• To understand the network security, services, attacks, mechanisms, types of attacks
  • To comprehend and apply authentication services, authentication algorithms
  • To comprehend and apply network layer security protocols, Transport layer security protocols, Web security protocols.



  • Be able to determine appropriate mechanisms for protecting the network.
  • Design a security solution for a given application, system with respect to security of the system


Unit – I

          Overview of Network Security, Security services, attacks, Security Issues in TCP/IP suiteSniffing, spoofing, buffer overflow, ARP poisoning, ICMP Exploits, IP address spoofing, IP fragment attack, routing exploits, UDP exploits, TCP exploits.


Unit – II

          Authentication requirements, Authentication functions - Message Authentication Codes - Hash Functions - Security of Hash Functions and MACs - MD5 message Digest algorithm - Secure Hash Algorithm - RIPEMD - HMAC Digital Signatures, Authentication protocols-Kerberos, X.509.


Unit – III

         IP Security-AH and ESP, SSL/TLS, SSH, Web Security-HTTPS, DNS Security, Electronic Mail Security (PGP, S/MIME).


Unit – IV

        Intruders, Viruses, Worms, Trojan horses, Distributed Denial-Of-Service (DDoS), Firewalls, IDS, Honey nets, Honey pots.


Unit – V

         Introduction to wireless network security, Risks and Threats of Wireless networks, Wireless LAN Security (WEP, WPA).



  • W. Stallings, “Cryptography and Network Security: Principles and Practice”, 5/E, Prentice Hall, 2013
  • Yang Xiao and Yi Pan, “Security in Distributed and Networking Systems”, World Scientific, 2007, Chapter 1.
  • Aaron E. Earle, “Wireless Security Handbook”, Auerbach publications, Taylor & Francis Group, 2006.



  • Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003