Welcome to 18-731: Network Security

Adrian Perrig, office hours Friday 4-5pm in CIC 2110.
TAs: Charles Fry (office hours Tuesday 4:30-5:30pm in CIC 2214), Ahren Studer (office hours Wednesday 1:30-3pm in CIC 2214), and Akash Zaveri (office hours Monday 2-4pm in INI 225).
We will meet Monday and Wednesday in Hamerschlag Hall B103 4:30-5:50pm.

Course Description:
Some of today's most damaging attacks on computer systems involve exploitation of network infrastructure, either as the target of attack or as a vehicle to advance attacks on end systems. This course provides an in-depth study of network attack techniques and methods to defend against them. Topics include firewalls and virtual private networks; network intrusion detection; denial of service (DoS) and distributed denial-of-service (DDoS) attacks; DoS and DDoS detection and reaction; worm and virus propagation; tracing the source of attacks; traffic analysis; techniques for hiding the source or destination of network traffic; secure routing protocols; protocol scrubbing; and advanced techniques for reacting to network attacks.

The course will involve a substantial research project and some smaller programming projects in C, students are expected to have a solid foundation in C and Unix programming.

Students are also expected to have passed the introductory security classes 18-630 or 18-730 and understand concepts of applied cryptography. To refresh this material, you can read the following chapters in Bruce Schneier's Applied Cryptography: 2, 3, 4, 5, 7, 8, 9, 11, 12, 18, 19.3, 22. Students that took 18-630 need to review Chapter 9, as we did not cover that material in 18-630.


Suggested (optional) Textbook:
Cryptography and Network Security: Principles and Practice (4th edition) by Stallings.

Late Policy:
The deadline for any assignment can be extended with a 10% penalty per day. No deadline can be extended by more than two days. so assignments will NOT be accepted 48 hours after the due date.

Collaboration Policy:
Students are encouraged to talk to each other, to the TAs, to the instructor, or to anyone else about any of the assignments. Any assistance, though, must be limited to discussion of the problem and sketching general approaches to a solution. Each student must write out his or her own solutions to the homeworks. Consulting another student's or group's solution is prohibited, and submitted solutions may not be copied from any source. These and any other form of collaboration on assignments constitute cheating. If you have any question about whether some activity would constitute cheating, please feel free to ask.

Your final grade for the course will be based on the following weights for the individual assignments: The midterm and final exams will be closed-book.