Welcome to 18-731: Network Security
Perrig, office hours Friday 4-5pm in CIC 2110.
TAs: Charles Fry (office hours Tuesday 4:30-5:30pm in CIC 2214),
Ahren Studer (office
hours Wednesday 1:30-3pm in CIC 2214), and Akash Zaveri (office hours
2-4pm in INI 225).
We will meet Monday and Wednesday in Hamerschlag Hall B103
today's most damaging attacks on computer systems involve exploitation
of network infrastructure, either as the target of attack or as a
vehicle to advance attacks on end systems. This course provides an
in-depth study of network attack techniques and methods to defend
against them. Topics include firewalls and virtual private networks;
network intrusion detection; denial of service (DoS) and distributed
denial-of-service (DDoS) attacks; DoS and DDoS detection and reaction;
worm and virus propagation; tracing the source of attacks; traffic
analysis; techniques for hiding the source or destination of network
traffic; secure routing protocols; protocol scrubbing; and advanced
techniques for reacting to network attacks.
The course will involve a substantial research project and some smaller
programming projects in C, students are expected to have a solid
C and Unix programming.
Students are also expected to have passed the introductory security
18-630 or 18-730 and understand concepts of applied cryptography. To
refresh this material, you can read the following chapters in Bruce
Cryptography: 2, 3, 4, 5, 7, 8, 9, 11, 12, 18, 19.3, 22. Students
that took 18-630 need to review Chapter 9, as we did not cover that
Suggested (optional) Textbook:
and Network Security: Principles and Practice (4th edition) by
The deadline for any assignment can be extended with a 10% penalty per
day. No deadline can be extended by more than two days. so assignments
will NOT be accepted 48 hours after the due date.
Students are encouraged to talk to each other, to the TAs, to the
instructor, or to anyone else about any of the assignments. Any
assistance, though, must be limited to discussion of the problem and
sketching general approaches to a solution. Each student must write out
his or her own
solutions to the homeworks. Consulting another student's or group's
is prohibited, and submitted solutions may not be copied from any
These and any other form of collaboration on assignments constitute
If you have any question about whether some activity would constitute
please feel free to ask.
Your final grade for the course will be based on the following weights
for the individual assignments:
The midterm and final exams will be closed-book.
- 20% Homeworks
- 20% Small projects
- 25% Research project
- 25% Midterm
- 10% Participation