NE4251 Network Security Syllabus:

NE4251 Network Security Syllabus – Anna University PG Syllabus Regulation 2021

COURSE OBJECTIVES:

 To learn the fundamentals of cryptography and its application to network security.
 To understand the mathematics behind cryptography.
 To learn about the security issues in internet protocol.
 To understand the security issues in other layers
 To study about intrusion detection and prevention system and wireless hacking.

UNIT I INTRODUCTION TO NETWORK SECURITY

Security Services and Mechanisms – Vulnerabilities in wireless communications –security basics – Attack and its types Security essentials on layers – Electronic signatures – PKI and electronic certificate

UNIT II SYMMETRIC AND ASYMMETRIC CIPHERS

Classical Techniques – Substitution Ciphers – Transposition Ciphers. Modern symmetric ciphers : Stream cipher – RC4, Block cipher – DES – AES – Uses of Modes of operation. Modern Asymmetric block ciphers – RSA, ElGamal., MAC – Cryptographic Hash Functions- Key management system- Key Distribution & Key Agreements.

UNIT III SECURITY ISSUES IN INTERNET PROTOCOL

Reconnaissance-Wireshark- TCPDump – Netdiscover – Shodan ,NESSUS,Hping3 NSE Scripts: Introduction – How to write and read NSE script – TCP session Hijacking – UDP session Hijacking -HTTP Session – Hijacking – Spoofing basics – IP, DNS and ARP Spoofing

UNIT IV SECURITY IN OTHER LAYERS

EMail Security and its services – PGP – S/MIME – DNS Security – VPN Concept and its configuration – AAA Concept, RADIUS, TACACS+ technologies, SSL architecture and protocol.

UNIT V INTRUSION DETECTION AND PREVENTION SYSTEM(IDPS) AND WIRELESS HACKING

IDPS introduction – Uses of IDPS Technologies – Key functions of IDPS Technologies , Signature Based Detection , Anomaly Based Detection – Wireless networks – WPA Handshaking – Wireless hacking tools.

COURSE OUTCOMES:

CO1: To design cryptographic algorithms and carry out their implementation.
CO2: To carry out cryptanalysis on cipher.
CO3: To be able to design and implement security based internet protocols.
CO4: To carry out system security for other layers.
CO5: To understand the importance of intrusion detection and prevention system and wireless hacking.

TOTAL: 45 PERIODS

REFERENCES

1. Behrouz A. Ferouzan, Debdeep Mukhopadhyay ―Cryptography & Network Security, 3rd edition, Tata McGraw Hill, 2015.
2. William Stallings “Network Security Essentials Applications and Standards”, Pearson Education., 5th Edition, 2014.
3. Ryan Russell, ” Hack Proofing your network “, Wiley,2nd Edition,2002.
4. David M. Durton, “Elementary Number Theory”, Tata Mcgraw Hill, Sixth Edition, 2009.
5. Jonathan Katz, Yehuda Lindell, “Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/CRC Cryptography and Network Security Series)”, 1st Edition , CRC Press Taylor and Francis Group, 2008.
6. Douglas R. Stinson,” Cryptography: Theory and Practice, Third Edition (Discrete Mathematics and Its Applications), Chapman & Hall/CRC, 2005.