CSE 408 – Network Security


Instructor: Long Lu
Location: FREY HALL 217
Meeting Times: Tue Thu 8:30 a.m. – 9:50 a.m. (Spring 2015)
Prerequisites: Basics of computer networks and systems
Office Hours: Tue Thu 9:50 a.m. – 11:00 a.m. (Spring 2015)
TA and Office Hours: TBD


  • Course Description

    This is a newly re-designed course that covers a series of important topics in computer and network security. The course starts with the basic cryptography and then proceeds onto the security problems and solutions at different layers of computer networks. Finally, the course touches on some hot topics in this area.

    Students should expect an average reading load of 1 book chapter (or equivalent) per week, bi-weekly assignments, two exams, and two to three projects that involve a significant amount of system-level programming.

    Reading Materials and Text Books

    Pre-class readings consist of papers, articles, and book chapters, whose digital copies will be provided before class. After each lecture, a handout will be posted for reviewing content covered in class. Materials provided in this course should be used for educational purposes only and not be distributed without permissions. 

    The following text books are recommended, but NOT required:

    • [NS] Network Security: Private Communication in a Public World (by Charlie Kaufman et al.)
      ISBN-10: 0130460192 | ISBN-13: 978-0130460196
    • [ICS] Introduction to Computer Security (by Michael Goodrich and Roberto Tamassia)
      ISBN-10: 0321512944 | ISBN-13: 978-0321512949
    • [HAC] Handbook of Applied Cryptography (by Alfred J. Menezes et al.)
      Available for download at http://cacr.uwaterloo.ca/hac/

    Learning and Teaching

    For effective in-class learning, students must finish the required readings before coming to classes. This course is taught primarily using whiteboard with occasional uses of slides for demonstrations. Note-taking is strongly encouraged, so is active participation in discussions.


    • Assignments, and presentations – 20%
    • Mid-term exam – 20%
    • Final exam – 20%
    • Projects – 40%

    Honor Code

    Students are required to follow the university honor code and guidelines on academic conduct at all times. Failing to do so will result in instant reports to the university.

  • Schedule (tentative)

    Students must check this schedule regularly as new materials are frequently added without separate announcements. 

    Date Topic Readings & References Note
    Basic Crypto
    1/27 Introduction
    Class cancelled due to inclement weather.
    1/29 Symmetric-key cryptography Chapter 1.1-1.5, 6.1, and 7.1-7.3 in [HAC];
    Chapter 3 and 4 in [NS] (optional);
    2/3 Class cancelled due to inclement weather.
    2/5 Asymmetric-key cryptography Chapter 1.6-1.11 and 8.1-8.2 in [HAC];
    Chapter 2.5 and 2.6 in [NS] (optional);
    2/10 Passwords and
    Password security: A case history;
    Chapter 9 and 10 in [NS] (optional);
     Network Protocol Security
    2/12 PHY and MAC Wireless authentication protocols [survey]
    2/17 TCP/IP (I) TCP/IP Security
    2/19 TCP/IP (II) IPSEC
    2/24 SSL/TLS (I) Issues and challenges
    2/26 SSL/TLS (II) Best practice
    3/3 DNS DNS security issues
    3/5 Class cancelled due to inclement weather.
    Network Intrusions and Detections
    3/10 HW1 Presentation
    3/12 Botnets and malware Malware-related terms; Tracking Botnets
    3/17 NO CLASS Spring Recess
    3/19 NO CLASS Spring Recess
    3/24 Intrusion Detection SurveyOpen IDS
    3/26 Mid-term exam In-class
     Web Security
    3/31 Browser security (I)
    4/2 Browser security (II)
    4/7 Web server security (I)
    4/9 Web server security (II)
    4/16 Anonymity
    Hot Topics in Network Security
    4/21 SDN security
    4/23 Cellular network security
    4/28 Mobile security
    4/30 Hands-on
    5/5 Project
    presentation (I)
    5/7 Project
    presentation (II)
    5/12 Final Exam 11:15 a.m. -1:45 p.m., same room