Courses/Computer Science/CPSC 526.W2015
Contents
Network Systems Security
CPSC 526 - Network Systems Security
Attacks on networked systems, tools and techniques for detection and protection against attacks including firewalls and intrusion detection and protection systems, authentication and identification in distributed systems, cryptographic protocols for IP networks, security protocols for emerging networks and technologies, privacy enhancing communication. Legal and ethical issues will be introduced.
The lectures for this course run concurrently with CPSC626.
Course Policies
For the complete list of course policies, grading scheme, and tentative list of topics, please refer to the official course outline: http://www.cpsc.ucalgary.ca/custom/undergrad/outlines2015/w15/cpsc526and626_winter2015.pdf
Textbook
Network Security: Private Communication in a Public World, 2nd Edition by Charlie Kaufman, Radia Perlman, and Mike Speciner
A few supplemental textbooks (not required at all, just further reading or background for those interested)
- Applied Cryptography: Protocols, Algorithms, and Source Code in C by Bruce Schneier
- The Handbook of Applied Cryptography by Menezes, van Oorschot and Vanstone
- Unix Network Programing by W. Richard Stevens et al. http://books.google.ca/books/about/UNIX_Network_Programming.html?id=ptSC4LpwGA0C&redir_esc=y
- Interconnections: Bridges, Routers, Switches, and Internetworking Protocols, 2nd Edition http://www.informit.com/store/interconnections-bridges-routers-switches-and-internetworking-9780201634488
Grades
- HW1 - 250 points
- HW2 - 250 points
- Roving Assignment - 100 points
- Midterm Exam - 100 points (March 9th)
- Final Exam - 300 points
CPSC 626
Communication
We will not use D2L. Instead, we will use Piazza for class communication.
This term we will be using Piazza for class discussion. The system is highly catered to getting you help fast and efficiently from classmates, the TA, and myself. Rather than emailing questions to the teaching staff, I encourage you to post your questions on Piazza. If you have any problems or feedback for the developers, email team@piazza.com.
Find our class page at: https://piazza.com/ucalgary.ca/winter2015/cpsc526/home
Lecture Schedule
Please see the University Academic Calendar for important add/drop dates, holidays, etc.
Courses/Computer_Science/CPSC_526.W2015/Lecture Notes
This section contains the class session notes.
Tutorial Schedule
Here is the (tentative) schedule of tutorial topics.
Courses/Computer Science/CPSC 526.W2015/Tutorial_Schedule
Misc Links and Security "In the News"
- http://www.getcybersafe.gc.ca/index-eng.aspx
- http://www.wired.com/2015/03/clintons-email-server-vulnerable/
- http://www.foxnews.com/tech/2014/11/07/business-payroll-systems-increasingly-vulnerable-to-hackers/?intcmp=ob_homepage_tech&intcmp=obnetwork
- http://arstechnica.com/security/2015/03/google-warns-of-unauthorized-tls-certificates-trusted-by-almost-all-oses/
- re: "Threat Intelligence" http://www.fierceitsecurity.com/story/threat-intelligence-problem/2014-10-13
- http://www.zdnet.com/article/facebook-offering-up-to-300k-in-awards-for-internet-defense-contest/
- http://www.wired.com/2014/11/michael-daniel-no-zero-day-stockpile/
- https://www.linkedin.com/pulse/security-researchers-anatomy-ryan-smith
- http://www.macdevcenter.com/pub/a/mac/2005/03/15/firewall.html
- http://www.ibiblio.org/macsupport/ipfw/
- http://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/24062-146.html
- network telescope: http://www.caida.org/projects/network_telescope/
- https://github.com/silviocesare/Fuzzer
- http://www.foxnews.com/politics/2015/04/07/report-russia-behind-2014-cyber-hack-on-executive-office-computer-system-got/
- http://www.foxbusiness.com/technology/2014/11/24/as-computer-hackers-show-cars-can-be-commandeered-feds-and-automakers-aim-to/
- http://arstechnica.com/information-technology/2015/03/atts-plan-to-watch-your-web-browsing-and-what-you-can-do-about-it/
- http://www.cbc.ca/news/multimedia/from-hacking-to-attacking-a-look-at-canada-s-cyberwarfare-tools-1.3003447
- http://www.foxnews.com/tech/2014/12/30/steam-chat-spreading-dangerous-malware/?intcmp=ob_article_footer_text&intcmp=obinsite
- www.foxbusiness.com/industries/2014/12/18/digital-currencies-fueling-crime-on-dark-side-internet/
- www.foxnews.com/tech/2014/12/11/ford-ditches-microsoft-for-its-in-car-software/?intcmp=ob_article_footer_text&intcmp=obnetwork
- http://www.foxbusiness.com/technology/2014/11/20/rights-groups-release-tool-that-checks-computers-for-government-spy-software/?intcmp=ob_article_footer_text&intcmp=obinsite
- www.foxnews.com/entertainment/2014/12/15/sony-warns-some-media-outlets-to-stop-reporting-on-hacked-information/
- http://www.foxnews.com/leisure/2014/12/11/coffee-loving-hackers-decode-keurigs-secure-new-machines/?intcmp=ob_article_footer_text&intcmp=obnetwork
- www.foxbusiness.com/technology/2014/12/03/hackers-using-fake-order-confirmation-emails-to-hijack-computers/?intcmp=ob_article_footer_text&intcmp=obinsite
- www.foxbusiness.com/technology/2014/12/03/amid-debate-cyber-experts-cite-similarities-between-sony-attack-and-2013-hacks/?intcmp=ob_article_footer_text&intcmp=obinsite
- http://www.foxnews.com/politics/2014/11/25/amid-hacking-attack-state-department-info-security-still-in-shambles/?intcmp=latestnews
- www.foxnews.com/politics/2014/11/20/nsa-director-china-can-damage-us-power-grid/
- www.foxnews.com/tech/2014/10/28/samsung-knox-for-android-unsafe-to-use-researcher-says/
- http://www.foxnews.com/world/2015/03/17/south-korea-points-finger-at-north-korea-in-nuclear-operator-cyberattack/?intcmp=latestnews
- https://www.apple.com/support/security/pgp/
- http://cryptnet.net/fdp/crypto/keysigning_party/en/keysigning_party.html#traditional
- http://magazine.redhat.com/2007/08/21/a-step-by-step-guide-to-building-a-new-selinux-policy-module/
- https://wiki.debian.org/SELinux/Setup
- http://arstechnica.com/security/2011/03/how-the-comodo-certificate-fraud-calls-ca-trust-into-question/
- http://www.foxnews.com/tech/2015/04/15/gao-reports-warns-hackers-could-bring-down-plane-using-passenger-wi-fi/
- openvpn:
- Java crypto
- Fedora various
- Kerberos
Question of the Day (QoD)
- Jan 14: CryptoPro asks "What is the most practical way to protect a network?"
- see notes in lecture
- Jan 16: Beenz asks: "Networks are distributed. Then how do organizations such as NSA or China's censorship agency monitor these distributed networks in a centralized fashion?
- http://www.fcc.gov/encyclopedia/communications-assistance-law-enforcement-act
- EFF-related material on the Golden Shield: https://www.eff.org/deeplinks/2011/08/cisco-and-abuses-human-rights-china-part-1
- http://www.wired.com/2013/06/nsa-whistleblower-klein/
- http://www.submarinecablemap.com/
- EFF's pages on "Surveillance Self-Defense" https://ssd.eff.org/
[michael@gondolin QoDs]$ traceroute www.iust.ac.ir traceroute to www.iust.ac.ir (194.225.230.88), 64 hops max, 52 byte packets 1 192.168.20.1 (192.168.20.1) 0.515 ms 0.227 ms 0.235 ms 2 sevengate.cs.ucalgary.ca (136.159.7.1) 0.655 ms 0.555 ms 0.479 ms 3 * * * 4 * * * 5 pc187.hidden.ucalgary.ca (136.159.253.187) 354.563 ms * 2.910 ms 6 10.0.10.2 (10.0.10.2) 2.110 ms 1.681 ms 2.262 ms 7 10.16.242.4 (10.16.242.4) 6.467 ms 1.889 ms 2.117 ms 8 h66-244-233-17.bigpipeinc.com (66.244.233.17) 2.424 ms 2.510 ms 2.025 ms 9 ra2so-ge3-1-71.cg.bigpipeinc.com (206.174.203.105) 7.114 ms 2.953 ms 2.214 ms 10 66.163.71.101 (66.163.71.101) 3.157 ms 3.439 ms 6.755 ms 11 rd1so-ge15-0-0.cg.shawcable.net (66.163.71.89) 3.685 ms rc2so-tge0-4-0-9.cg.shawcable.net (66.163.71.117) 2.870 ms 2.659 ms 12 66.163.72.86 (66.163.72.86) 14.863 ms 66.163.72.94 (66.163.72.94) 14.591 ms 66.163.73.78 (66.163.73.78) 14.416 ms 13 xcr1.pal.cw.net (198.32.176.120) 47.410 ms 49.702 ms 51.127 ms 14 xe-8-0-0-xcr1.nyk.cw.net (195.2.28.17) 196.748 ms 195.2.30.249 (195.2.30.249) 266.636 ms xe-2-0-0-xcr2.ash.cw.net (195.2.28.5) 178.191 ms 15 ae9-xcr1.bkl.cw.net (195.2.25.21) 178.232 ms xe-2-0-0-xcr2.ash.cw.net (195.2.28.41) 170.280 ms ae9-xcr1.bkl.cw.net (195.2.25.21) 175.312 ms 16 ae0-xcr1.ash.cw.net (195.2.30.45) 169.770 ms ae2-xcr2.lnd.cw.net (195.2.21.217) 271.515 ms ae0-xcr1.ash.cw.net (195.2.30.45) 170.159 ms 17 ae3-xcr2.lsw.cw.net (195.2.28.182) 274.236 ms ae10-xcr1.prp.cw.net (195.2.25.210) 182.074 ms ae3-xcr2.lsw.cw.net (195.2.28.182) 267.040 ms 18 ae5-xcr1.fri.cw.net (195.2.21.114) 171.566 ms 187.276 ms 175.481 ms 19 ae5-xcr1.fri.cw.net (195.2.21.114) 174.616 ms 163.267 ms ae7-xcr1.fra.cw.net (195.2.25.174) 272.651 ms 20 * ae5-xcr1.fri.cw.net (195.2.21.114) 269.485 ms delta-gw2.fri.cw.net (208.175.236.78) 232.989 ms 21 * delta-gw2.fri.cw.net (208.175.236.78) 340.994 ms * 22 * 194.225.151.6 (194.225.151.6) 274.979 ms 271.348 ms 23 po-1.nia-sw-150-10.ipm.core-1.iranet.ir (194.225.150.10) 278.148 ms 194.225.151.6 (194.225.151.6) 262.069 ms 85.132.60.74 (85.132.60.74) 344.910 ms 24 194.225.151.6 (194.225.151.6) 354.951 ms po-1.nia-sw-150-10.ipm.core-1.iranet.ir (194.225.150.10) 248.568 ms 194.225.225.254 (194.225.225.254) 271.829 ms 25 194.225.225.254 (194.225.225.254) 265.357 ms 253.429 ms po-1.nia-sw-150-10.ipm.core-1.iranet.ir (194.225.150.10) 320.344 ms 26 * * * 27 * 194.225.228.77 (194.225.228.77) 271.827 ms 260.227 ms 28 * * * 29 * * *
- Jan 19: Cosmonaut asks: "What is NAT? What do the different types mean?"
- Network Address Translation. Bridged/none, source NAT (many hosts share one IP address), destination NAT (e.g., port forwarding)
- http://www.netfilter.org/documentation/HOWTO//NAT-HOWTO-2.html#ss2.1
- for the curious: "A Technique for Counting NATed Hosts" https://www.cs.columbia.edu/~smb/papers/fnat.pdf
- Feb 13: Salamander asks: "How useful is the so-called "Christmas Tree" scan?"
- packet capture picture
- On the subject of weird packets, we have previously discussed the "Ping-of-death"
From the nmap man page:
These three scan types [NULL, Fin, Xmas] are exactly the same in behavior except for the TCP flags set in probe packets. If a RST packet is received, the port is considered closed, while no response means it is open|filtered. The port is marked filtered if an ICMP unreachable error (type 3, code 1, 2, 3, 9, 10, or 13) is received.
The key advantage to these scan types is that they can sneak through certain non-stateful firewalls and packet filtering routers. Another advantage is that these scan types are a little more stealthy than even a SYN scan. Don´t count on this though—most modern IDS products can be configured to detect them. The big downside is that not all systems follow RFC 793 to the letter.
- March 18:
- Q1
- Q2
- Q3
- Q4