Network Security: Network Security and Network Protocols

Goals

  • DDoS
    • Explain why Denial of Service is a challenge
    • Understand Denial-of-Service attacks and defenses
  • Network Protocols
    • Understand security protocol design goals
    • Appreciate difficulty of protocol design
    • Internalize best practices
    • Understand properties and limitations of standard protocols

DDoS

Overview

  • Why is DoS orthogonal to the secrecy and integrity goals we focused on in the crypto unit?
  • Why do people launch DoS attacks?
  • What makes DDoS a hard problem?

Attacks

  • How can we categorize DoS attacks?
  • Give some examples of DoS attacks at different layers of the network stack
  • Explain how SYN floods work
  • What is an amplification attack?

Defenses

  • How can we categorize DoS defenses?
  • How/why do SYN cookies work?
  • How can CAPTCHAs help?
  • How do CDS help?

Network Protocols

Protocol Basics

  • What properties do security protocols provide?
  • What is a typical adversary model?
  • What properties might we expect from an authentication protocol?

Protocol Flaws

  • How does the Needham-Schroeder attack work?
  • How does a type-flaw attack work?
  • How can an adversary exploit parallel sessions to attack a protocol?
  • What are the core design principles for creating a secure protocol?
  • Should you design your own protocol?
  • What tools are available to vet security protocols?

TLS

  • What are the security goals for TLS?
  • Where is it used?
  • Why is it so complex?
  • Explain the different phases of the TLS handshake
  • What assumptions are necessary for TLS to be secure?
  • How secure is TLS in practice?