CSCE 715: Network Systems Security

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Introduction 1-1 CS6204 Recent Advances in Computer Security and Privacy 3-credit graduate-level seminar Danfeng (Daphne) Yao Spring 2010 Office hours:
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
CSCE 211: Digital Logic Design Muhammad N. Sakib University of South Carolina.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
1 Formal Specification and Verification of a Micropayment Protocol Alex X. Liu The University of Texas at Austin, U.S.A. October 13, 2004 Co-author: Mohamed.
CS533 Concepts of Operating Systems Class 1 Course Overview and Entrance Exam.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 211: Digital Logic Design
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 CSE 651: Introduction to Network Security Steve Lai Spring 2010.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
A First Course in Information Security
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
@Yuan Xue CS 285 Network Security Fall 2008.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 211: Digital Logic Design Chin-Tser Huang University of South Carolina.
Network Security Introduction
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Introduction to Network Systems Security Mort Anvari.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
CSCE 211: Digital Logic Design
Cryptography and Network Security
CNT 4704 Computer Communication Networking (not “analysis”)
CSCE 715: Network Systems Security
CSCE 715: Network Systems Security
Data & Network Security
CS533 Concepts of Operating Systems Class 1
CSCE 211: Digital Logic Design
Information and Network Security
CSCE 715: Network Systems Security
CSCE 715: Network Systems Security
Computer and Network Security
CSCE 211: Digital Logic Design
Cryptography and Network Security
CSCE 211: Digital Logic Design
Security Of Wireless Sensor Networks
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
CSCE 715: Network Systems Security
CSCE 211: Digital Logic Design
CDK: Chapter 7 TvS: Chapter 9
CSCE 715: Network Systems Security
Introduction to Cryptography
CS533 Concepts of Operating Systems Class 1
Cryptography and Network Security
Presentation transcript:

CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina

About Me Chin-Tser Huang Ph.D. in Computer Sciences, University of Texas at Austin Research in network security, network protocol design and verification, distributed systems My web page can be found at http://www.cse.sc.edu/~huangct 01/12/2009 (C) 2009 Chin-Tser Huang

About You What’s your name? Where are you from? When did you join USC? What are your research interests? 01/12/2009 (C) 2009 Chin-Tser Huang

About the Course A grad-level course focusing on basics and issues in network security First half will be lectures about elements of network security, cryptography backgrounds, and introduction to network security designs Second half will be your chance to present what you have learned from key research papers 01/12/2009 (C) 2009 Chin-Tser Huang

Course Information Online http://www.cse.sc.edu/~huangct/CSCE715S09/index.htm List of assigned paper and useful links are available on the page Lecture slides will be available online too 01/12/2009 (C) 2009 Chin-Tser Huang

Why Should You Take This Course Security is an increasingly important issue You want to have basic knowledge about network security You can learn latest attacks and newest skills to counter those attacks You have a chance to implement the skills learned in the class 01/12/2009 (C) 2009 Chin-Tser Huang

Your Best Strategy Come to every lecture to learn basic security problems and skills to counter them Keep yourself exposed to articles related to network security to collect project ideas Read each assigned paper and write good summary for each paper Do not wait till last minute to prepare for exam or work on project Enjoy the fun! 01/12/2009 (C) 2009 Chin-Tser Huang

What Can Go Wrong… …when your computer y receive or is waiting for a message m? ? Internet m x y 01/12/2009 (C) 2009 Chin-Tser Huang

Message Loss Adversary A can discard m in its transit A m x y 01/12/2009 (C) 2009 Chin-Tser Huang

Message Interception Adversary A can get a copy of m when m passes by x y 01/12/2009 (C) 2009 Chin-Tser Huang

Message Modification Adversary A can arbitrarily modify the content of m to become m’ A m m’ x y 01/12/2009 (C) 2009 Chin-Tser Huang

Message Insertion Adversary A can arbitrarily fabricate a message m, pretending that m was sent by x src: x dst: y A m x y 01/12/2009 (C) 2009 Chin-Tser Huang

Message Replay Adversary A can replay a message m that has been sent earlier by x and received by y m A m x y 01/12/2009 (C) 2009 Chin-Tser Huang

Denial-of-Service Attack Adversary A can send huge amount of messages to y to block m from arriving at y In the case of botnet attack, the adversary instructs many bots to send messages to y simultaneously A m … … … … … … ????? x y 01/12/2009 (C) 2009 Chin-Tser Huang

More Scenarios In one case, x wants y to be able to verify message m is sent by a legitimate party but not able to determine identity of x src: ? dst: y Internet m x y 01/12/2009 (C) 2009 Chin-Tser Huang

More Scenarios In another case, y wants to be able to prove to third party z that y receives message m from x z x sent to y m Internet m x y 01/12/2009 (C) 2009 Chin-Tser Huang

Network Security Is Great… Protect messages from interception in their transit Provide desired level of privacy for user or data Detect and discard messages that are modified, inserted, or replayed Disallow unauthorized access to local system resource and sensitive data 01/12/2009 (C) 2009 Chin-Tser Huang

…But Hard To Achieve Many layers in network architecture Many different media of network connection Adversary’s location hard to determine New attacks keep emerging Cryptographic overhead 01/12/2009 (C) 2009 Chin-Tser Huang

Next Class Type of attacks Network security services Formal specification and verification of network protocols Read Ch. 1 01/12/2009 (C) 2009 Chin-Tser Huang