Tutorial 3

Network Defense Essentials

Srinivas Mukammala
Department of Computer Science, & Institute for Complex Additive Systems Analysis
New Mexico Tech
USA

E-mail: srinivas@cs.nmt.edu

Srinivas Mukammala (srinivas@cs.nmt.edu) is a Ph.D. candidate and researcher with New Mexico Tech's Institute for Complex Additive Systems Analysis. He is a frequent speaker on information assurance in conferences and tutorials. He is currently working in the areas of information assurance and security and has over 50 publications in the areas of information security.

Srinivas Mukkamala received his B.E. in Computer Science and Engineering from University of Madras in 1999, M.S. in Computer Science form New Mexico Tech. He is currently a Ph.D. candidate at New Mexico Tech’s Computer Science Department and a student lead of the information assurance research group at New Mexico Tech.

Scope:

There is an increasing need for governments, enterprises, educational institutions and individuals to employ enhanced security measures and security devices to protect their computer networks and information assets.

This tutorial begins with an introduction to the basic concepts and issues of the Internet and networking technology. An assortment of important current topics will be discussed; including information assurance, audit trails, computer attacks, vulnerability analysis, vulnerability scanners, firewalls, intrusion detection systems, data protection mechanisms, risk analysis, common vulnerabilities and exposures (CVE), and information sharing and analysis centers (ISACs).

Tutorial Goals:

To give a general introduction to network security and network security tools with emphasis on selected information security problems.

Duration: 3.00 HR

Program:

1. Introduction to Information Assurance

Basic Concepts
Security Policy
IA Technology

2. Risk Management

Introduction to Risk Assessment
Risk analysis
Judicious deploying of security infrastructure
Incident reports
Incident analysis and recovery

3. Malicious Logic

Malware Classification
Current Anti Virus Technologies
Limitations of Current Malware Detection

4. Security Technologies

Firewalls
Intrusion Detection and Prevention Systems
Vulnerability Scanners
Relevant Security Technologies

5. Infosec Challenges

Stealth Attacks
Software Security
Polymorphic and Metamorphic Malware
Fourth Generation Attacks

Target Audience:

Attendees of ICANNGA with general interest in information and system security
Attendees who are beginners to the field of information and system security

Prerequisites: None

Sample Tutorials Presented:

[1] S. Mukkamala. (2004) Principles of Network Defense. Briefing to the Information Technology Oversight Committee of the State of New Mexico

[2] A. H. Sung, S. Mukkamala, Ed. Paz. (2004) Principles and Challenges in Information Security. IEEE International Conference on Information Technology (ITCC 04)

[3] A.H. Sung, S. Mukkamala. (2003) Information Security. 10th International Conference on High Performance Computing (HiPC 2003)

[4] A.H. Sung, S. Mukkamala. (2003) Information Assurance. IEEE International Conference on IRI (IRI 03)

[5] A.H. Sung, S. Mukkamala. (2003) Need for Information Assurance and Security. IEEE International Conference Systems, Man, and Cybernetics (IEEE SMC 03)

[6] A.H. Sung, S. Mukkamala. (2003) Information Assurance. Third International Conference on Intelligent Systems Design and Applications (ISDA 03)