Summer 2020 (Session C) CSE 548: Advanced Computer Network Security
Summer 2020 (Session C) CSE 548: Advanced Computer Network Security
Summer 2020 (Session C) CSE 548: Advanced Computer Network Security
Course Description
With its focus on computer network security involving solutions in network virtualization,
programmable software networks, applied cryptography, system security, as well as machine
learning- and artificial intelligence-based solutions for network intrusion detection, this course
explores the necessary tools, techniques, and concepts of network security for modern computer
networks. It addresses both emerging technologies and research topics, primarily at the MAC layer
and above, and provides not only exposure to burgeoning areas of network security but also hands-
on experience in the virtual networking labs that are essential for advanced computer networks and
cybersecurity today and will be into the future.
Learning Outcomes
By completing this course, you will be able to:
Technology
Hardware
No specific hardware is needed to successfully complete this course.
Software
No specialized software is needed to successfully complete this course. Knowing how to use the
Linux OS is a plus.
2
CSE548: Advanced Computer Network Security (Summer C, 2020)
Updated 5/16/2020 – SUBJECT TO CHANGE.
Textbook
No textbook is required for this course; however, the following textbook is recommended:
Software-Defined Networking and Security: From Theory to Practice. Dijiang Huang, Ankur
Chowdhary, and Sandeep Pisharody (CRC Press, 2018).
Late work: A 25% late penalty will be added each day for graded work submitted after the
scheduled due date and time unless prior accommodations have been agreed to for extraordinary
circumstances.
3
CSE548: Advanced Computer Network Security (Summer C, 2020)
Updated 5/16/2020 – SUBJECT TO CHANGE.
3 Virtual Networks 6/1 6/7 6/7
Grade Breakdown
Course Work Quantity Format %
*The system will automatically drop your lowest graded quiz score.
**To request approval to include this course’s projects in your final MCS Portfolio, you must include
at least three (3) of the projects (but are welcome to include all four), which together will account for
at least 30% of your grade, which is the threshold for a project’s eligibility for inclusion as ONE
project in the final portfolio.
4
CSE548: Advanced Computer Network Security (Summer C, 2020)
Updated 5/16/2020 – SUBJECT TO CHANGE.
Grade Scale
Consistent with CIDSE policy, you must have a cumulative grade of at least 80% to earn a “B” in
this course, and 67% (“C”) to earn credit for this course. The following cutoffs will be used to
generate your letter grade:
A+ ≥95%
A ≥90%
A- ≥87%
B+ ≥84%
B ≥80%
B- ≥77%
C+ ≥72%
C ≥67%
D ≥50%
E < 50%
NOTE: For more information about grading, visit ASU’s Grades & Records webpage.
5
CSE548: Advanced Computer Network Security (Summer C, 2020)
Updated 5/16/2020 – SUBJECT TO CHANGE.
Assessment Details and Settings
The table below summarizes what you can expect to encounter in the course’s assessments.
6
CSE548: Advanced Computer Network Security (Summer C, 2020)
Updated 5/16/2020 – SUBJECT TO CHANGE.
exams online while ensuring the start-up with
integrity of the exam for the institution. proctor)
The exam will be available for three
(3) days. Additional information is
provided in the Course Map, Week 1’s
“Course Exams” reading, exam-
specific instructions in Week 8, and
the MCS Onboarding Course).
ProctorU appointments must be made
at least 72 hours prior to exam time to
avoid a scheduling fee.
7
CSE548: Advanced Computer Network Security (Summer C, 2020)
Updated 5/16/2020 – SUBJECT TO CHANGE.
Live Events/Virtual Office Hours
This course will offer several live event/virtual office hour sessions each week, all of
which will be hosted on Zoom. These sessions have an open, “drop-in” format to
provide everyone an opportunity to meet with the course instructor and/or teaching
assistants as well as classmates to ask questions and learn more about course topics
and assignments
Live events/virtual office hours may be joined using a computer or a mobile device. iOS
devices, however, are not fully supported at this time. To join from an iOS device, use
the Zoom app and paste in the session URL. Using other mobile operating systems or a
computer, simply open the Coursera app, navigate to “Live Events,” and click the active
link to join.
Also watch for announcements and check the Live Events page in the course.
Note: These events will be recorded and the instructor’s events will be uploaded to the
course by the end of the day following each event. Look for the “Weekly Live
Event/Office Hour Recordings” section at the end of each week.
For ASU and MCS policies and procedures, refer to the MCS Graduate Handbook.
Course Map
Week 1 | Unit 1: Getting Started and Computer Network Foundations
Learning Objectives
1.1 Describe computer network infrastructure components and set-up, including network
protocol layer models
1.2 Illustrate networking concepts such as devices’ OSI and TCP/IP protocol stack layers and
packet encapsulation and decapsulation
8
CSE548: Advanced Computer Network Security (Summer C, 2020)
5/13/2020 – SUBJECT TO CHANGE.
1.3 Differentiate between the uses, network layers, and related concepts of MAC and IP
addresses
1.4 Differentiate between IPv6 and IPv4
1.5 Illustrate the use of port number
1.6 Illustrate physical, logical and overlay networks
1.7 Explain the purpose and functionality of computer networking services such as DHCP,
ARP, DNS, and NAT
1.8 Illustrate the packet processing procedure of using iptables
1.9 Describe intradomain and interdomain network routing
Modules
Module 1: Getting Started
Module 2: Computer Network Basics and Infrastructure
Module 3: Network Addresses
Module 4: Computer Networking Services
Week 1 – To Do
❏ Complete “Get to Know Your Classmates” (discussion forum assignment)
❏ Attend and/or watch recorded Live Event/Virtual Office Hour(s)
❏ Create your ProctorU account (if you do not already have one)
Learning Objectives
2.1 Explain pros and cons of specific firewall architectures, including those pertaining to
deployment
2.2 Differentiate between stateful and stateless firewalls
2.3 Devise effective packet filtering firewalls such as iptables
2.4 Explain metrics intrusion detection and prevention systems such as FN, FP, TP, and TN
2.5 Differentiate among specific sniffing models, protocols, and tools
2.6 Design verifiable snort rules
2.7 Identify cryptology classifications
2.8 Explain cryptographic concepts such as symmetric cipher solutions, hash functions, Diffie-
Hellman key agreement protocol, RSA-based cryptosystem, and key management solutions
based on KDC and CA approaches
2.9 Illustrate how to use symmetric and asymmetric crypto approaches to achieve security
features such as confidentiality, authentication (origin integrity and data integrity), and their
combination
Modules
9
CSE548: Advanced Computer Network Security (Summer C, 2020)
5/13/2020 – SUBJECT TO CHANGE.
Module 1: Firewalls
Module 2: Intrusion Detection Systems
Module 3: Basics of Applied Cryptography
Week 2 – To Do
❏ Attend and/or watch recorded Live Event/Virtual Office Hour(s)
Modules
Module 1: Virtual Network Foundations
Module 2: IP Security
WEEK 3 – To Do
❏ Attend and/or watch recorded Live Event/Virtual Office Hour(s)
Modules
Module 1: Distributed Network Routing
Module 2: Network Function Virtualization
WEEK 4 – To Do
❏ Attend and/or watch recorded Live Event/Virtual Office Hour(s)
Modules
Module 1: Introduction to Models
Module 2: Attack Graph and Attack Tree
Module 3: Attack Countermeasure Tree
WEEK 5 – To Do
❏ Attend and/or watch recorded Live Event/Virtual Office Hour(s)
11
CSE548: Advanced Computer Network Security (Summer C, 2020)
5/13/2020 – SUBJECT TO CHANGE.
Week 6 | Unit 6: Anomaly Detection
Learning Objectives
6.1 Explain anomaly detection
6.2 Differentiate among the three major types of anomalies (point, contextual, and
collective)
6.3 Evaluate anomaly detection scenarios
6.4 Illustrate supervised and semi-supervised classification techniques
6.5 Describe the basic concept of neural networks for machine learning
6.6 Use feedforward neural networks (FNN) as an example to illustrate the procedure
for establishing an anomaly detection solution
6.7 Use FNN to build a basic anomaly detection model for a given network traffic data
set
Modules
Module 1: Anomaly Detection Models
Module 2: Feedforward Neural Networks
WEEK 6 – To Do
❏ Attend and/or watch recorded Live Event/Virtual Office Hour(s)
❏ If you haven’t already, schedule your final exam and complete the system test with
ProctorU
Modules
12
CSE548: Advanced Computer Network Security (Summer C, 2020)
5/13/2020 – SUBJECT TO CHANGE.
Module 1: Introduction to Moving Target Defense
Module 2: Software-Defined Networking Approach
Module 3: MTD Case Studies
WEEK 7 – To Do
❏ Attend and/or watch recorded Live Event/Virtual Office Hour(s)
❏ If you haven’t already, schedule your final exam and complete the system test with
ProctorU
❏ Study for final exam – covers Units 1 – 7 (Weeks 1 – 7)
Modules
Module 1: Happening Now and Future Directions
Module 2: Final Course Deliverables and Exam
WEEK 8 – To Do
❏ Attend and/or watch recorded Live Event/Virtual Office Hour(s)
❏ Study for final exam – covers Units 1 – 7 (Weeks 1 – 7)
❏ Complete course evaluation survey
NOTICES:
1) Because this session’s classes end on a Friday, we are opening the exam
on Thursday and extending the availability to the day after classes end, 7/11.
2) You must schedule your exam at least 72 hours prior to your desired
appointment to avoid having to pay a late-scheduling fee.
3) Conduct a ProctorU system test PRIOR to your exam appointment.
13
CSE548: Advanced Computer Network Security (Summer C, 2020)
5/13/2020 – SUBJECT TO CHANGE.
Covers: Weeks (Units) 1 – 7
Duration: 135 minutes (120 minutes + 15 minutes for start-up with proctor)
Format: TBD
Grading: TBD
Allowed materials:
Creator
Dijiang Huang
Dr. Dijiang Huang is an associate professor in the School of Computing Informatics and
Decision Systems Engineering. He teaches Computer Network and Security (CSE468) at
the undergraduate level and Advanced Computer Network and Security (CSE548) at the
graduate levels. In addition, he had taught computer science courses such as Computer
Networks (CSE434), Cloud Computing (CSE 546), Concepts of Computer Science and
Data Structure (CSE 205), Data Structures and Algorithm (CSE 310), and Introduction to
Computer Science and Engineering (CSE 101) at Arizona State University. Dr. Huang
received his Bachelor of Science degree in Telecommunications from Beijing University
of Posts & Telecommunications, China, and his Computer Science and
Telecommunications Master of Science degree and Ph.D. from the University of Missouri-
Kansas City.
Dr. Huang's research interests are in computer and network security, mobile ad hoc
networks, network virtualization, and mobile cloud computing. His research is supported
by the federal agencies NSF, ONR, ARO, and NATO, and organizations such as
14
CSE548: Advanced Computer Network Security (Summer C, 2020)
5/13/2020 – SUBJECT TO CHANGE.
Consortium of Embedded System (CES), Kern Family Foundation, Hewlett-Packard, and
China Mobile. He is a recipient of ONR Young Investigator Award and HP Innovation
Research Program (IRP) Award, a Distinguished Lecturer of IEEE ComSoc, and a co-
founder of Athena Network Solutions LLC (ATHENETS) and CyNET LLC. He currently
leads the Secure Networking and Computing (SNAC) research group at ASU.
15
CSE548: Advanced Computer Network Security (Summer C, 2020)
5/13/2020 – SUBJECT TO CHANGE.