![]() |
EECS 4482, Fall 2019 Network Security & Forensics
Lecture Schedule: M, 16:00
- 17:30, BRG 313
W, 16:00 - 17:30, BRG 313 Instructor: Natalija Vlajic E-mail: vlajic @ cse.yorku.ca Office Hours: R, 12:00 - 14:00, LAS 2047 TAs: Shadi Sadeghpour |
![]() |
![]()
|
Week |
Date |
Topic / Notes |
Required Reading |
Assignments / Important Dates |
Student Presentations Dates |
|
1 |
W, Sep 4 |
Computer
Security - General Facts |
||||
M, Sep 9 |
4482
- Intro Networking Primer - part 1 |
|||||
2 |
W, Sep 11 |
Networking
Primer - part 2 |
||||
M, Sep 16 |
Networking
Primer - part 3 Networking Primer - exercise |
|||||
3 |
W, Sep 18 |
Security Assessment of IPv4 - part 1 | Intro to Wireshark: From University of Georgia From UofCalgary |
|||
M, Sep 23 |
Security Assessment of IPv4 - part 2 | |
|
|
||
4 |
W, Sep 25 |
Security
Assessment of IPv4 - part 3 Security Assessment of IPv6 - part 1 |
Team 1:
Bhardway, Galati, Amininiaki Content Delivery Networks |
|||
M, Sep 30 |
Security
Assessment of IPv6 - part 2 Python - part 1 |
|||||
5 |
W, Oct 2 |
Python - part 2 | |
|||
M, Oct 7 |
Python
- part 3 Scapy - part 1 |
Scapy
Documentation Dummies Guide to Scapy Scapy Cheat Sheet |
|
Team 2: Park, Cho, Malatombee IoT Security |
||
6 |
W, Oct 9 |
Scapy
- part 2 ARP in Security - part 1 |
Assignment 1 | |||
Reading Week (Oct 12 - Oct 18) / Happy
Thanksgiving! |
||||||
M, Oct 21 |
ARP in Security - part 2 | |
Team 3: Gu, Sun, Cao VoIP Security/Attacks |
|||
7 |
W, Oct 23 |
Midterm Exam |
|
|||
M, Oct 28 |
ICMP in Security | Team 4: Dhamija, Safdar, Abu-Mahfouz Wi-Fi Track. & MAC Addr. Randomization |
||||
8 |
W, Oct 30 |
VPNs
Cryptography Review - part 1 |
Stallings textbook, Chapter 9 | Lab-test 1 !!! |
||
M, Nov 4 |
Cryptography
Review - part 2 IPsec - part 1 |
Stallings textbook, Chapter 9 | Team 5: Alvear, El Shafie, Sharma Latest Trends in DDoS Attacks |
|||
9 |
W, Nov 6 |
IPsec - part 2 | Stallings textbook, Chapter 9 | |||
M, Nov 11 |
IPsec - part 3 | Stallings textbook, Chapter 9 | Team 6: Vavan, Dos Santos, Hoang Botnet Communications and Protocols |
|||
10 |
W, Nov 13 |
IPsec - part 4 | Stallings textbook, Chapter 9 | |||
M, Nov 18 | IPsec
- part 5 Security Assessment of TCP - Part 1 |
Stallings
textbook, Chapter 9 Stallings textbook, Chapter 6 |
Assignment 2 | Team 7: Israr, Sterner, Tang DHCP Security Attacks Team 8: Doyle, Marjia, Attalla Bluetooth Security/Attacks |
||
11 |
W, Nov 20 |
Security Assessment of TCP - Part 2 | Stallings textbook, Chapter 6 | Lab-test 2 !!! |
||
M, Nov 25 | HTTPS TLS - Part 1 |
Stallings textbook, Chapter 6 | Team 9: Latif, Johal, Liu Anonymous Networks Team 10: Anjum, Maywapersaud, Jalil BGP Security |
|||
12 |
W, Nov 27 |
TLS - Part 2 | Stallings textbook, Chapter 6 | |||
M, Dec 2 |
Digital
Certificates course evaluations - in class |
Stallings textbook, Chapter 6 | Assignment
3 Lab-test 3 |
Team 11 Team 12: Sison, Laya, Usman DNS Security/Attacks |
||
Final Exam:
Thursday, Dec 19, 14:00 (location: DB 0010) |
Textbook "Network Security Essentials: Applications and Standards", William Stallings, Pearson, 2017, 6th Edition. Recommended Reading Material "Cryptography and Network Security: Principles and Practice", W. Stallings, Pearson, 2017, 7th Edition. "Computer Security: A Hands-on Approach", W. Du, CreateSpace, 2017. "Security+ Guide to Network Security Fundamentals", M. Ciampa, Cengage Learning, 2018, 6th Edition. "Fundamentals of Information Systems Security", D. Kim, M. G. Solomon, Jones & Bartlett Learning, 2018, 3rd Edition. "Principles of Information Security", M. E. Whitman, H. J. Mattord, Cengage Learning, 2018, 6th Edition. "Network Security, Firewalls, and VPNs", J. M. Stewart, Jones & Bartlett Learning, 2014, 2nd Edition. "Guide to Firewalls and VPNs", M. E. Whitman, H. J. Mattord, A. Green, Cengage Learning, 2012, 3rd Edition. "Cryptography and Network Security", B. Forouzan, McGraw-Hill, 2007. "The Network Security Test Lab: A Step-by-Step Guide", M. Gregg, Wiley, 2015. "Applied Network Security", A. Salmon, W. Levesque, M. McLafferty, Packt Publishing, 2017. "Applied Information Security: A Hands-On Guide to Information Security Software", R. Boyle, J. G. Proudfoot, Pearson, 2014, 2nd Edition. "Hacker Techniques, Tools, and Incident Handling", S. P. Oriyano, M. G. Solomon, Jones & Bartlett Learning, 2020, 3rd Edition. "Python Penetration Testing Cookbook", R. Rehim, Packt>, 2017. "Violent Python: A Cookbook for Hackers, Forensics Analysts, Penetration Testers, and Security Engineers", T. J. O'Connor, Elsevier, 2013. "Foundations of Python Network Programming", B. Rhodes, J. Goerzen, Apress, 2010, 2nd Edition. "Wireless Network Security: A Beginner's Guide", T. Wrightson, McGraww-Hill, 2012. "Mastering Python for Networking and Security", J. M. Ortega, Packt Publishing, 2018. "Hands-On Network Forensics: Investigate network attacks and find evidence using common network forensics tools", N. Jaswal, Packt Publishing, 2019. "Network Forensics: Tracking Hackers Through Cyberspace", S. Davidoff, J. Ham, Pearson Education, 2013. Other Resources "Scapy Documentation", P. Biondi and the Scapy Community, 2018. "The Very Unofficial Dummies Guide to Scapy", A. Maxwell. "Scapy Cheat Sheet", sans.org Prerequisite Prerequisites: Any 12 credits at the 3000-level (ideally EECS 3213 and/or EECS 3214). Course Description The purpose of this course is to provide a survey of weaknesses and vulnerabilities that have plagued network systems (the Internet) for years, and then continue with a comprehensive study of network security defences and countermeasures that are most widely deployed in the Internet today, including network security protocols, standards and technologies. Specific topic include: Virtual Private Networks (VPNs), IPSec, Secure Socket Layer (SSL) / Transport Layer Security (TLS), HTTPS / Digital Certificates, Internet Packet Crafting, Network Scanning & Analysis Tools, Firewalls, Intrusion Detection Systems (IDSs), WiFi security, Cloud Security, Network Forensics Investigation Methodology and Tools. Grading Scheme 12% Lab-Tests (4 Lab-Tests - 3% each) 9% Assignments (3 Assignments - 3% each) 5% Mini Research Project 34% Midterm Exam 40% Final Exam Late Assignments and Missed Midterm Late assignments will not be accepted, unless a prior arrangement is made with the instructor. Makeups of missed midterm exams are only possible in extremely exceptional situations (such as verifiable medical emergencies) or by arrangement well prior to the exam, provided there is an extremely compelling reason. Academic Honesty "The Department takes the matter of academic honesty very seriously. Academic honesty is essentially giving credit where credit is due. And not misrepresenting what you have done and what work you have produced. When a piece of work is submitted by a student it is expected that all unquoted and uncited ideas and text are original to the student. Uncited and unquoted text, diagrams, etc., which are not original to the student, and which the student presents as their own work is considered academically dishonest." For more see: Department of Computer Science Academic Honesty Guidelines Mini Research Project The goal of Mini Research Project is to provide students with an opportunity to conduct independent research on one of the fundamental and current topics in network security, as well as to practice their team-work and presentation skills. Further details concerning the project's scope, timeline, as well as the final presentation tips and requirements are provided in the following document: Mini Research Project - Tips, Requirements and Timeline. Mini Research Project: Important dates - by Wednesday, September 18: Teams of 3 students formed. Presentation topic selected. Presentation dates determined. - a week before Team X presentation: Team X emails a preliminary copy of their presentation to the instructor together with the breakdown of each student's contributions. |