Back close

Course Detail

Course Name Computer Networks and security
Course Code 21SN603
Program M. Tech. in Cyber Security Systems & Networks
Semester 1
Credits 4

Introduction

Overview of computer networks and network security
Application layer – Overview of HTTP, FTP, SMTP and DNS and socket programming.
Transport layer – Introduction, objectives, unreliable data transfer and UDP, general principles of reliable data transfer, TCP: Overview, reliable data transfer, flow control, congestion control.

Network layer – Addressing schemes (IPv4 and IPv6), Forwarding and routing in Internet, Routing algorithms, Routing protocols in Internet (OSPF, RIP and BGP)
Link layer – Introduction and services, Link layer addressing, Multiple Access Protocols, Ethernet, ARP

Weaknesses, vulnerabilities and attacks against above protocols – hijacking, spoofing and DoS attacks. Attacks using above protocols: simple, amplified and distributed DoS attacks.
OSI Security Architecture, security attacks, security services, CIA Triad, Encryption and message confidentiality, symmetric and asymmetric encryption, Message authentication and public key cryptography

Application layer security – Goals, cryptography primitives and principles, TLS – Objectives, protocol, working and features, PGP: Overview, objective, working, features and limitations. Firewalls, Intrusion Detection Systems and Intrusion Prevention Systems. Attacks against transport layer protocols: UDP flooding, TCP spoofing, TCP connection hijacking, TCP SYN flood. BGP security, ICMP, NAT, IPSec – Introduction, Tunnel and Transfer Modes, IPSec Authentication Header, Encapsulating Security Header and Payload, IPSec Key Exchange and VPNs.

Attacks against and vulnerabilities in ARP.
Future directions – Introduction to Cloud Security , Web Security , routing security, wireless security

TEXTBOOKS/ REFERENCES

  1. James F Kurose and Keith W Ross “Computer Networks – A topdown approach”, Pearson – 7th Edition, 2017
  2. Douglas E Comer “ Internetworking with TCP/IP – principles, protocols and architectures – Volume I” –
  3. William Stallings, “Network Security Essentials – Applications and Standards”, Sixth Edition, Pearson, 2017.
  4. William R Cheswick, Steven M Bellovin, Aviel D Rubin “Firewalls and Internet Security – Repelling the Wily Hacker”
  5. Kaufman, Perlman, and Speciner.” Network Security: Private Communication in a Public World”, Second Edition, Prentice Hall PTR

Course Outcomes

  • CO1 : Describe and demonstrate networking architecture and protocols
  • CO2 : Design and develop application specific modifications to protocols and routing CO3 : Explain the fundamentals of security and cryptography
  • CO4 : Demonstrate protection of each layer with an example protocol
  • CO5: Design and develop intrusion detection and prevention systems, firewalls
  • CO6: Problem solving in network security and familiarise with research

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now