CSCI 430 - Introduction to Computer and Network Security - Spring 2018
 

CSCI 430 - Spring 2018
Introduction to Computer and Network Security
F 1-4:20 pm in KAP 144

Announcements
  • Please find CTF teams below:
    Team 1Team 2Team 3Team 4Team 5Team 6
    Bowei Chen
    Lauren Nelson
    Wei Wen Jeng
    Sachet Vijay
    Lillian Tsao
    Matthew Giles
    Qizun Xie
    Mian Lu
    Shih-Bor Liu
    William Tjandra
    Kevin C Lin
    Tack Lee
    Yunhan Yang
    Lai Zhiyuan
    Yingchen Wang
    Bei Deng
    Ruyin Shao
    Chris Cognetta
    Mingjian Piao
    Haoyang Chen
    Junlei Jimmy Chen
    Patrick Fuscoe
    Shubham Joshi
    Sehajpreet Kand
    Yining Huang
    Preston Payne
    Fengyuan Dong
    Raisa Ifquat
    Ashan Marla
    Fan Sang
    Jung Bok Lee
    Jason Witherspoon
    Arman Akhbari
    Zhongyang Gao
    Beyza Bozbey
    Tuling Zhao
    Yifan Meng
    Luke Anfang
    Chaitanya Penumetsa
    Yueh-Hsun Lin
    Emy Huang
    Yubo Wang
    Nicole Bergman
  • Our final will be on May 2, 2-4 pm. Room: KAP 144
  • Disability Services & Programs is in need of a volunteer notetaker for this course right away. Please apply at MyDSP Notetaker. There is an application and confirmation process. DSP issues awards of up to $100 credit to students’ accounts as a thank you at the end of the semester, based on quality of notes and performance as a notetaker. Contact Asher at DSP with any questions (notetake@usc.edu)
  • We will be using Piazza for class discussion. Please try this first before emailing the instructor or TA.
    https://piazza.com/usc/spring2018/csci430/home
People/Contact
  • Instructor:
    Prof Jelena Mirkovic (Contact: sunshine@isi.edu)
    Office hours: F 12:00 - 1:00 and by appointment in RTH 512
  • TA:
    Xiyue Deng (Contact: xiyueden@isi.edu)
    Office hours: M 2-3pm and by appointment in SAL Lab
Course Description
Computers and networking are crucial to many aspects of our daily lives: entertainment, business, personal communication, healthcare, transportation, utilities, etc. Security of such systems is thus of paramount importance for protecting our assets or even our lives. This course will give students an overview of systems security, its workings, and its role in protecting data and computing resources. Students will receive both theoretical knowledge of threats and defenses and practical skills allowing them to implement some popular threats and defenses in a laboratory setting.

After successfully completing this course, you should be able to:

  • Describe and assess a broad range of security problems and solutions
  • Understand the fundamental mathematics and engineering underlying security systems, as well as basic networking and operating systems
  • Judge the suitability of security systems for various applications
  • Install and configure some basic, open-source security systems
  • Know how to develop new security systems and features

In addition to lectures students will be engaged through a number of hands-on homeworks and capture-the-flag (CTF) exercises, where they will apply the knowledge from the class in realistic security scenarios, attacking or defending real servers on the DeterLab testbed for security experimentation.

Prerequisites: CSCI 201 or equivalent (e.g. EE classes on the same topics), or permission of the instructor. Please contact the instructor if you wish to enroll and don't have the prerequisites.

 
Textbook
There is no required textbook. I will make the readings for the class available online a few days before each lecture. If you want supplemental reading you can purchase
  • Matt Bishop
    "Introduction to Computer Security"
Syllabus / Topics Covered
DateTopics coveredSlidesReading/LinksHomework
1/12Class logistics, intro to security Lecture 1
Read Student introduction to DeterLab
Read Core Quickstart guide.
Read Student guidelines for DeterLab Create a test experiment on DeterLab with 3 nodes and run ping between nodes.
1/19Network primer
Cryptography
Network primer
Lecture 2
1/26Cryptography
Key management, authentication and authorization
Lecture 3 Homework 1 due: Intro to Linux and Deter
2/2Midterm review Sample midterm 1
Sample midterm 2
2/9Intrusions
Midterm
Lecture 4
2/16Intrusions
CTF1 preparation
2/23Intrusions
IP Spoofing
Lecture 5
3/2DDoS Lecture 6
3/9CTF1 Homework 2 due: Software exploits
3/16Spring break
3/23 DDoS
Botnets
Lecture 7
3/30 Passwords
CTF2 preparation
Lecture 8
4/6 DNS security
Routing security
Privacy
Lecture 9 Homework 3 due: TCP SYN flood
4/13 CTF2
4/20 Article/paper presentations Homework 4 due: DNS MITM attack
4/27Final review
Contemporary topics
Sample final 1
Sample final 2
Exams, Homeworks and CTF Exercises
There will be four homeworks assigned according to the class schedule and due 1-2 weeks afterwards. These homeworks are to be done individually, by each student. They require up to 8 hours to complete and are done remotely on the DeterLab testbed (http://www.deterlab.net). There will be two CTF (capture-the-flag) exercises that will be performed in class. Each student will be assigned to a 6-8 member team. Each team will have to simultaneously protect their own data/servers and attack data/servers from one other team. These exercises require 1-2 weeks of preparation (roughly 1-2 h per day, each work day).
Grading
Grades will be calculated based on the following formula:
Class tasksPercentage of the final grade
CTF Exercises (2)20%
Homeworks (4)20%
Participation10%
Midterm exam20%
Final exam30%
Final exam is scheduled by the university.
Students with Disabilities
Any student requesting academic accommodations based on a disability is required to register with Disability Services and Programs (DSP) each semester. A letter of verification for approved accommodations can be obtained from DSP. Please be sure the letter is delivered to me as early in the semester as possible. DSP is located in STU 301 and is open 8:30 a.m - 5:00 p.m., Monday through Friday. The phone number for DSP is (213) 740-0776.
Academic Integrity
USC seeks to maintain an optimal learning environment. General principles of academic honesty include the concept of respect for the intellectual property of others, the expectation that individual work will be submitted unless otherwise allowed by an instructor, and the obligations both to protect one's own academic work from misuse by others as well as to avoid using another's work as one's own. All students are expected to understand and abide by these principles. Scampus, the Student Guidebook, contains the Student Conduct Code in Section 11.00, while the recommended sanctions are located in Appendix A: http://www.usc.edu/dept/publications/SCAMPUS/gov/

Students will be referred to the Office of Student Judicial Affairs and Community Standards for further review, should there be any suspicion of academic dishonesty. The Review process can be found at: http://www.usc.edu/student-affairs/SJACS/ .

Emergency Preparedness/Course Continuity in a Crisis
In case of a declared emergency if travel to campus is not feasible, USC executive leadership will announce an electronic way for instructors to teach students in their residence halls or homes using a combination of Blackboard, teleconferencing, and other technologies.