Difference between revisions of "Syllabus"

From CSE538 Online Wiki
Jump to navigation Jump to search
Line 58: Line 58:
 
| 11/18 || Security protocols || || Sections 8.4-8.8 || ||
 
| 11/18 || Security protocols || || Sections 8.4-8.8 || ||
 
|-
 
|-
| 11/20 || Attacks and defense systems || || || ||
+
| 11/20 || Attacks and defense systems || ||
 
* Section 8.9
 
* Section 8.9
 
* Overview: [http://pages.arbornetworks.com/rs/arbor/images/WISR2014.pdf Arbor Networks worldwide infrastructure security report (2014)]
 
* Overview: [http://pages.arbornetworks.com/rs/arbor/images/WISR2014.pdf Arbor Networks worldwide infrastructure security report (2014)]
Line 67: Line 67:
 
* Routing
 
* Routing
 
** Attacks: [http://tools.ietf.org/html/draft-ietf-rpsec-bgpattack-00 An Attack Tree for the Border Gateway Protocol], RFC 4272, [http://www.renesys.com/wp-content/uploads/2013/05/blackhat-09.pdf Defending against BGP man-in-the-middle attacks]
 
** Attacks: [http://tools.ietf.org/html/draft-ietf-rpsec-bgpattack-00 An Attack Tree for the Border Gateway Protocol], RFC 4272, [http://www.renesys.com/wp-content/uploads/2013/05/blackhat-09.pdf Defending against BGP man-in-the-middle attacks]
** Defenses: RFC 5082, [http://www.renesys.com/wp-content/uploads/2013/05/blackhat-09.pdf Defending against BGP man-in-the-middle attacks], [https://datatracker.ietf.org/doc/draft-ietf-sidr-bgpsec-overview/ An overview of BGPSEC]
+
** Defenses: RFC 5082, [http://www.renesys.com/wp-content/uploads/2013/05/blackhat-09.pdf Defending against BGP man-in-the-middle attacks], [https://datatracker.ietf.org/doc/draft-ietf-sidr-bgpsec-overview/ An overview of BGPSEC] || ||
 
|-
 
|-
 
| 11/25 || Attacks and defense systems (contd.) || || || ||
 
| 11/25 || Attacks and defense systems (contd.) || || || ||

Revision as of 13:58, 15 August 2014

Syllabus

Date Scope Notes & slides Reading Assignments Review Questions Labs/Quizzes
8/26 A brief overview of the Internet, its components, and performance aspects Chapter 1, RFC 1958, RFC 3439 NA NA
8/28 Network applications & the web Chapter 1, Sections 2.1, 2.2, RFC 2616
9/2 The Domain Name System (DNS) Section 2.5, RFC 1034, RFC 1035
9/4 Transport layer overview and socket programming (UDP) Sections 3.1-3.3, 2.7.1, Java sockets tutorial
9/9 File transfer application (FTP) and email application (SMTP) Sections 2.3 & 2.4, RFC 959, RFC 2821
9/11 Other useful Internet protocols & mechanisms: ICMP, DHCP, NATs Section 4.4 (pp. 345-355), RFC 792, RFC 2131, RFC 2663, RFC 2131
9/16 P2P applications Section 2.6
9/18 Principles of reliable data transport Section 3.4
9/23 A closer look at TCP Sections 3.5, 2.7.2
9/25 TCP flow and congestion control Sections 3.6, 3.7, RFC 5681, RFC 6582
9/30 IPv4 protocol and Internet routers (IP addresses & subnets, router architecture) Sections 4.1-4.3, 4.4 (up to p. 345), RFC 1812
10/2 Routing (shortest path) algorithms Section 4.5
10/7 Intra-domain rouging protocols (OSPF, IS-IS, EIGRP) Sections 4.6.1-2, RFC 2328, RFC 1195, EIGRP paper
10/9 Inter-domain routing (BGP) Section 4.6.3, RFC 4271, Avi Freedman BGP tutorials (BGP1 and BGP2)
10/14 Review session
10/16 IN CLASS MIDTERM
10/21 Multicast routing Section 4.7, RFC 2236 (Sections 1-3), RFC 3376 (Sections 1-6), RFC 4601 (Sections 1-3), RFC 4607 (Sections 1-6)
10/23 Link layer & Ethernet Section 5.1-5.6, Spanning Tree Protocol, RFC 826
10/28 Link layer & Ethernet Section 5.1-5.6, Spanning Tree Protocol, RFC 826
10/30 Wireless & WiFi Sections 6.1-6.3
11/4 Cellular networks & mobility Sections 6.4-6.8
11/6 IPv6 Section 4.4.4, RFC 2460
11/11
11/13 Security - A cryptography primer Sections 8.1-8.3
11/18 Security protocols Sections 8.4-8.8
11/20 Attacks and defense systems
11/25 Attacks and defense systems (contd.)
11/27 NO CLASS - THANKSGIVING
12/2 Attacks and defense systems (contd.)
12/4 Review session