Checking date: 23/04/2019


Course: 2019/2020

Advanced network security systems
(16457)
Study: Master in Computer Science and Technology (71)
EPI


Coordinating teacher: PASTRANA PORTILLO, SERGIO

Department assigned to the subject: Department of Computer Science and Engineering

Type: Electives
ECTS Credits: 3.0 ECTS

Course:
Semester:




Students are expected to have completed
Recommended, but not mandatory, to have taken a course on cryptography.
Competences and skills that will be acquired and learning results.
Basic competences: - Understand and analyze principles and methods for information and system security. - Apply and assess network security mechanisms. - Know trends and challenges in network security.
Description of contents: programme
1. Cyberthreats 1.1. Origins 1.2. Cyberattacks galore 1.3. A brief history of malware 1.4. Welcome to the underground economy 1.5. The cyberthreat landscape 2013-2018 1.6. Trends 2. Security in smart devices 2.1. Smart devices 2.1. Security models in current smart devices 2.2. Malware in smart devices 2.3. Threat detection and analysis 2.4. Open security problems 3. Coordinated attacks and denial of service 3.1. Coordinated attacks 3.2. Collaborative Intrusion Detection Systems 3.3. Existing classifications of CIDS 3.4. Integrated solutions for CIDS 4. Traffic analysis 4.1. Introduction 4.2. Military roots 4.3. Civil traffic analysis 4.4. Contemporary computer and communications security 4.5. Exploiting location data 4.6. Resisting traffic analysis in Internet 4.7. Data retention 5. Botnets 5.1. Introduction 5.2. Structure and functions 5.3. Detection techniques 5.4. Defense techniques 5.5. New trends/platforms 5.6. Challenges
Learning activities and methodology
Activities: - Lectures - Mandatory readings of paper assigned by the lecturer - Debates and participative group activities Methodology: - Lectures using whiteboard and slide projector to develop the main concepts and discuss bibliographic references. - Critical reading of texts recommended by the lecturer, including but not limited to: scientific papers, reports, news in press, and book chapters. This will serve as basis for further discussion in class or to extend/consolidate concepts learnt in this module. - Solve practical cases and problems proposed by the lecturer, either individually or in small groups. - Prepare essays and final reports, either individually or in small groups, and present them in class.
Assessment System
  • % end-of-term-examination 80
  • % of continuous assessment (assigments, laboratory, practicals...) 20
Basic Bibliography
  • Matt Bishop. Computer Security: Art & Science. Addison-Wesley Professional. 2015
  • W. Stallings. Cryptography and Network Security (7th Edition). Pearson. 2016
Recursos electrónicosElectronic Resources *
Additional Bibliography
  • C. Sanders, J. Smith. Applied Network Security Monitoring: Collection, Detection, and Analysis. Syngress. 2013
  • Rebecca G. Bace. Intrusion Detection. Sams Publishing. 2000
  • Stephen Northcutt, Judy Novak. Network Intrusion Detection (3rd Edition). Sams Publishing; 3 edition. 2002
(*) Access to some electronic resources may be restricted to members of the university community and require validation through Campus Global. If you try to connect from outside of the University you will need to set up a VPN


The course syllabus and the academic weekly planning may change due academic events or other reasons.