cse598k cse545 advanced network security
play

CSE598k / CSE545 Advanced Network Security Lecture 1 - Introduction - PowerPoint PPT Presentation


  1. �������฀฀���฀฀�������� ��������������฀�������� � � �������฀���฀��������฀��������฀������ ����������฀��฀��������฀�������฀���฀����������� ������������฀�����฀�����������฀����������฀����฀฀�� CSE598k / CSE545 Advanced Network Security Lecture 1 - Introduction Prof. Patrick McDaniel Systems and Internet Infrastructure Security Laboratory (SIIS) Page 1

  2. Oops ... CSE545 - Advanced Network Security - Professor McDaniel Page 2

  3. Network Security • No really good definition, so we will accept the following for this course: The study of the security of systems, applications, infrastructure, and tools that relate to online computing. • Implication ‣ Networks: physical layer, protocols, and flows ‣ Applications: how they are designed and ‣ People and Policy: how do we use these system and what kinds of security do we need? CSE545 - Advanced Network Security - Professor McDaniel Page 3

  4. Network Security Questions • How is this different than other types of security? • Is the distinction between network security and other types of security meaningful any more? • Is there anything more to study? CSE545 - Advanced Network Security - Professor McDaniel Page 4

  5. CERT Reports • AOL Media Playback • OpenSSL FIPS • Questions ‣ What are the vulnerabilities? ‣ How can you exploit them? ‣ What is the cause? CSE545 - Advanced Network Security - Professor McDaniel Page 5

  6. Why are we here? -- Goals • Our goal: to provide you with the tools to perform research in . ‣ Evaluating network security techniques ‣ Designing network security solutions ‣ Attacking network infrastructure ‣ Developing analysis methods • This is going to be a time-consuming course . The key to success is sustained effort. Failure to keep up with readings and assignments will likely result in poor grades, and little understanding of the course material. • Pay-off : network security research competence is a necessary, rare, valuable skill CSE545 - Advanced Network Security - Professor McDaniel Page 6

  7. Course Materials • Website - We are maintaining the course website at http://www.cse.psu.edu/~mcdaniel/cse545/index.html ‣ Course assignments, slides, and other artifacts will be made available on the course websites CSE545 - Advanced Network Security - Professor McDaniel Page 7

  8. Course Calendar • The course calendar as all the relevant readings, assignments and test dates • Please check the website frequently for announcements and changes to the schedule. Students are responsible for any change on the schedule (we will try to make announcements in class). CSE545 - Advanced Network Security - Professor McDaniel Page 8

  9. Grades • Grading policy – 40% Course Project – 20% Assignments – 25% Final Exam – 15% Class Participation, quizzes • Lateness policy - Assignments are assessed a 10% per-day late penalty, up to a maximum of 4 days. Unless the problem is apocalyptic, don't give us excuses. Students with legitimate reasons who contact the professor before the deadline may apply for an extension. CSE545 - Advanced Network Security - Professor McDaniel Page 9

  10. Activities • Homework ‣ reductions, logic problems, etc. ‣ readings, readings, readings ... • Projects ‣ perform some limited attack or desgin ‣ perform analysis of something interesting • Quizzes ‣ if you don’t do the reading ... CSE545 - Advanced Network Security - Professor McDaniel Page 10

  11. Ethics Statement This course considers topics involving personal and public privacy and security. As part of this investigation we will cover technologies whose abuse may infringe on the rights of others. As an instructor, I rely on the ethical use of these technologies. Unethical use may include circumvention of existing security or privacy measurements for any purpose, or the dissemination, promotion, or exploitation of vulnerabilities of these services. Exceptions to these guidelines may occur in the process of reporting vulnerabilities through public and authoritative channels. Any activity outside the letter or spirit of these guidelines will be reported to the proper authorities and may result in dismissal from the class. When in doubt, please contact the instructor for advice. Do not undertake any action which could be perceived as technology misuse under any circumstances unless you have received explicit permission from Professors Jaeger or McDaniel. CSE545 - Advanced Network Security - Professor McDaniel Page 11

  12. Read for Next week • Jerome H. Saltzer, David P . Reed, and David D. Clark. End- to-end arguments in system design. ACM Transactions on Computer Systems 2, 4 (November 1984) pages 277-288. • K. Thompson, "Reflections on Trusting Trust," Communications of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763. • J.H. Saltzer and M.D. Schroeder. Part I-A of The Protection of Information in Computer Systems. Proceedings of the IEEE, 63(9):1278-1308, 1975. CSE545 - Advanced Network Security - Professor McDaniel Page 12

  13. Assignment: Due 1/28 • Follow these steps: 1. Download on Linux or OS/X a VM system 2. Install a Linux operating system running in a VM 3. Install different kinds of network servers 4. Download and install Metasploit tool 5. Compromise the server over the network • Write a report, with screen shots and log files that describes a network attacks ~ at least 1 page text each in deep detail of the attack and how it works. CSE545 - Advanced Network Security - Professor McDaniel Page 13

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend