Network Security 2016-2017
EDA491 / DIT071
News
2017-06-22
Ph.D. position in vehicular security at KTH in Stockholm now open for applications.
2017-06-20 Inspection of exams can be done Wednesday June 28 at 11:30-12:00 in room EDIT 5128.
If you cannot make it this time, the exam is stored in the departments "expedition" where you can
review it during their opening hours. If there are any questions, please just send me an email.
Have a nice summer :-)
2017-05-23 The last page on the exam will
look like this and contain information which may be useful
2017-05-18 Final catch-up session in the lab: Tuesday, May 23, 17:15 - 21:00
2017-05-16 Lectures will continue as scheduled. There is some slack in the remaining lectures and it should be
possible to catch up with the missing material without scheduling another lecture.
2017-05-11 Due to a cold and lost voice, today's lecture has to be cancelled. Sorry for that!
2017-03-23 Slide #6 (Rainbow tables) was missing in lecture 2 - if you downloaded slides before lecture, please update.
2017-02-07 Change: no lecture Friday week 1 (spare lecture used instead)
Teachers
Tomas Olovsson - tomas.olovsson@... (teacher, course responsible)
Aljoscha Lautenbach - aljoscha@... (teaching assistant,
main contact for lab-related issues)
Boel Nelson - boeln@... (teaching assistant)
Thomas Rosenstatter - thomas.rosenstatter@ ... (teaching assistant)
Charalampos Stylianopoulos - chasty@... (teaching assistant)
Carlo Brunetta brunetta@... (teaching assistant
Nasser Nowdehi (teaching assistant)
Course information
This course is part of a
security specialization offered by the department which consists of four courses:
Computer security, Network security, Language-based security and Cryptography.
We begin the course by looking at weaknesses that have plagued networked systems for years. We then continue with countermeasures like firewalls and security protocols such as SSL/TLS, SSH and IPsec and investigate in detail what makes them secure. The course also gives a survey of cryptographic tools and explains how they can be utilized in protocols and applications, for example how to provide secure user authentication over a public network.
Knowledge about possible threats and countermeasures is important not only for the network security specialist but also for application programmers and everyone else who wants to understand what level of security a system and an application can offer. By knowing the problems, future systems can be designed to be much more secure and reliable than today.
This course covers the underlying principles and techniques for network and communication security. Practical examples of security problems and principles for countermeasures are given. The course also surveys cryptographic and other tools used to provide security and reviews how these tools are utilized in protocols and applications.
Prerequisites for this course are
good knowledge of communication principles and protocols (TCP, IP, ICMP, ARP, etc.). You must have taken at least one communications course before this course. We also recommend that you have taken the course Computer Security which shows how to think regarding security and discusses security issues in a wider perspective. Other relevant courses are Computer Networks and Cryptography which will make some topics easier to understand.
The course consists of a series of
lectures and
laborative exercises. The laborative exercises focus on network scanning, building firewalls, configuration of an intrusion detection system (IDS) and practical work with analyzing the SSL/TLS protocol. The course ends with a written exam. To pass the course, the exam must be passed and all laborative exercises must be completed.
Reading material
The course consists of the following material:
- Text book including web chapters (see lecture plan for details)
- Mandatory reading material listed below
- Material presented at lectures such as slides
- Reading related to the lab work
Text book

William Stallings: Cryptography and Network Security,
seventh edition ISBN 978-1-292-15858-7
or sixth edition ISBN 978-0-273-79335-9. The main difference is that in the latest edition chapter 17.3 about TLS does not exist but has been integrated with the rest of the text in chapter 17.
This book is shared with the Cryptography course. The book is to a large extent followed during the lectures, but some topics are missing or not deep enough so additional material is used in some lectures, see reading list below.
The book has a
companion web page with student resources and useful links if you want to know more about a subject. There is an
errata sheet for the book that you may want to check, and the book also has
online chapters that are used in the course. You need the code printed in your book to access them.
It is also possible to use the book
Network Security Essentials, also by William Stallings. It contains the same chapters but the cryptography part is omitted. Although it is almost half the size, the price is almost the same as for the full book.
Mandatory reading
The course book lacks information about certain topics. The following papers are therefore an integral part of the course and will be part of the exam. Some links go to research papers published by IEEE and ACM and can only be downloaded from the Chalmers network. These papers describe interesting and important security aspects and will also introduce you to research papers in the area, and reading such papers will be important for you in your future career. Please not that the list will be updated during the course. Information about future, upcoming, lectures is preliminary and may change.
- Lecture 1: The Secret Life of SIM cards. A video of how smart cards and SIM cards work and how to program them.
- Lecture 2: Authentication: Joshua Hill, Bugtraq mailing list, 12 November 2001: An Analysis of the RADIUS Authentication Protocol (ignore 4.2 about protocol improvements). Read it to see how a protocol is analyzed - the methodology is what we can learn from! Radius is also an important protocol and is widely used.
- Lecture 4: Security assessment of the IP protocol, RFC 6274, which is created from a paper published by Centre of Protection of National Infrastructure CPNI in the U.K (a slightly older original with nicer formatting is available here). It is the general understanding that is important and what types of vulnerabilities there are, not the exact details about number of bytes, etc.You can skip chapter 3.13 (options), 3.14 (DiffServ) and 3.15 (ECN) - the last two are only available in the CPNI PDF document.
- Lecture 5: Security assessment of the TCP Protocol from CPNI and now an Internet draft (work in progress). The original with nicer formatting can be downloaded from here (read only chapter 5 to 8, 12 and 14).
- Lecture 8: NAT router security solutions, tips and tricks. A nice page explaining what security we can expect to get from using a NAT router/gateway as a firewall.
- Lecture 10: WLAN: Bittau, Handley, Lackey: The final nail in WEP's coffin (good overview of WEP insecurity and how to analyze a protocol). Copyrighted, only accessible from Chalmers network.
- Lecture 14: Kiravuo, et.al: A Survey of Ethernet LAN Security, IEEE Communication Surveys & Tutorials, Vol 15, No. 3, 2013.
- And finally, an interesting report from Symantec summarizing many of the security problems we have seen in this course: A security analysis of Windows Vista's network implementation. Read page 1-11, 16-22, 24-25 and page 28. This paper is a good test that you have understood many of the topics discussed in the course.
Voluntary reading - if you want to know more about a topic
The reading list below provides more information about some topics for the interested. You don't need to study it for the exam. Some papers may explain things presented at lectures in a different way, something that may be useful for your understanding. And some other topics are just additional reading for the interested. Square bullets are used for published research articles in the field:
Authentication:
Cryptography:
- Assured, a Gothenburg based company have a very good security blog worth reading - although most info is in Swedish. They frequently summarize findings in ciphers and related issues.
- From Stanford magazine Nov 7, 2014: About the politics surrounding cryptography research. Describes the problems Standford researchers Diffie and Hellman had when releasing their original work.
- Nigel Smart at University of Bristol has published a free book about cryptography and the latest edition can be downloaded freely. It covers all from historical to current ciphers (PostScript format)
Tools:
Weaknesses:
Firewalls:
SSL/TLS, SSH:
Link-level security, DNSsec, etc.:
Remote access:
Security, general:
News announcements and security magazines. These resources can be useful for you in the future:
Claudia Castillo MPALG clacas@student...
Oscar Aspestrand MPCOM asoscar@student...
Artur Niederfahrenhorst Erasmus arturn@student...
Joel Andersson MPCSN joeland@student...
Examination
The examination will be in English and, as always, you have to register for the exam. The grades are 3, 4, and 5 (for GU G, VG) and based on the exam. In addition, all laboratory work including the written report must also be passed. No material is allowed at the exam except for an English dictionary in paper form (no electronic aids).
Examination dates are:
- May 29, 2017 08:30-12:30
- Aug 25, 2017 14:00-18:00
- Oct 06, 2017 14:00-18:00 M building