. | |
Part 7: Hot Topics in Network Security | ||||
Th 04/04 | Yiwei Yang, Faraz Faghri | Web and DNS security | Yiwei's slides [pdf] Faraz's slides [pdf] | Network Security with OpenSSL: Read Chapter 3. and Pro DNS and BIND 10: Read Chapters 10.1 and 11.1 Optional: Collateral Damage of Internet Censorship Optional: DNS Amplification DDoS Attack Optional: DNS Video 1, DNS Video 2, |
Tu 04/09 | Shehla Rana Furquan Shaikh | Wireless Security | Shehla and Furquan's slides [pdf] | Wireless Security in the Enterprise (whitepaper) |
Th 04/11 | Rashid Tahir Corbin Souffrant | Covert Channels in Networks | Rashid's Slides [pdf] Corbin's Slides [pdf] | Required: A Survey of Covert Channels and Countermeasures Optional: Hey, You, Get Off of My Cloud (To read these and other articles behind paywalls for free, when you are off-campus: First, create a bookmark in your browser with this as the URL. Then open the paywall page and click your bookmark link. This will automatically proxy you through UIUC's library link. Log in and you can read the article for free.) |
Tu 04/16 | Zak Estrada, Bertrand Bonnefoy-Claudet | Quantum Cryptography/ Communication | Zak and Bertrand's slides [pdf] | Quantum Cryptography: As Awesome as it is Pointless Quantum Mechanics |
Th 04/18 | Abhishek Sharma, Rohan Sharma, Hilfi Alkaff | Security of Internet Architectures | Abhishek, Rohan, and Hilfi's slides [pdf] | NSF FIA project web site Information Centric Networking |
Tu 04/23 | Muhammed Naveed (first half of class), Fred Douglas (second half of class) | Secure Multiparty Computation (first half of class), Resilient Network topologies (second half of class) | Muhammed's slides [pdf] | Faster Secure Two-Party Computation Using Garbled Circuits and (optional) Read first five pages of: Optimizing Network Topology for Cascade |
Th 04/25 | Anupam Das (first half of class), Tim Boerner (second half of class) | Anomaly Detection and Traffic Analysis (first half of class), Operational Network Security (second half of class) | Anupam's slides [pdf] Tim's slides [pdf] | Varun Chandola, Arindam Banerjee, and Vipin Kumar, "Anomaly Detection : A Survey", ACM Computing Surveys, Vol. 41(3), Article 15, July 2009. and Skim Chapter 1 of this Cisco Security Architectures for the Enterprise |
Tu 04/30 | Craig Buchanan, Philip Chan | Intrusion Detection Algorithms | Craig's slides [pdf] Philip's slides [pdf] | Network Algorithmics: Read Chapter 16, skim Chapter 17 to get the main ideas. (optional) Data Mining for Intrusion Detection (optional) Network Traffic Anomaly Detection |
M 05/06 | MCC, Phuong Cao | Special extra class! Traffic Anomaly Detection and DHT Security. | Phuong's slides [pdf] MCC's slides [pdf] | |
Tu 05/07 |
Poster session -- Atrium outside 2405 Siebel Center. | Poster due | Final project poster due | |
Su 05/12 |
Project writeup due | Final project writeup due |