389.152 Network Security
This course is in all assigned curricula part of the STEOP.
This course is in at least 1 assigned curriculum part of the STEOP.

2013S, VO, 2.0h, 3.0EC

Properties

  • Semester hours: 2.0
  • Credits: 3.0
  • Type: VO Lecture

Aim of course

Introduction to methods for proactive and reactive security measures in communication networks

Subject of course

The course provides an introduction to methods for proactive and reactive security measures in communication networks. The focus is on security concepts for IP networks and protocols of the Internet protocol suite (IPv4, IPv6, TCP, UDP, IP routing, DNS, etc.).

We start with an introduction to network security threats and general security objectives. Then we look at basic cryptography concepts and show how they are applied to the Internet protocol suite (e.g., IPsec, DNSSEC, BGPSEC) to address different security objectives. We cover security aspect in IPv4 and IPv6 networks.

In the second part of the lecture we look at network supervision techniques and explore several methods to detect anomalies in communication networks. We use statistical data analysis and machine learning techniques to analyze network traffic.

In an outlook we discuss security challenges for communication networks in cyber-physical systems (e.g., smart power grids).

Additional information

Preliminary discussion and lecture start:
Tuesday, 12.03.2013, 11:15, Seminarraum 389, CG0118

Time and Location
Summer Semester, Tuesday, 11:15 - 13:00 Uhr, Seminarraum 389, CG0118

Attention! Due to  the high number of participants we will move to a new room from April 9, 2013: 

Seminarraum Sem E388, Favoritenstraße 9-11/E389, access via Stiege 3, 1. floor, red area. see plan at: http://www.gut.tuwien.ac.at/fileadmin/t/lm/Plaene/Code_HA_-_HI/HABCDEFGHI/01.pdf

Lecturers

Institute

Course dates

DayTimeDateLocationDescription
Tue11:00 - 13:0012.03.2013 - 25.06.2013 E389, Raum CG0118389.152 VO Network Security, Zseby
Network Security - Single appointments
DayDateTimeLocationDescription
Tue12.03.201311:00 - 13:00 E389, Raum CG0118389.152 VO Network Security, Zseby
Tue19.03.201311:00 - 13:00 E389, Raum CG0118389.152 VO Network Security, Zseby
Tue09.04.201311:00 - 13:00 E389, Raum CG0118389.152 VO Network Security, Zseby
Tue16.04.201311:00 - 13:00 E389, Raum CG0118389.152 VO Network Security, Zseby
Tue23.04.201311:00 - 13:00 E389, Raum CG0118389.152 VO Network Security, Zseby
Tue30.04.201311:00 - 13:00 E389, Raum CG0118389.152 VO Network Security, Zseby
Tue07.05.201311:00 - 13:00 E389, Raum CG0118389.152 VO Network Security, Zseby
Tue14.05.201311:00 - 13:00 E389, Raum CG0118389.152 VO Network Security, Zseby
Tue28.05.201311:00 - 13:00 E389, Raum CG0118389.152 VO Network Security, Zseby
Tue04.06.201311:00 - 13:00 E389, Raum CG0118389.152 VO Network Security, Zseby
Tue11.06.201311:00 - 13:00 E389, Raum CG0118389.152 VO Network Security, Zseby
Tue18.06.201311:00 - 13:00 E389, Raum CG0118389.152 VO Network Security, Zseby
Tue25.06.201311:00 - 13:00 E389, Raum CG0118389.152 VO Network Security, Zseby

Course registration

Begin End Deregistration end
15.03.2013 15:00 09.04.2013 23:59 09.04.2013 23:59

Registration modalities

Details in lecture.

Curricula

Study CodeObligationSemesterPrecon.Info
066 938 Computer Engineering Mandatory elective
710 FW Elective Courses - Electrical Engineering Not specified

Literature

The slides in the lectures are sufficient to pass the exam. The following links are provided for those who look for additional information. Links to further information (papers, etc.) about specific topics will be given in the lectures.

Introduction to network security

  • Mark Stamp: Information Security: Principles and Practice John Wiley & Sons, 2011
  • Cheswick, Bellovin, Rubin: Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition, Addison-Wesley Professional; 2 edition, 2003
  • Kaufman, Perlman, Speciner: Network Security: Private Communication in a Public World, Prentice Hall; 2 edition, 2002
Cryptography
 
  • Goldwasser, Bellare: Lecture Notes on Cryptography, July 2008 (available at http://cseweb.ucsd.edu/~mihir/papers/gb.pdf)

Protocols

 

 

 

 

 

Language

if required in English