Instructor: Damon McCoy (mccoy(at)cs.gmu.edu) Time: Tuesday 4:30 pm - 7:10 pm Room: Art and Design Building L008 Office Hours: Tuesday 2:00 pm - 4:00 pm also by appointment Office: 5328 Engineering Building
Teaching Assistant: Changwei Liu (Coco) cliu6 at gmu.edu Office Hours: Thursday 4 - 6pm Office: 4456 Engineering Building
Course Website: http://www.cs.gmu.edu/~mccoy/ISA656_F13.html Course Forum: piazza We will be using piazza for discussions on current security topics, and if you have a question this is the best place to ask it. We will check the page regularly and other students will be able to help as well.
This course will present current attacks and and defenses against networked computers. As a growing number of everyday things not typically thought as computer gain computational ability and in turn are connected to networks traditional security methods, such as locks and physical security mechanisms are no longer sufficient to protect them. This course will delve into the concepts and tools defenders have at their disposal and which threats they can mitigate.
ISA 562 and CS 555; or permission of instructor. There will be substantial programming involved in the assignments, and students should be familiar with programming in C, Java or another language.
|week and date||Book||Topic and Required Reading|
|week 1, Aug 27nd||Course Overview and Introduction to Network Security [slides and HW 1 on blackboard]|
|week 2, Sep 3rd||Chapter 23||Firewalls
Chapman, "Network (In)Security Through IP Packet Filtering"
|week 3, Sep 10th||Intrusion Detection Systems
Lab in ENGR 1505: IDS/Network Sniffers Download VM for lab1
HW 1 Due before class
|week 4, Sep 17th||Chapters 4,5,6||Cryptography ReviewAnderson, Why Cryptosystems FailLab 1 Due before class|
|week 5, Sep 24th||Chapters 9.1-2, 10, 11.1-2, 12.2,13,14||Authentication Methods
Project 1 Milestone #1 Due before class
|week 6, Oct 1st||Chapters 15,19||SSL, TLS, SSH
Homework 2 Due before class
|week 7, Oct 8th||Chapters 17,18||Virtual Private Networks (IPsec/IKE)
Project 1 Due on Oct. 11th at 11:59pm
|week 8, Oct 15th||No Class|
|week 9, Oct 22th||DDoS Attacks and MitigationLab:Firewalls/Network Scanners|
|week 10, Oct 29th||Chapters 20,25||Email SecurityMidterm Review|
|week 11, Nov 5th||Midterm|
|week 12, Nov 12th||Malware
The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond, DHS, SRI, APWG Report, October 2006
THE PARTNERKA . WHAT IS IT, AND WHY SHOULD YOU CARE?, Dmitry Samosseiko, SophosLabs tech report 2009
The Underground Economy of Spam: A Botmaster.s Perspective of Coordinating Large-Scale Spam Campaigns, Brett Stone-Gross, Thorsten Holzz, Gianluca Stringhinix, and Giovanni Vigna, LEET 2011
Measuring Pay-per-Install: The Commoditization of Malware Distribution, Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson, Usenix Security 2011
|week 13, Nov 19th||Wireless SecurityStuxnet|
|week 14, Nov 26th||Web Security|
|week 15, Dec 3rd||Privacy/AnonymityLab:SQL Injection Attacks|
|Final Dec 10th 4:30-7:15||Final Project Presentations|