McCormick               

                                                                                                                                                                                Robert R. McCormick

                                                                                                                                                                                                School of Engineering

                                                                                                                                                and Applied Science                      

            Northwestern University

 MITP   Master of Information Technology Program

 

458: Information Security and Assurance

Yan Chen

 


 

I.                    Course description:

 

The past decade has seen an explosion in the concern for the security of information. This course introduces students to the basic principles and practices of computer and information security.  Focus will be on the software, operating system and network security techniques with detailed analysis of real-world examples. Topics include cryptography, authentication, software and operating system security (e.g., buffer overflow), Internet vulnerability (DoS attacks, viruses/worms, botnets, etc.), intrusion detection systems, firewalls, VPN, Web and wireless network security. 

 

II.                 Required text and/or other materials:

o        Network Security - Private Communication in a Public World, by Charlie Kaufman, Radia Perlman and Mike Speciner, 2nd Edition, Prentice Hall, 2002

o        Cryptography and Network Security, by William Stallings, 4th Edition, Prentice Hall, 2006

 

III.               Reference text and/or other materials:

o        Writing Secure Code, Michael Howard and David LeBlanc, Microsoft Press, 2002.

o        Security in Computing, Charles Pfleeger, Shari Lawrence Pfleeger, 3rd Edition, Prentice Hall, 2002.

o        Firewalls and Internet Security: Repelling the Wily Hacker, 2nd edition, by William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin, Addison Wesley, 2003

o        Lecture Notes on Cryptography, by S. Goldwasser and M. Bellare, available online at http://www-cse.ucsd.edu/users/mihir/papers/gb.html

o        Also, lecture slides and reference documents will be available online or as handouts.

 

IV.              Required prerequisites or knowledge base:

 

421 Principles of Computer and Information Technology

 

432 Communications Networks I

 

 

V.                 Rationale for inclusion in MIT Program:

 

This course provides students with an extensive understanding of information security management with emphasis on network security.  Whereas other courses provide an overview of the basics of the discipline, information security is simultaneously a technical and managerial discipline with enterprise-wide implications for employees, operations and systems at every level.  For organizations to successfully implement and manage an effective and efficient security program while managing shifting risks associated with interrelated information technology and decision-making employees, contractors, vendors, and suppliers must understand the concepts, technologies and practices of information security and be able to apply them effectively in their own distinctive areas of responsibility.

 

VI.              Course goal:

 

1.      Understand the fundamental principles and underlying technologies of information security and assurance;

2.      Illustrate the security principles with the state-of-the-art security technologies and products through case studies.

 

VII.            Course Objectives:

 

Upon successful completion of this course, the student should be able to: 

·         Understand the basic principles for information and communication security, and be able to apply these principles to evaluate and criticize information system security properties

·         Be able to identify the vulnerability of the Internet systems and recognize the mechanisms of the attacks, and apply them to design and evaluate counter-measure tools

VIII.         Course topics/content (by week):

 

Week 3 (April 7) [crypto.ppt]:

Cryptography  symmetric/asymmetric encryption (Stallings Chapters 2, 3 and 9, KPS Chapters 2, 3 and 5)

·        Symmetric encryption case study: DES/AES algorithms

·        Asymmetric encryption case study: RSA

·        One-way hash function and message digests: MD5, SHA1, SHA2

 

Week 4 (April 14) [authentication.ppt]:

User authentication and authorization, malcode overview (KPS Chapters 9 and 10)

·        Authentication mechanisms: Password authentication, challenge-response authentication protocols, biometrics, token-based authentication (smart card),

·        Authentication in distributed systems (case study: Microsoft Passport system)

·        Overview on various malcode: virus, worms, botnets, Trojan horses, etc.

·        Internet Security Report from Symantec

·        Related paper: Password Security: A Case History, R. Morris and K. Thompson, Communications of ACM, vol.22 no.11, 1979.

 

Week 5 (April 21) [malcode.ppt]:

Internet vulnerability: worms (Stallings Chapter 19)

·        Homework 2 is out.

·        Analysis of worms: target discovery, carrier, activation mechanisms, payload and attackers.

·        Related paper: A Taxonomy of Computer Worms, N. Weaver, V. Paxson, S. Staniford, and R. Cunningham, the First ACM Workshop on Rapid Malcode (WORM), 2003.

·        Related paper (DEBATE): The Internet Motion Sensor: A Distributed Blackhole Monitoring System, M. Bailey, et al, NDSS 2005.  Defense: Chris, Offense: Ed.

 

Week 6 (April 28) [DoS.ppt] [IDS.ppt]:

Internet vulnerability: denial of service (DoS) attacks and spam (Stallings Ch.18 and 19)

·        Point-to-point DoS attacks

·        Distributed DoS attacks (case study: TCP SYN flooding attacks)

·        Intrusion Detection and Prevention Systems

·        Related paper:   Detecting SYN Flooding Attacks, H. Wang, D. Zhang, and K. G. Shin, in Proc. of IEEE INFOCOM, 2002  [Full version is at Change-Point Monitoring for Detection of DoS Attacks,  H. Wang, D. Zhang, and K. G. Shin, in IEEE Transactions on Dependable and Secure Computing, Vol. 1, No. 4, December 2004.]. 

·        Related paper (DEBATE): Understanding the Network-Level Behavior of Spammers, A. Ramachandran and N. Feamster, ACM SIGCOMM 2006.  [reference slides]  Defense: Bruce force, Offense: Loop.

 

Week 7 (May 5):

Network Access Control and Snort IDS system [invited.ppt][snort.ppt] (Stallings Chapter 18)

·        Homework 3 is out.

·        Invited talk by Kurtis Minder, CISSP, Mirage Networks Inc.

·        Case study of IDS/IPS: snort IDS

·        Related Material: http://www.snort.org/docs/

 

Week 8 (May 12):

Firewalls and Botnets [firewalls.ppt] (Stallings Chapter 20)

·        Different types of firewalls: packet filters, application gateway, and circuit gateway.

·        Handout from Chapter 9 of Firewalls and Internet Security: Repelling the Wily Hacker.

·        Related paper (DEBATE): A Multifaceted Approach to Understanding the Botnet Phenomenon, M. A. Rajab, et al, ACM IMC 2006.  Defense: Will [slides], Offense: Bruce force [slides].

 

Week 9 (May 19): 

IP Sec [ipsec.ppt] (Stallings Chapters16 and KPS Chapter 17)

·        IP Sec architecture, transport vs. tunnel mode, practical issues w/ NAT

·        Information security in real business (case study by Brute-force)

o       Hewitt.com redesign by Jorgen (slides removed upon author’s request)

o       Security data transfer by Frank

o       Intra-company data traversal by Jason

o       Web vulnerability and defense by Ron and Yan

 

Week 10 (June 9):

Software Security and Buffer Overflow [principle.ppt][bufferOverflow.ppt]bufferOverflowDefense.ppt]

·        Principles for building secure software systems

·        Case study: sendmail vs. qmail

·        Buffer overflow vulnerability and defense techniques

·        Information security in real business (case study by other teams)

o       Proactive network security by the Loop Group

o       The case for TripWire by TechnoCatz

o       Application-layer security by the TechJocks

o       Wireless network security by the Campus Crew and Yan

·        Related papers:

o       Basic Principles Of Information Protection, from “The Protection of Information in Computer Systems”, by J. H. Saltzer and M. D. Schroeder

o       Qmail handbook, Ch. 1, Introduction to Qmail  

o       Smashing The Stack For Fun And Profit, Aleph One.

o       Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade, Crispin Cowan, et al.

The lecture notes have incorporated course materials developed by Dan Boneh (Stanford), Wenke Lee (Georgia Tech), David Lie (U Toronto), Aleph One, Martin Roesch (Sourcefire Inc.), and David Dittrich (University of Washington).

 

I.                    Teaching methods: lectures, paper presentations, debate, discussions and homework.

 

II.                 Assignments:

 

In addition to two to three homework assignments, students are expected to engage in technical paper reading, making presentations and debate.   These papers are carefully selected (with little math!) which can be understood with the basic information security and networking knowledge.  There will be three debates with one group as defense and one group as offense.  The defense team will make 25-minute presentation on the main idea/techniques of the paper while the offense team will make a 15-minute presentation on the drawbacks/shortcomings of the approach.  Then we will discuss and summarize the findings.

 

III.               Grading criteria:

 

Class discussions                                              20%

Class presentations and debate             30%

Homework Assignments                                   50%

 

 

IV.              Instructor profile:

 

Yan Chen is an Assistant Professor in the Department of Electrical Engineering and Computer Science at Northwestern University.  He got his Ph.D. in Computer Science at University of California at Berkeley in 2003.   He has over ten years of experience in network security, network measurement, P2P systems and wireless and ad hoc networks from both academic and industry.  He won the Department of Energy (DOE) Early CAREER award in 2005 and the Microsoft Trustworthy Computing Awards in 2004 and 2005 with his colleagues.   His research is also sponsored by National Science Foundation (NSF), Air Force of Sponsored Research (AFOSR), and Motorola.  In addition to the industry sponsors, he has widely collaborated with industry researchers from AT&T, Yahoo, Keynote, National Laboratory for Applied Network Research (NLANR), and the Internet Storm Center of the SANS (SysAdmin, Audit, Network, Security) Institute.

 

Besides publishing in premier conferences such as ACM SIGCOMM, he has served on the technical program committee (TPC) of major networking and security conferences such as ACM MOBICOM, IEEE INFOCOM, and IEEE ICNP.   He started several security courses at Northwestern University, including the EECS 350 Introduction to Computer Security and EECS 450 Internet Security.  He was awarded as a Searle Junior Fellow by the Searle Center for Teaching Excellence of Northwestern University in 2004.