Responsabile: Mario Marchese
Hours: 28
Prerequisites:
• Basic knowledge of telecommunications
• Basic knowledge of computer science
• Basic knowledge of programming
Program:
• Introduction to Telecommunications Networks
• Packet and circuit switching
• Concepts of protocol and service
• Layered functional architecture
• Ethernet, 802, 802.1q, Fieldbus, Industrial Ethernet
• HDLC, PPP
• IP
• TCP/UDP
• PMU and PMU interconnection
Introduction to the main security issues at network level:
• Example of the Mitnick attack on Shimomura
• Classification of attacks on confidentiality (sniffing, phishing), generally passive
• Integrity (poisoning, Man-in-the-middle), generally active
• Availability (DoS, DDoS)
• Main defense techniques
• Cryptography
• Firewalls
• Security at local network and administrative domain level
• At the level of Ethernet switches
• Overview of wireless network security (WiFi and Bluetooth)
• Weaknesses of the ARP protocol and cache poisoning attacks
• Man-in-the-middle attacks
• Logging and IDS (network-based and host-based IDS)
• Packet filtering theory: stateless and stateful, examples
• Security at wide-area network level (TCP/IP and UDP/IP)
• Issues related to DNS
• Issues related to cryptographic software, example of the Heartbleed Bug
• HTTPS and certification authorities
Advanced topics:
• Honeypots and tracking of incoming attacks
• Anonymizing proxies, onion routing, anonymous networks
• Peer-to-peer, uncensorable distribution networks
• Steganography techniques applied to network communication, examples
Course Instructor: Prof. Enrico Russo
Hours: 6
Program
• Network traffic analysis with Wireshark
• Practical exercise on a network security scenario
Main skills acquired:
• Basics of Ethernet
• Basics of TCP/IP protocols
• Basics of network security
• Security at local and wide-area network level
• Operation of known and innovative cyber-attacks
• Basics of Ethernet
• Basics of TCP/IP protocols
• Basics of network security
• Security at local and wide-area network level
• Operation of known and innovative cyber-attacks