network
              security
EECS 4482, Fall 2019

Network Security & Forensics

     Lecture Schedule:   M,  16:00 - 17:30,  BRG 313
                                           W,   16:00 - 17:30, BRG 313
     Instructor:                  Natalija Vlajic
     E-mail:                          vlajic @ cse.yorku.ca
     Office Hours:             R,  12:00 - 14:00,  LAS 2047

     TAs:                              Shadi Sadeghpour
Lassonde_logo



    news

  • Dec 31:  Assignment 3, Research Presentation, Final Exam and overall grades are now available through ePost. The final exam solutions will be posted on January 15, or can be provided in person before that date.
  • Dec 16:  Reminder - the final exam will take place on Thursday, Dec 19, 14:00 (DB 0010). The exam is closed book and closed notes. The use of any electronic devices will not be allowed. 30% of the questions will be related to the material covered before the midterm, and 70% to the material covered after the midterm.
  • Dec 12:  Assignment 2 and Lab 3 grades are now available through ePost.
  • Dec 02:  Course evaluations should be completed by Dec 4 - please log in to http://courseevaluations.yorku.ca/.
  • Dec 02:  A sample final-exam is now available. Sample final-exam solutions can be accessed here.
  • Dec 02:  Assignment 2 solutions can be accessed here.
  • Dec 01Assignment 3 is available! Due date:  Dec 19 - bring to the final exam!
  • Dec 01:  Lab 2 grades are now available through ePost.
  • Nov 27:  IMPORTANT! The 3rd lab will take place on Wednesday, Dec 4, 18:30 - 20:30 (LAS 1006).
  • Nov 27:  IMPORTANT! The makeup of all Labs is scheduled for Thursday, Dec 5, 19:00 - 21:00.
  • Nov 18:  The TA will be available to answer any questions about Lab 1 and Assignment 1 grading this evening (Nov 18), 7pm, LAS 3017.
  • Nov 18:  Assignment 2 is available! Due date:  Dec 2, in class
  • Nov 12:  Assignment 1 and Lab 1 grades are now available through ePost (use your Passort-York credentials to log in). Assignment 1 solutions can be accessed here.
  • Nov 11:  IMPORTANT! The 2nd lab will take place on Wednesday, Nov 20, 18:30 - 20:30 (LAS 1006). The makeup slot for this lab will be announced later.
  • Nov 11Makeup of Lab 1 is scheduled for this coming Friday, Nov 15, 9:00 - 11:00 (LAS 1006).
  • Nov 6:  Midterm solutions can be accessed from here.
  • Oct 28The new (and final!!!) due date for Assignment 1 is Wednesday, Oct 30, in class.
  • Oct 28 IMPORTANT! The 1st lab will take place on Wednesday, Oct 30, 18:30 - 20:30 (LAS 1006). The makeup slot for this lab will be announced later.
  • Oct 21The submission deadline for Assignment 1 is moved to next Monday, Oct 28, in class.
  • Oct 21REMINDER: Midterm exam will be held on Wednesday, Oct 23, in class. The exam is closed book and closed notes, and will cover all the material discussed in class up to and including the lecture of Oct 21.
  • Oct 09:  Assignment 1 is available! Due date:  Oct 23, in classIncluded with the handed-in materials should be a print-out of your code for Q3. The soft-copy of your Q3 code should (also) be submitted via CSE@York's submit utility (as indicated in the assignment).
  • Oct 09:  A sample midterm is now available. Sample midterm solutions can be accessed here.
  • Sep 04:  Classes start. Notice the room change! We are now in BRG 313, both on Monday and Wednesday.




Course Information:
Textbook and Recommended Reading Material
Prerequisite
Course Description
Grading Scheme
Course Schedule (Week-by-week Topics Covered, Notes, Required Reading, Assignments)

Course Policies:
Late Assignments and Missed Midterm
Academic Honesty



Course Schedule

Week
Date

Topic / Notes
Required Reading
Assignments / Important Dates
Student Presentations Dates
1
W, Sep 4
Computer Security - General Facts




M, Sep 9
4482 - Intro
Networking Primer - part 1



2
W, Sep 11
Networking Primer - part 2




M, Sep 16
Networking Primer - part 3
Networking Primer - exercise



3
W, Sep 18
Security Assessment of IPv4 - part 1 Intro to Wireshark:
From University of Georgia
From UofCalgary



M, Sep 23
Security Assessment of IPv4 - part 2


4
W, Sep 25
Security Assessment of IPv4 - part 3
Security Assessment of IPv6 - part 1


Team 1:  Bhardway, Galati, Amininiaki
Content Delivery Networks

M, Sep 30
Security Assessment of IPv6 - part 2
Python - part 1



5
W, Oct 2
Python - part 2



M, Oct 7
Python - part 3
Scapy - part 1
Scapy Documentation
Dummies Guide to Scapy
Scapy Cheat Sheet

Team 2:  Park, Cho, Malatombee
IoT Security
6
W, Oct 9
Scapy - part 2
ARP in Security - part 1

Assignment 1
Reading Week (Oct 12 - Oct 18) / Happy Thanksgiving!

M, Oct 21
ARP in Security - part 2

Team 3:  Gu, Sun, Cao
VoIP Security/Attacks
7
W, Oct 23
Midterm Exam




M, Oct 28
ICMP in Security

Team 4:  Dhamija, Safdar, Abu-Mahfouz
Wi-Fi Track. & MAC Addr. Randomization
8
W, Oct 30
VPNs
Cryptography Review - part 1
Stallings textbook, Chapter 9
Lab-test 1 !!!


M, Nov 4
Cryptography Review - part 2
IPsec - part 1
Stallings textbook, Chapter 9
Team 5:  Alvear, El Shafie, Sharma
Latest Trends in DDoS Attacks
9
W, Nov 6
IPsec - part 2 Stallings textbook, Chapter 9


M, Nov 11
IPsec - part 3 Stallings textbook, Chapter 9
Team 6:  Vavan, Dos Santos, Hoang
Botnet Communications and Protocols
10
W, Nov 13
IPsec - part 4 Stallings textbook, Chapter 9


M, Nov 18 IPsec - part 5
Security Assessment of TCP - Part 1
Stallings textbook, Chapter 9
Stallings textbook, Chapter 6
Assignment 2 Team 7:  Israr, Sterner, Tang
DHCP Security Attacks
Team 8:  Doyle, Marjia, Attalla
Bluetooth Security/Attacks
11
W, Nov 20
Security Assessment of TCP - Part 2 Stallings textbook, Chapter 6 Lab-test 2 !!!


M, Nov 25 HTTPS
TLS - Part 1
Stallings textbook, Chapter 6

Team 9:  Latif, Johal, Liu
Anonymous Networks
Team 10:  Anjum, Maywapersaud, Jalil
  BGP Security
12
W, Nov 27
TLS - Part 2 Stallings textbook, Chapter 6


M, Dec 2
Digital Certificates
course evaluations - in class
Stallings textbook, Chapter 6 Assignment 3
Lab-test 3
Team 11
Team 12:  Sison, Laya, Usman
DNS Security/Attacks
Final Exam:  Thursday, Dec 19, 14:00 (location: DB 0010)





Textbook
    "Network Security Essentials: Applications and Standards", William Stallings, Pearson, 2017, 6th Edition.

Recommended Reading Material
    "Cryptography and Network Security: Principles and Practice", W. Stallings, Pearson, 2017, 7th Edition.
    "Computer Security: A Hands-on Approach", W. Du, CreateSpace, 2017.
    "Security+ Guide to Network Security Fundamentals", M. Ciampa, Cengage Learning, 2018, 6th Edition.
    "Fundamentals of Information Systems Security", D. Kim, M. G. Solomon, Jones & Bartlett Learning, 2018, 3rd Edition.
    "Principles of Information Security", M. E. Whitman, H. J. Mattord, Cengage Learning, 2018, 6th Edition.
    "Network Security, Firewalls, and VPNs", J. M. Stewart, Jones & Bartlett Learning, 2014, 2nd Edition.
    "Guide to Firewalls and VPNs", M. E. Whitman, H. J. Mattord, A. Green, Cengage Learning, 2012, 3rd Edition.
    "Cryptography and Network Security", B. Forouzan, McGraw-Hill, 2007.
    "The Network Security Test Lab: A Step-by-Step Guide", M. Gregg, Wiley, 2015.
    "Applied Network Security", A. Salmon, W. Levesque, M. McLafferty, Packt Publishing, 2017.
    "Applied Information Security: A Hands-On Guide to Information Security Software", R. Boyle, J. G. Proudfoot, Pearson, 2014, 2nd Edition.
    "Hacker Techniques, Tools, and Incident Handling", S. P. Oriyano, M. G. Solomon, Jones & Bartlett Learning, 2020, 3rd Edition.
    "Python Penetration Testing Cookbook", R. Rehim, Packt>, 2017.
    "Violent Python: A Cookbook for Hackers, Forensics Analysts, Penetration Testers, and Security Engineers", T. J. O'Connor, Elsevier, 2013.
    "Foundations of Python Network Programming", B. Rhodes, J. Goerzen, Apress, 2010, 2nd Edition.
    "Wireless Network Security: A Beginner's Guide", T. Wrightson, McGraww-Hill, 2012.
    "Mastering Python for Networking and Security", J. M. Ortega, Packt Publishing, 2018.
    "Hands-On Network Forensics: Investigate network attacks and find evidence using common network forensics tools", N. Jaswal, Packt Publishing, 2019.
    "Network Forensics: Tracking Hackers Through Cyberspace", S. Davidoff, J. Ham, Pearson Education, 2013.

Other Resources
    "Scapy Documentation", P. Biondi and the Scapy Community, 2018.
    "The Very Unofficial Dummies Guide to Scapy", A. Maxwell.
    "Scapy Cheat Sheet", sans.org




Prerequisite

Prerequisites: Any 12 credits at the 3000-level (ideally EECS 3213 and/or EECS 3214).




Course Description

The purpose of this course is to provide a survey of weaknesses and vulnerabilities that have plagued network systems (the Internet) for years, and then continue with a comprehensive study of network security defences and countermeasures
that are most widely deployed in the Internet today, including network security protocols, standards and technologies. Specific topic include: Virtual Private Networks (VPNs), IPSec, Secure Socket Layer (SSL) / Transport Layer Security (TLS), HTTPS / Digital Certificates, Internet Packet Crafting, Network Scanning & Analysis Tools,  Firewalls, Intrusion Detection Systems (IDSs), WiFi security, Cloud Security, Network Forensics Investigation Methodology and Tools.



Grading Scheme

12%   Lab-Tests (4 Lab-Tests - 3% each)
  9%   Assignments (3 Assignments - 3% each)
  5%   Mini Research Project
34%   Midterm Exam
40%   Final Exam




Late Assignments and Missed Midterm

Late assignments will not be accepted, unless a prior arrangement is made with the instructor.
Makeups of missed midterm exams are only possible in extremely exceptional situations (such as verifiable medical emergencies) or by arrangement well prior to the exam, provided there is an extremely compelling reason.




Academic Honesty

"The Department takes the matter of academic honesty very seriously. Academic honesty is essentially giving credit where credit is due. And not misrepresenting what you have done and what work you have produced. When a piece of work is submitted by a student it is expected that all unquoted and uncited ideas and text are original to the student. Uncited and unquoted text, diagrams, etc., which are not original to the student, and which the student presents as their own work is considered academically dishonest."
For more see:  Department of Computer Science Academic Honesty Guidelines




Mini Research Project

The goal of Mini Research Project is to provide students with an opportunity to conduct independent research on one of the fundamental and current topics in network security, as well as to practice their team-work and presentation skills.
Further details concerning the project's scope, timeline, as well as the final presentation tips and requirements are provided in the following document: Mini Research Project - Tips, Requirements and Timeline.

  Mini Research Project: Important dates
- by Wednesday, September 18:   Teams of 3 students formed. Presentation topic selected. Presentation dates determined.
- a week before Team X presentation:   Team X emails a preliminary copy of their presentation to the instructor together with the breakdown of each student's contributions.