TKK |
Tietoverkkolaboratorio
| Opetus
S-38.153 Security of Communication Protocols (2 cr)
Latest News:
-
14.1.2004: Results for the exam on 16.12.2003 are here.
-
15.9.2003: Results for the exam on 3.9.2003 are here.
-
4.6.2003: Results for the exam on 9.5.2003 are here.
This file includes also the results for the presentations, slides and exercise
reports. Grading for the exercise reports:
-
A: report is accepted
-
A?: contact Jarmo Mölsä, you need to improve your report
-
-: return your exercise report ASAP
-
7.5.2003: Some hints for the exam on 9.5.2003 are here.
-
2.5.2003: Every group should return the exercise report by the end of May
2003. Do NOT use e-mail, but instead return the report as a paper version
to locker number 10 (S-38.153 is written on the door of this locker) in
front of the notice board for this course (second floor, near G-wing).
-
15.1.2003: Due to limitations in the student laboratory, only a maximum
of 64 students (= 4 different exercise times x 4 groups per single exercise
x 4 students per group) can do the exercises. If there are more students
in this course, they can replace the exercises with one single larger exercise
about some topic related to course contents.
-
15.1.2003: Those of you, who have not yet been assigned to any group, try
to organize a group of 4 students through the newsgroup of the Networking
laboratory (opinnot.sahko.s-38.tietoverkkotekniikka). This newsgroup is
available e.g. through the main web-page for all courses of the Networking
laboratory. After you have managed to find new groups of 4 students, send
information about the members of your group to jarmo.molsa@hut.fi, and
you will get more information about the exercise and presentation times.
The first two exercise times are reserved only for those groups, who already
have announced themselves. At the moment there is room only for three groups
per exercise time (these groups are full already), but from the beginning
of February there will be room for one more group (4 groups per exercise
time).
-
14.1.2003: NOTE: Make sure your presentation does not last longer than
20 minutes (otherwise our time schedule won't work).
-
14.1.2003: The student and exercise groups are shown here.
-
14.1.2003:
Language of the course:
The official language for the course is english, because this course
is part of the Masters' program and many students in this course
do not speak finnish or swedish.
The grade of this course does NOT depend on how well you speak english.
It is the content that matters; for example, have you understood the subject
without major errors.
About the slides: do them as clearly and well as you personally would
expect other lecturers to do them.
-
8.1.2003: The course starts on tuesday 14.1.2003 at 10-12 in S2.
-
8.1.2003: The exercises start on week 4 (i.e. 22.1.2003). Every group should
choose one exercise time and come to the student laboratory every other
week (there are thus four different exercise times, two times per week).
Course information, spring 2003
Groups
| Lectures
| Exercises
| Extra
material
Lectures (27 hours): Seminar, supervisor Jorma
Jormakka
Tuesday 10-12 S2
Exercises (13 hours): Wednesday 14:15 - 16,
Wednesday 16:15 -18
Networking lab's student laboratory at G-wing, second floor
Supervisor for exercises: Massimo Nardone
Language: English
Time schedule for lectures:
-
The course will be arranged year 2003 as a seminar.
-
The first lecture is on tuesday 14.1.2003 at 10-12 in S2.
-
There is no lecture on tuesday 21.1.2003 (to give students time to prepare
their presentations) and after that there is a lecture every week.
How the course is organized:
In the first lecture students are divided into groups of 4 students.
1. Each group makes the exercises and produces an exercise
report.
2. Each group also prepares and keeps one two-hour lecture. Each student
prepares a 20 min lecture, and gives it, thus the group members together
lecture 4*20+ time for questions = 2*45 min lecture. Each student must
be prepared to present his lecture one week before the scheduled time since
there may be occasions when somebody cannot be present.
The topic of the lecture:
The topic of the lecture may be the topic of the lecture from the year
2002 and it can be based on the lecture notes from 2002 (The slides from
spring 2002 are here).
However, the lecture can also be from another topic and based on new lecture
notes. It is forbidden to use existing lecture notes except for the ones
from this course. The topic must be announced in email to jorma.jormakka@hut.fi
by 21.1.2003.
Passing the course:
To pass the course you must have:
your group must have returned the exercise report and it must be accepted
(return the report by the end of May 2003 as a paper version into
the locker number 10 in front of the notice board for this course).
you must have presented 20 min lecture
your group must have returned about 30 power point slides of lecture notes
for the 2*45 min lecture
you must pass the exam
Grade of the course:
-
the exercise report is evaluated accepted/failed
-
the exam based on lecture notes has 4 questions a.6 points
-
the slides for lecture notes returned by the group are evaluated on the
scale 0-3
-
the presentation by the student is evaluated on the scale 0-3
-
sum of 2. 3. and 4. is the number of points from the exam and the grade
is determined by 30-27=5, 26-2304, 22-19=3,18-15=2,14-1=1,11-0=0.
Grade of the slides for the lecture notes:
If they are the slides from 2002 directly, 0 points but accepted. If
they are very good new slides with new content 3 points. Modifies or poor
original slides 1-2 points.
Literature:
There are many good books. The one I use is D. Atkins et al: Internet
Security, Professional Reference, Second edition, New Riders, 1997 you
can try to get it but at the moment it is out of print.
Any sufficiently thick book dealing with the matters in the planned
content should do. Lecture notes will come through Edita but they do not
replace a book. No material is promised to be available through the Web.
Contents
After the name of the course was selected and the description in the study
program given, the planned character of the course has been modified. Contrary
to what stated in the study program the course does not look at cryptological
methods, the course is only briefly explaining the terms, which are needed
here. Knowledge of basic cryptology is not a requirement for taking this
course, however, one should learn this information in some way if one is
interested in security issues. One could for instance read B. Schneier's
Applied Cryptography for a good overview.
This course deals with practical methods of security attacks and
defenses in the Internet. Basic method and tools used to build security
are described. Protocols for building security, like IPSEC, PGP, SET etc.
are explained in some detail. See the planned content. The course is basically
following the mentioned book, except for IPSEC and SET and such things,
which are from other books. The lecturer does not possess any real expert
knowledge on these issues and the lectures are only as good as they can
be, but as security issues are important, we offer this course - it should
get better over time. The exercises are connected with our new research
on security attacks and being research, have totally unknown quality which
mostly depends on the students taking the course. Hopefully they will be
interesting.
The exercises consist of dividing
the students to a group of attackers and a group of defenders and trying
the methods in a set of experiment scenarios in a laboratory network. The
attackers scan the network for holes, try to put trapdoors, crack passwords.
The defenders use IDS, try to notice and to stop the attacks. The lecture
and assisting personal try to get some results from the scenarios. This
is the difficult idea, which will be tried in the exercises.
Lectures start at normal time, end
at normal time, the course will be given provided that there are minimum
5 students taking it. To all other questions, I say, as usual.
Tietoverkkolaboratorio on nyt osa Tietoliikenne- ja tietoverkkotekniikan
laitosta. Tällä sivulla oleva tieto voi olla
vanhentunutta.
Kurssien ajantasainen tieto on MyCourses-palvelussa.