S004118-4115-计算机网络安全

发布者:沈如达发布时间:2018-04-23浏览次数:38

研究生课程开设申请表

 开课院(系、所):信息科学与工程学院       

 课程申请开设类型: 新开    重开□     更名□请在内打勾,下同

课程

名称

中文

计算机网络安全

英文

Computer Network Security

待分配课程编号


课程适用学位级别

博士


硕士

总学时

36

课内学时

30

学分

2

实践环节

6

用机小时


课程类别

公共基础     专业基础     专业必修     专业选修

开课院()

信息科学与工程学院

开课学期

春季

考核方式

A.笔试(开卷   闭卷)      B. 口试    

C.笔试与口试结合                 D. □其他

课程负责人

教师

姓名

蒋睿

职称

副教授

e-mail

R.Jiang@seu.edu.cn

网页地址


授课语言

汉语

课件地址


适用学科范围

信息安全

所属一级学科名称

信息与通信工程

实验(案例)个数


先修课程


教学用书

教材名称

教材编者

出版社

出版年月

版次

主要教材

计算机网络安全讲义

蒋睿




主要参考书

防火墙与网络安全—入侵检测和VPNs

Greg

Holden ()

清华大学出版社

200406

1

揭开黑客的面纱

郭世泽等

人民邮电出版社

200307

1

网络信息安全理论与技术

蒋睿等

华中科技大学出版社

200711

1







一、课程介绍(含教学目标、教学要求等)300字以内)

本课程是高校研究生信息安全专业的一门重要专业必修课,其涉及通信技术、网络技术、计算机技术、密码技术、应用数学、数论等多个学科。本课程在介绍计算机网络安全理论和技术的基础上,注重结合该领域最新的技术和研究成果,强调全面性、系统性、新颖性、实用性、启发性和可操作性的特点,是高校信息安全专业研究生必须掌握的一门专业课。

本课程的教学目标是:通过本课程的学习,系统地了解网络信息安全的基本概念、基本理论和技术,掌握网络信息安全的基本分析技术和方法,并能在今后的研究中加以熟练应用。

 本课程的教学要求:使学生了解、掌握黑客的特点和常用攻击手段。了解计算机病毒的基本概念、分类,各类病毒的工作原理,以及防治方法。掌握防火墙的基本原理,以及两种主要的技术包过滤技术和代理服务技术,并且掌握防火墙的配置方法。掌握VPN的原理和各种实现技术,了解支持VPN的相关协议。了解不同层次的网络通信安全内容,熟悉Web安全技术和Email安全技术。了解安全管理的内容,熟悉安全审计技术和入侵检测技术。


二、教学大纲(含章节目录):(可附页)


  1. 黑客与远程攻击

    1. 黑客

    2. 远程攻击原理

    3. 口令攻击

    4. IP欺骗

    5. 木马

    6. 缓冲区溢出攻击

    7. 拒绝服务攻击

  1.  计算机病毒

    1. 计算机病毒概述

    2. 计算机病毒工作原理

    3. 病毒触发机制

    4. 病毒传播机制

    5. 病毒的防范与清除

  2.  防火墙技术

    1. 防火墙概述

    2. 包过滤技术

    3. 代理服务技术

    4. 电路级网关

  3.  虚拟专用网VPN技术

    1. VPN基本原理

    2. VPN工作流程

    3. VPN主要技术

    4. 支持VPN的相关协议

第五章 网络通信的安全与安全管理

第一节 网络各层的安全

第二节 Web安全技术

第三节 Email服务的安全

第四节 安全管理目标与原则

 第五节 安全管理的实现与规划

 第六节 系统安全评估

    第七节 防范黑客原则

第六章 安全审计与入侵检测

  1. 安全审计的概念

  2. 系统的安全检查

  3. 安全分析软件

  4. 入侵检测方法

  5. 基于审计信息的入侵检测技术

  6. 基于统计的入侵检测

  7. 基于神经网络的入侵检测

  8. 基于规则的入侵检测

  9. 入侵检测系统

三、教学周历

 周次

 教学内容

 教学方式

1

 黑客,远程攻击原理,口令攻击,IP欺骗

 讲课

2

 木马,缓冲区溢出攻击,拒绝服务攻击

讲课

3

 计算机病毒工作原理,触发机制

讲课

4

 病毒传播机制,病毒防范与清除

讲课

5

 防火墙概述,包过滤技术

讲课

6

 代理服务技术,电路级网关

讲课

7

VPN基本原理、工作流程、主要技术

讲课

8

 支持VPN的相关协议:PPTPL2TP

讲课

9

 支持VPN的相关协议:IPSecMPLS

讲课

10

 网络通信各层的安全

讲课

11

 安全管理

讲课

12

 安全审计

讲课

13

 入侵检测

讲课

14

 实践环节:学生介绍各自研究报告

 讨论

15

 实践环节:学生介绍各自研究报告

 讨论

16

 课程总复习

 讲课

17

 课程考试


18





四、主讲教师简介:

蒋睿,19681月生,男,博士,现为东南大学信息科学与工程学院副教授、硕导,中国电子学会通信分会多媒体信息安全专家委员会委员,江苏省信息安全专委会委员。

19907月毕业于浙江大学信息与电子工程学系,获工学学士学位。19931毕业于浙江大学信息与电子工程学系,获工学硕士学位。20057月毕业于上海交通大学电子工程系,获通信与信息系统博士学位,同时荣获上海交通大学优秀毕业研究生称号200510月至今在东南大学信息科学与工程学院任教,主要从事计算机网络安全,无线通信网安全,宽带通信网安全等方面的教学和科研工作,开设本科生专业基础课程“网络信息安全理论与技术”1门。近年来,作为项目负责人正在从事和完成的纵横科研项目近10项,其中国家863项目2项、国家115基金项目3项、江苏省自然科学基金项目1项、上海市科技攻关项目1项、以及企业横向项目等。获上海市科技进步二等奖1项。以第一作者在Computers & Security、计算机学报、IEEE会议等国际、国内重要学术期刊发表学术论文20篇,其中SCI/EI检索15篇;出版完成研究生规划教材1部;申请和授权国家发明专利5项;指导学生获2008全国大学生电子设计竞赛信息安全邀请赛一等奖2项、二等奖1项。目前主要研究方向为:安全协议的分析与设计、计算机网络安全,无线通信网安全。

五、任课教师信息(包括主讲教师):

任课

教师

学科

(专业)

办公

电话

住宅

电话

手机

电子邮件

通讯地址

邮政

编码

蒋睿

 信息安全

83795112-806


113585105128

R.Jiang@seu.edu.cn


东南大学李文正楼北424

210096

Application Form For Opening Graduate Courses

School (Department/Institute)School of Information Science and Engineering

Course Type: New Open    Reopen □   Rename □Please tick in □, the same below

Course Name

Chinese

计算机网络安全

English

Computer Network Security

Course Number


Type of Degree

Ph. D


Master

Total Credit Hours

32

In Class Credit Hours

28

Credit

2

Practice

4

Computer-using Hours


Course Type

Public Fundamental    □Major Fundamental    √Major Compulsory     □Major Elective

School (Department)

School of Information Science and Engineering

Term

Spring

Examination

A.PaperOpen-bookClosed-bookB. □Oral   

C. □Paper-oral Combination                       D. □ Others

Chief

Lecturer

Name

Rui Jiang

Professional Title

Associate Professor

E-mail

R.Jiang@seu.edu.cn

Website


Teaching Language used in Course

Chinese

Teaching Material Website


Applicable Range of Discipline

Information Security

Name of First-Class Discipline

Information and Communication Engineering

Number of Experiment


Preliminary Courses


Teaching Books

Textbook Title

Author

Publisher

Year of Publication

Edition Number

Main Textbook

Teaching Materials on Computer Network Security

Rui Jiang




Main Reference Books

Guide to Fierwalls and Network Security: Intrusion Detection and VPNs

Greg

Holden

Tsinghua University Press

June, 2004


1


Unveil the Hackers

S. Z. Guo et al.

Peoples Post-Telecommunication Press

July, 2003

1

Theory and Technology for Network Information Security

Rui Jiang et al.

Huazhong University of Science and T echnology Press


November, 2007


1







  1. Course Introduction (including teaching goals and requirements) within 300 words:

The course is a major compulsory course for graduates. It deals with the communication technology, network technolgy, computer technology, encryption technology, application mathematics and etc.

Teaching goals: Through study the course, the graduates should understand the basic conceptions, theories, and technologies of computer network security, grasp the analysis methods for computer network security, and are proficient in application for the future research.

Requirements: Understand and grasp the methods made by hackers, understand the computer virus, firewalls, VPNs, network communication security, security management, security audit, and intrusion detection.


  1. Teaching Syllabus (including the content of chapters and sections. A sheet can be attached):

Chapter 1: Hackers and Long-distance Attack

    1. Hackers

    2. Theory of long-distance attack

    3. Password attack

    4. IP cheating

    5. Trojan horse

    6. Buffer overflow attack

    7. Denial of service attack

Chapter 2: Computer Virus

    1. Overview of computer virus

    2. Working principle of computer virus

    3. Triggering mechanism of computer virus

    4. Spreading mechanism of computer virus

    5. Keep away and clear away computer virus

Chapter 3: Firewalls

3.1 Overview of firewalls

3.2 Package filtration technology

3.3 Agency server technology

3.4 Circuit gateway

Chapter 4: VPN Technology

4.1 Basic theory of VPN

4.2 Working flow of VPN

4.3 Main technolgies of VPN

4.4 Corresponding protocols for VPN

Chapter 5: Network Security and Security Management

5.1 Different layers security

5.2 WEB secirity technology

5.3 E-mail service secirity technology

5.4 Goals and principles of secirity management

5.5 Realization and layout of secirity management

5.6 Evaluation of system security

5.7 Principles for keeping away hackers

Chapter 6: Security Audit and Intrusion Detection

6.1 Conception of security audit

6.2 Inspction of system security

6.3 Security analysis software

6.4 Intrusion detection methods

6.5 Intrusion detection technology based on audit messages

6.6 Intrusion detection technology based on statistics

6.7 Intrusion detection technology based on neural network

6.8 Intrusion detection technology based on rules

6.9 Intrusion detection system


  1. Teaching Schedule:


Week

Course Content

Teaching Method

1

Hackers, Theory of long-distance attack, Password attack, IP cheating

lecture

2

Trojan horse, Buffer overflow attack, Denial of service attack

lecture

3

Working principle of computer virus, Triggering mechanism of computer virus

lecture

4

Spreading mechanism of computer virus, Keep away and clear away virus

lecture

5

Overview of firewalls,  Package filtration technology

lecture

6

Agency server technology, Circuit gateway

lecture

7

Basic theory of VPN, Basic theory of VPN, Main technolgies of VPN

lecture

8

Corresponding protocols for VPN: PPTP, L2TP

lecture

9

Corresponding protocols for VPN: IPSec, MPLS

lecture

10

Network security

lecture

11

Security management

lecture

12

Security audit

lecture

13

Intrusion detection

lecture

14

Research report (1)

seminar

15

Research report (2)

seminar

16

Review of the course

lecture

17

Examination


18



Note: 1.Above one, two, and three items are used as teaching Syllabus in Chinese and announced on the Chinese website of Graduate School. The four and five items are preserved in Graduate School.


2. Course terms: Spring, Autumn , and Spring-Autumn term.  

3. The teaching languages for courses: Chinese, English or Chinese-English.

4. Applicable range of discipline: public, first-class discipline, second-class discipline, and third-class discipline.

5. Practice includes: experiment, investigation, research report, etc.

6. Teaching methods: lecture, seminar, practice, etc.

7. Examination for degree courses must be in paper.

8. Teaching material websites are those which have already been announced.

9. Brief introduction of chief lecturer should include: personal information (date of birth, gender, degree achieved, professional title), research direction, teaching and research achievements. (within 100-500 words)


  1. Brief Introduction of Chief lecturer:

Rui Jiang was born in 1968, male, Ph.D. Now he works as an associate professor in School of Information Science and Engineering, Southeast University. He is an expert of multimedia information security committee of Chinese Electronic Academy. He is also an expert of information security committee of Jiangsu, China.

He received his BS degree and MS degree in Electronic Engineering from Zhejiang University in 1990 and 1993, rrespectively. He received his Ph.D degree in Electronic Engineering from Shanghai Jiao Tong University, China in 2005. He has taken charge and taken part in about 10 projects, which include National 863 High Technology Project, National 115 Research Foundation, Natural Science Foundation of Jinagsu and etc. He has published 1 book and 20 academic research papers, where 15 papers are indexed by SCI and EI. His current research interests include computer network security, next generation wireless network security and the broadband network security.


  1. Lecturer Information (include chief lecturer)


Lecturer

Discipline

(major)

Office

Phone Number

Home

Phone Number

Mobile Phone Number

Email

Address

Postcode

Rui Jiang

Information Secirity

83795112-806


13585105128

R.Jiang@seu.edu.cn


210096


9