AIT 682: Network and Systems Security (Fall 2017)


Course Description

This is a graduate level course on systems and network security. This course introduces the principles and practices of cryptography, network security, and secure software. It will cover security policies, models, and mechanisms for secrecy, integrity, and availability; basic cryptography and its applications; secret key cryptography; hash functions; basic number theory and public key cryptography; trusted intermediaries, and network security (firewalls, IDS, IPsec, and SSL) etc. It will also cover advanced security topics such as trustworthy computing and moving target defense.


Course Information

Class Time: WF 9:00am - 10:10am
Class Location: Robinson Hall A206

Instructor: Dr. Kun Sun
Email: ksun3@gmu.edu
Office Hours: WF 11:00am - noon, Research Hall, Suite 417

TA: Omoche (Cheche) Oagada
Email:
oagada@masonlive.gmu.edu
Office Hours:
Wednesday, 1pm - 4pm, Engineering Building, room 5503.


Grading Policy

Term project

 

Each student is required to complete a mid-size project, which includes proposal, implementation, and final demo or paper. Each student must finish the project by himself/herself.

Requirements for project proposal.
Requirements for project final report.

Projects include but are not limited to:

  • Research Paper
    • You can work on original research problems. The outcome should be a paper with original technical contribution. Your grade on this will be judged on originality, soundness of the approach, and quality of presentation.
    • Example Topics:
      • Vulnerability Analysis
      • Wireless Security
      • Intrusion Detection
      • Authentication
      • Access Control
      • Authorization
      • DNS Security
      • Trusted Execution Environment
      • New Attacks
      • etc.
  • Survey Paper
    • You can write a paper that surveys a particular field on information security. The outcome should be a paper that summarizes the trend in the field you have chosen. Your grade will be judged on the completeness of the survey, the quality of the trend analysis, and the quality of presentation.
    • Example topics:
      • Vulnerability Analysis
      • Wireless Security
      • Intrusion Detection
      • Authentication
      • Access Control
      • Authorization
      • DNS Security
      • Trusted Execution Environment
      • Cloud Security
      • etc.

Textbook

Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World (2nd Edition),
Prentice Hall, ISBN-13: 007-6092018469, ISBN-10: 0130460192

Class Schedule (tentative)

Note: the schedule will change as the course progresses. Please check frequently.

Date
Topic
Reading Assignment
Homework Assignment
Handouts
08/30/2017
Topic 1. Introduction and Basic Security Concepts

Chapter 1

  1spp, 3spp, 6spp
09/01/2017
Topic 2. Basic Cryptography
Chapter 2
  1spp, 3spp, 6spp
09/06/2017
Topic 3.1 Secret Key Cryptography -- Algorithms
Chapter 3.1 - 3.3, 3.5
  1spp, 3spp, 6spp
09/08/2017

Topic 3.1 (Cont'd)
Topic 3.2 Secret Key Cryptography -- Modes of Operations

Chapter 4.1 - 4.2
  1spp, 3spp, 6spp
09/13/2017
Topic 3.3-4 Secret Key Cryptography -- Triple DES, MAC
Chapter 4.3- 4.4
HW1 (due by 10/04/2017)  
09/15/2017
Topic 4. Message Digest
Chapter 5.1 - 5.2, 5.5
  1spp, 3spp, 6spp
09/20/2017
Topic 4 (Cont'd)
Chapter 5.6 - 5.7
 
09/22/2017
Topic 5.1 Basic Number Theory -- Foundation of Public Key Cryptography
Chapter 6.1 - 6.2, 7.1 - 7.4
HW2 (due by 10/20/2017) 1spp, 3spp, 6spp
09/27/2017
Topic 5.1 (Cont'd)
Chapter 7.6 - 7.8
   
09/29/2017
Topic 5.2 Public Key Cryptography
Chapter 6.3 - 6.4
  1spp, 3spp, 6spp
10/04/2017

Topic 5.2 (Cont'd)
Mide-term Preview

Chapter 6.5 - 6.6
HW3 (due by 10/24/2017) 1spp

10/06/2017

Mide-term Exam
   
10/11/2017
Topic 6.1 User Authentication
Chapters 9, 10 & 12
  1spp, 3spp, 6spp
10/13/2017
Topic 6.1 (Cont'd)
Mid-term Review
   
10/18/2017
Topic 6.2 Design and Analysis of Authentication Protocols
Chapter 11.1-11.3
Project proposal due 1spp, 3spp, 6spp
10/20/2017
Topic 6.2 (Cont'd)
Chapters 11.4-11.8
   
10/25/2017
Topic 7.1 Kerberos
Chapters13 & 14
HW4 (due by 11/15/2017) 1spp, 3spp, 6spp
10/27/2017
Topic 7.2 PKI
Chapter 15
  1spp, 3spp, 6spp
11/01/2017
No class (Instructor is out of town).      
11/03/2017
No class (Instructor is out of town).      
11/08/2017
Topic 8.1 IPsec: AH and ESP
Chapters 16 and 17
  1spp, 3spp, 6spp
11/10/2017
Topic 8.2 IPsec: IKE
Chapter 18
  1spp, 3spp, 6spp
11/15/2017
Topic 8.2 (Cont'd)
HW5 (due by 11/29/2017)  
11/17/2017
Topic 8.3 SSL/TLS
Chapter 19
  1spp, 3spp, 6spp
11/22/2017
No class. (Thanksgiving)      
11/24/2017
No class. (Thanksgiving)      
11/29/2017
Topic 8.4. Firewalls and IDS
Chapter 23
  1spp, 3spp, 6spp
12/01/2017
Topic 9. Moving Target Defense     1spp, 3spp, 6spp
12/06/2017
Topic 10. Trustworthy Computing    

1spp, 3spp, 6spp

12/08/2017

Final Preview

 

Project final report due 12/15/2017

1spp
12/13/2017
Final Exam
Time: 7:30am - 10:15am
Location: Robinson Hall A206
     

Honor Code

Students are required to be familiar and comply with the requirements of the GMU Honor Code (http://oai.gmu.edu/mason-honor-code/). The Honor Code will be strictly enforced in this course.

Students with Disabilities

Any student with a disability needing academic adjustments or accommodations should contact the instructor immediately.

Acknowledgement

This course includes materials provided by Dr. Peng Ning (North Carolina State University).