Network Security

Objectives

  • Understand the problem of network security as a transversal requirement to all levels of the TCP/IP protocol stack.
  • Explain the vulnerabilities of main applicational services and protocols, transport and network protocols, and corresponding security solutions.
  • Explain the vulnerabilities of main wireless and mobile technologies, and corresponding security solutions.
  • Identify the types of security attacks stemming from vulnerabilities of TCP/IP protocol stack.
  • Explore network operational security using tools for protocol analysis.
  • Apply secure protocol solutions in support of network applications and services from an end-to-end perspective.

Program

  • Introduction to security in TCP/IP Networks
  • Identification and classification of vulnerabilities
  • Models and types of attacks
  • Security of application services and protocols (HTTPS, email, DNS, BGP)
  • End-to-end data transport security: TLS/TCP, QUIC/UDP protocols
  • Network-level security: IPv4 vs IPv6, IPSec, VPNs
  • Security in wireless and mobile networks
  • Network operational security: protocol analysis

Bibliography

  • W. Stallings. Cryptography and Network Security: Principles and Practice. 8th Edition, Pearson, 2022.
  • J. Kurose, K. Ross. Computer Networking: A Top-Down Approach. 8th Edition, Pearson, 2021.
  • W. Stallings, L. Brown. Computer Security Principles and Practice. 5th Edition, Pearson, 2023.
  • K. Sriram, D. Montgomery. Resilient Interdomain Traffic Exchange: BGP Security and DDoS Mitigation. NIST Special Publication (NIST SP), 2019. [online] https://doi.org/10.6028/NIST.SP.800-189
  • S. Rose et al. Trustworthy Email. NIST Special Publication (NIST SP), 2019, [online], https://doi.org/10.6028/NIST.SP.800-177r1
  • E. Barker et al. Guide to IPsec VPNs. NIST Special Publication (NIST SP), 2020, [online], https://doi.org/10.6028/NIST.SP.800-77r1

Updated: