CSC 774 Network Security

Spring 2003

(This page will be changed frequently. Check before class.)

Schedule of Classes

Schedule of Presentations (Tentative)

Grading Form for In-class Presentation (New)

Papers for Advanced Topics

About the Term Paper (New)

Instructional Objectives (Will be updated after completion of each topic.)

Instructor:

Dr. Peng Ning

Office hours:

Mondays and Wednesdays, 3:00pm - 4:00pm, 453 EGRC, Centennial Campus

Office phone:

(919) 513-4457

Fax:

(919)515-7925

Email address:

My last name followed by (at) then followed by csc.ncsu.edu.

Homepage:

http://www.csc.ncsu.edu/faculty/ning

Teaching assistant:

Yan Zhai

Office hours:

TBD.

Email address:

yzhai@unity.ncsu.edu

Class location:

Room 150 Venture II, Centennial Campus

Day and time:

Mondays and Wednesdays, 4:35pm -5:50pm.

Mailing list:

csc774-001@wolfware.ncsu.edu

Web page:

http://courses.ncsu.edu/csc774/lec/001 

Message Board:

http://courses.ncsu.edu/csc774 

Course Syllabus: http://courses.ncsu.edu/csc774/lec/001/syllabus.html

Note on assignments:

You must use text editor (e.g. MS Word) to complete your homework. Handwritten submissions are not accepted. You should submit hard copies unless otherwise specified.

All work is to be performed individually unless otherwise specified. For the collaborative problems, you are encouraged to form teams of 1-3 members (of students in this class) to cooperate only on those problems. After discussing the problems, please write up your answers individually. Indicate the names of the other members in your team, if any.

You get no extra credit for working alone where collaboration is permitted.

 

Term Paper :

Each student is required to complete a survey paper or a research paper. Each student needs to submit a proposal in the middle of the semester and the final version by the end of the semester. Both will be graded. Students can form teams, each with up to three members.

People who write research paper will be rewarded by getting 50 bonus points by default. In addition, there will be other bonus points depending on the quality of the proposal or the paper. However, you need to realize that it is more difficult to write an original research paper than a survey paper. You are encouraged to combine this effort with your current research. You are also encouraged to discuss your work with the instructor during his office hours or by appointment.

Requirements for term paper proposal 

Requirements for final term paper

  • Research Paper
    • You can work on original research problems. The outcome should be a paper with original technical contribution. Your grade on this will be judged on originality, soundness of the approach, and quality of presentation. 
    • You are encouraged to choose this if you are a PhD student or a master student that has to complete a thesis.
  • Survey Paper
    • You can write a paper that surveys a particular field on information security. The outcome should be a paper that summarizes the trend in the field you have chosen. Your grade will be judged on the completeness of the survey, the quality of the trend analysis, and the quality of presentation.
  • Example Topic Areas:
    • Vulnerability Analysis
    • Wireless Security
    • Intrusion Detection
    • Authentication
    • Access Control
    • Authorization
    • DNS Security
    • Digital Watermarking
    • New Attacks

Schedule of classes

Date

Topics

Reading Assignment
(Complete before class.)

Homework Assignment

Handouts

01/13/03

Topic 1. Course Introduction

Exam for students who haven't taken
CSC 574

Chapters 1 and 3.  

Topic 1

Handout for those who haven't taken CSC 574

01/15/03

Topic 4.1 IPSec

Self-Study: Topic 2. Review of crypto techniques (Chapters 5 and 6.1)

Chapters 4, 14.1 -- 14.4   Topic 4.1
01/20/03 Martin Luther King, Jr. Day (no class)
   
01/22/03

Topic 4.1 (Cont'd)

Self-Study: Topic 3. firewalls
(Chapter 7)

RFC 2401, RFC 2411, RFC 2402, RFC 2406

HW1 (Topics 2, 3, and 4.1)

Due by 2/3/03

Solution

--
01/27/03

Topic 4.2 IP Trace Back

Self-Study: Topic 3. firewalls
(Chapter 8)

A little background on trace back

Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson, "Practical Network Support for IP Traceback", In Proceedings of the 2000 ACM SIGCOMM Conference, pp. 295-306, August 2000.

  Topic 4.2
01/29/03

Topic 5. Internet Key Management (1)

Self-Study: Topic 3. firewalls
(Chapter9)

Chapters 6.2 and 14.5   Topic 5
02/03/03

Topic 5. Internet Key Management (2)

Self-Study: Topic 3. firewalls
(Chapter 10)

SKEME, RFC 2408 (ISAKMP),

HW 2 (Topics 4.2 and 5)

Due by 2/17/03

Solution

 
02/05/03 Midterm Exam 1 Topics 2 -- 5. Open book & notes.

Grade Distribution

 
02/10/03

Review of Midterm 1

 

   
02/12/03

Topic 5.1 IKE

RFC 2409 (IKE)
  Topic 5.1
02/17/03
Topic 6. Transport Layer Security
Chapter 15   Topic 6
02/19/03

Guest Lecture by
Dr. Bin Yu

 

Trust Management
02/24/03 Topic 6 (Cont'd) --

HW 3 (Topic 6)

Instructions about the programming assignment

Due by 3/5/03

Solution

Topic 7.1
02/26/03

Topic 7.1 NetBill

Benjamin Cox, J.D. Tygar, and Marvin Sirbu. "Netbill Security and Transaction Protocol," In The First USENIX Workshop on Electronic Commerce, pages 77--88, July 1995.

See also the NetBill Project Website (Optional)

   
03/03/03

Topic 7.1 (Cont'd)

Topic 7.2 Micropayment

R.L. Rivest, A. Shamir, "PayWord and MicroMint: Two simple micropayment schemes," In Proceedings of Security Protocols Workshop, pages 69 - 87, 1996.

Silvio Micali and Ronald Rivest. Micropayments revisited. In Bart Preneel, editor, Progress in Cryptology --- CT-RSA 2002, volume 2271 of Lecture Notes in Computer Science. Springer-Verlag, February 18-22 2002.

HW 4 (Topic 7)

Due by 3/31/03

Solution

Topic 7.2
03/05/03

Topic 7.2 (Cont'd)

Topic 7.3 Fair Exchange

N. Asokan, M. Schunter, and M. Waidner."Optimistic Protocols for Fair Exchange," In Proceedings of 4th ACM Conference on Computer and Communications Security, Zurich, April 1997.
  Topic 7.3
03/10/03 Spring Break --    
03/12/03 Spring Break
--
   
03/17/03

Topic 7.3 (Cont'd)

Guideline for Preparing In-class Presentation

  About Presentation
03/19/03

Mid-term Exam 2

Topics 6 & 7. Open book & notes.
Grade Distribution  
03/24/03 Topic 8.1 An Overview of Intrusion Detection

P. Ning, S. Jajodia. "Intrusion Detection Techniques," To appear in H. Bidgoli (Ed.), The Internet Encyclopedia , 2003.

B. Mukherjee, L.T. Heberlein, and K.N. Levitt. Network Intrusion Detection, IEEE Network, 8(3): 26-41, May 1994.

  Topic 8.1
03/26/03 Topic 8.2 Intrusion Alert Correlation
P. Ning, Y. Cui, D. S. Reeves, "Constructing Attack Scenarios through Correlation of Intrusion Alerts," in Proceedings of the 9th ACM Conference on Computer & Communications Security , pages 245--254, Washington D.C., November 2002
  Topic 8.2
03/31/03

Advanced Topic 1

Group Key Management

  1. Vladica Stanisic
    S. Mittra, "Iolus: A Framework for Scalable Secure Multicasting," in Proceedings of ACM SIGCOMM 97, pages 277 -- 288.
  2. Yiquan Hu
    H. Harney and E. Harder, "Logical Key Hierarchy Protocol," Internet Draft, draft-harney-sparta-lkhp-sec-00.txt, 1999.
  3. Dingbang Xu
    I. Chang and R. Engel and D. Kandlur and D. Pendarakis and D. Saha, "Key Management for Secure Internet Multicast using Boolean Function Minimization Techniques," in Proceedings of IEEE Infocomm'99", pages 689--698, 1999.
Research Paper Proposal due.

Vladica

Yiquan

Dingbang

04/02/03

Advanced Topic 1

Group Key Management (Cont'd)

  1. Donggang Liu
    R. Kumar and S. Rajagopalan and A. Sahai, "Coding Constructions for Blacklisting Problems without Computational Assumptions," in Advances in Cryptology -- Crypto '99, LNCS 1666, pages 609--623, 1999.
  2. Kun Sun
    S. Banerjee and B. Bhattacharjee, Scalable Secure Group Communication over IP Mulitcast," in Proceedings of Internation Conference on Network Protocols, November, 2001.
  3. Qingfeng He
    M. Steiner and G. Tsudik and M. Waidner, "Diffie-Hellman Key Distribution Extended to Group Communication," in Proceedings of the 3rd ACM Conference on Computer and Communications Security, pages 31--37, 1996.
 

Donggang

Kun

Qingfeng

04/07/03

Advanced Topic 2

Broadcast Authentication

  1. Anubhav Dhoot
    Y. Kim and A. Perrig and G. Tsudik, "Simple and fault-tolerant key agreement for dynamic collaborative groups," in Proceedings of the 7th ACM Conference on Computer and Communications Security, pages 235 -- 244, 2000.
  2. Pooja Kohli Adrian Perrig and Ran Canetti and Dawn Song and Doug Tygar, "Efficient Authentication and Signing of Multicast Streams over Lossy Channels," in Proc. of IEEE Security and Privacy Symposium, May 2000.
  3. Nikhil Negandhi
    Adrian Perrig and Ran Canetti and Dawn Song and Doug Tygar, "Efficient and Secure Source Authentication for Multicast," in Proceedings of Network and Distributed System Security Symposium, February, 2001.
 

Anubhav

Pooja

Nikhil

04/09/03

Advanced Topic 2

Broadcast Authentication (Cont'd)

Advanced Topic 3

Wireless Security

  1. Rich Larsen
    Adrian Perrig, "The BiBa One-Time Signature and Broadcast Authentication Protocol," in Proceedings of the ACM Conference on Computer and Communications Security, November, 2001.
  2. Amit Singh Gambhir
    Leonid Reyzin and Natan Reyzin, "Better than BiBa: Short One-time Signatures with Fast Signing and Verifying," in Proceedings of 7th Australasian Conference on Information Security and Privacy, LNCS 2384, 2002.
  3. Hua Li
    J. Hubaux and L. Buttyan and S. Capkun, "The Quest for Security in Mobile Ad Hoc Networks," in Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing, 2001.
 

Rich

Amit

Hua

04/14/03

Recent Advances in Access Control Models
by
Dr. Sushil Jajodia

Time: 4:00 PM
Place: EGRC, Room 313, NCSU Centennial Campus

     
04/16/03 Easter break
   
04/21/03

Advanced Topic 3

Wireless Security (Cont'd)

  1. Monty Barber
    S. Marti and T. J. Giuli and K. Lai and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, pages 255 -- 265, 2000.
  2. Erkang Zheng
    D. Balfanz and D.K. Smetters and P. Stewart and H.C. Wong, "Talking to Strangers: Authentication in Ad-Hoc Wireless Networks," in Proceedings of 2002 Symposium on Network and Distributed Systems Security (NDSS '02), February 2002.
  3. Sameer Korrapati
    Y. Hu and A. Perrig and D. B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad~Hoc Networks," inProceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002), September, 2002.
 

Monty

Erkang

Sameer

04/23/03

Advanced Topic 3

Wireless Security (Cont'd)

  1. Bharathy Sethumadhavan
    S. Buchegger and J. L. Boudec, "Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes: Fairness in Dynamic Ad-hoc Networks)," in Proceedings of The Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, pages 226--236, June, 2002.
  2. Pan Wang
    S. Zhu, S. Xu, S. Setia and S. Jajodia."LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks," To appear in ICDCS 2003 International Workshop on Mobile and Wireless Network (MWN 2003), May 2003.
 

Bharathy

Pan

 

04/28/03 Advanced Topic
  1. Stratimir Doichev
    L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 41 -- 47, November, 2002.
  2. Sujeet Mehta
    Adrian Perrig and Robert Szewczyk and Victor Wen and David Culler and J.D. Tygar, "SPINS: Security Protocols for Sensor Networks," in Proceedings of Seventh Annual International Conference on Mobile Computing and Networks, July 2001.
 

Stratimir

Sujeet

04/30/03 review
Research Paper Due. Review
05/12/03 Final Exam
(1pm - 4pm)
Topic 9 and Advanced Topics 1 - 3.
   

Peng Ning