- Departments / Centres
To understand the network security, services, attacks, mechanisms, types of attacks on TCP/IP protocol suite.
To comprehend and apply authentication services, authentication algorithms
To comprehend and apply network layer security protocols, Transport layer security protocols, Web security protocols.
To understand the wireless network security threats.
Overview of Network Security, Security services, attacks, Security Issues in TCP/IP suite- Sniffing, spoofing, buffer overflow, ARP poisoning, ICMP Exploits, IP address spoofing, IP fragment attack, routing exploits, UDP exploits, TCP exploits.
Authentication requirements, Authentication functions - Message Authentication Codes - Hash Functions - Security of Hash Functions and MACs - MD5 message Digest algorithm - Secure Hash Algorithm - RIPEMD - HMAC Digital Signatures, Authentication protocols-Kerberos, X.509.
IP Security-AH and ESP, SSL/TLS, SSH, Web Security-HTTPS, DNS Security, Electronic Mail Security (PGP, S/MIME).
Intruders, Viruses, Worms, Trojan horses, Distributed Denial-Of-Service (DDoS), Firewalls, IDS, Honey nets, Honey pots.
Introduction to wireless network security, Risks and Threats of Wireless networks, Wireless LAN Security (WEP, WPA).
Be able to determine appropriate mechanisms for protecting the network.
Design a security solution for a given application, system with respect to security of the system
Yang Xiao and Yi Pan, “Security in Distributed and Networking Systems”, World Scientific, 2007, Chapter 1.
W. Stallings, “Cryptography and Network Security: Principles and Practice”, 5/E, Prentice Hall, 2013.
Aaron E. Earle, “Wireless Security Handbook”, Auerbach publications, Taylor & Francis Group, 2006.
Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003.