Lectures
(Note this is a rough schedule. Please check for updates.)
-
-
-
-
Introduction and Course Overview
|
Lec1_Overview.pptx
This lecture will give a high-level overview of the course, including topics covered, learning goals, and course mechanics. Reading: -
Networking and Security Review
|
Lec2_Net_Sec_Refresher.pptx
This lecture will be a quick refresher of basic networking and security concepts for the class -
No class
TBD -
TCP/IP attacks
|
Lec3_TCPIP.pptx
This lecture will cover classic attacks on the TCP/IP protocol suite Reading: -
Routing Security
|
Lec4_BGP.pptx
This lecture will cover different types of routing attacks and defenses Reading: -
Cryptographic primitives
|
Lec5_IPSEC_SSL.pptx
This lecture will cover topics like IPSEC/SSL as well as some proposed extensions to these Reading: -
SDN and security
|
Lec6_SDN.pptx
This lecture will give a high-level overview of SDNs and potential security challenges and opportunities with SDN Reading: -
NIDS and NIPS
|
Lec8_NIDS.pptx
This lecture will cover basics of network-based intrusion detection and prevention systems, their designs, and potential security weaknesses Reading: -
Project Discussion
|
Lec7_ProjectOverview.pptx
We will go through candidate project ideas and mechanisms of the class project Reading: -
Testing and verification
|
Lec9_Verification.pptx
This lecture will cover some emerging topics in the area of network verification and testing Reading: -
Denial of service attacks
|
Lec10_DDoS.pptx
This lecture will cover DoS/DDoS attacks and defenses Reading: -
Worms
|
Lec12_Worms.pptx
This lecture will cover the basics of "Worm" attacks, defenses, and damages they can cause Reading: -
Attack and threat models
|
Lec12_AttackGraph.pptx
This lecture will introduce the concept of attack graphs and attack surface modeling Reading: -
In class midterm
Midterm exam -
No class
-
No class
-
DNS security
|
Lec13_DNS.pptx
This lecture will cover problems with DNS and some proposals to fix these issues in DNS Reading: -
Network layer anonymity
|
Lec14_Anonymity.pptx
This lecture will cover anonymous communications with a specific focus on ToR Reading: -
Censorship
|
Lec15_Censorship.pptx
This lecture will cover basics of censorship techniques, as well as techniques to measure and evade censoring tools Reading: -
Side channels
|
Lec17_SideChannels.pptx
This lecture will cover side channels and traffic analysis techniques in network security. Reading: -
Project pitch and milestone
We will use this lecture to have each group present a project milestone to the class -
Network forensics
|
Lec18_Forensics.pptx
This lecture will cover different aspects of network forensics in enterprises and wide-area settings. Reading: -
Economic aspects
|
Lec21_Cybercrime.pptx
This lecture will cover some of the economic aspects of network security threats and how these play a role Reading: -
Next Generation Networks
|
Lec22_NextGen.pptx
This lecture will cover some emerging proposals for security in future Internet architectures Reading: -
Special topics: ML For Network Security
|
Special_AIML_Netsec.pptx
Recommended readings posted on Canvas. No reviews needed -
Special topics/Guest Lectures
|
Special_WirelessCellular.pptx
Recommended readings posted on Canvas. No reviews needed -
Special topics/Guest Lectures
|
Invited talks from Cylab students -
Special topics/Guest Lectures
Invited talks from industry speakers -
Project pre-final presentation
We will use this lecture to have each group present a project milestone to the class -
In class final
Final Exam!