Main document
Network Security [NetSec]
Summer 2012
Contents
This course introduces various aspects of network security. Starting with a discussion of threats and possible attacks, requirements for the design of secure networks will be introduced. We study basic cryptographic algorithms and protocols and, most importantly, their use and integration into state-of-the-art network protocols and architectures. Furthermore, attacks and possible countermeasures will be discussed.
The basic introduction to cryptography and cryptographic protocols follows the recommendations of the Mustercurriculum Kryptologie of the "Fachgruppe für Angewandte Kryptologie der Gesellschaft für Informatik".
- Cryptography
Basics, symmetric cryptography, asymmetric cryptography - Cryptographic Techniques
Modification check values, random number generation - Security Protocols
Cryptographic protocols, integrating security services into communication architectures - Security of Communication Protocols
Medium access (PPP, 802.1x, WLAN), network layer (IPSec), transport/session layer (SSL, TLS) - Security in Mobile Networks
Location privacy, pseudonyms, mix networks - Attack Detection and Countermeasures
Attack detection and prevention, IP traceback
Learning Outcome
The learning objective is to unserstand the fundamental concepts of network security. Students understand these concepts and are able to apply this knowledge.
General Information / Methods
This master course will be held in English and all the course material is available in English. Oral exams can be organized in English as well as in German.
- Lecture, 2 SWS, 4 ECTS
- Proseminar, 3 SWS, 6 ECTS
Instructors
- Lecture: Falko Dressler
- Proseminar: Falko Dressler, Christoph Sommer
Schedule
- Lecture (LV 703779)
Thursday, 12:15pm - 1:45pm, HS 10 - Attention: no lecture and proseminar on June 14, 2012
- Proseminar (LV 703780)
Thursday, 2:15pm - 5:00pm, RR 22 (starting March 22, 2012)
Exams
There will be oral exams for the lecture. We will provide more information at the end of the summer term. The grading of proseminar will be based on the assignments and the discussion of the home work.
Oral examination is by appointment.
Evaluation
Many thanks for the critical and helpful evaluation!
Literature
- Günter Schäfer, Netzsicherheit: Algorithmische Grundlagen und Protokolle, Heidelberg, Germany, dpunkt.verlag, 2003. [BibTeX, Details...]
- William Stallings, Cryptography & Network Security, ed. 4, Prentice Hall, 2005. [BibTeX, Details...]
Extras
Featured Paper
- Explainability of Neural Networks for Symbol Detection in Molecular
Communication Channels
Recent research in molecular communication (MC) suggests machine learning (ML) models for symbol detection, avoiding the unfeasibility of end-to-end channel models. Ho...
News
- November 15, 2023
Keynote at IEEE LATINCOM 2023
Falko Dressler gave a keynote titled 6G Virtualized Edge ... - November 03, 2023
Talk at KAIST Seminar on Mobile & Wireless in EE
Falko Dressler gave a seminar talk titled Virtualized Edg... - October 12, 2023
Paper presentation at IEEE VTC 2023-Fall
Atefeh Rezaei presented our paper titled Resource Allocat... - October 03, 2023
Paper presentation at European Wireless 2023
Agon Memedi presented our paper titled One-Class Support ... - October 02, 2023
Poster presentation at ACM MobiCom 2023
Jonas Kuß presented our paper titled A Measurement Syste...