About This Course
The Internet has become crucial for our daily life. We use public WiFi hotspots, login into remote systems, buy everything we need online and make payments via the Internet. Sometimes, we even forget about the Internet, because it is such a pervasive infrastructure. But what can go wrong on the Internet that can disrupt the services we rely upon? And what can we do about it? This course gives you an overview of protocols that we use to securely communicate over the Internet. We'll also look at attacks that can be observed on the Internet, with a focus on how to observe, and how to mitigate.
Requirements
This course is intended for students with a solid understanding of networking who want to learn about network attacks, how those attacks can be measured and what can be done in terms of mitigation and defense. It was designed for students following a M.Sc. program in the area of Computer Science, but can also be followed by students at the end of their B.Sc. or start of their Ph.D. program.
To follow this course, some basic programming skills (C, Java, ...) are required. In addition, you should be able to use Linux systems and set-up and maintain Virtual Machines (VirtualBox or UTM, Ubuntu).
Course Staff
Anna Sperotto
Anna Sperotto is professor in active betwork resilience at the Design and Analysis of Communication Systems (DACS) group at the University of Twente. Her research interests are network monitoring and modeling, intrusion detection, network security, and network management.
Raffaele Sommese
Raffaele Sommese is an assistant professor at the University of Twente. His research focuses on DNS resiliency and involves analyzing and characterizing DDoS attacks against DNS, investigating DNS misconfigurations and vulnerabilities, and quantifying existing as well as devising new countermeasures to mitigate attacks against DNS infrastructures.
Frequently Asked Questions
What web browser should I use?
The Open edX platform works best with current versions of Chrome, Firefox or Safari, or with Internet Explorer version 9 and above.
Why are you using OpenEdx
The idea behind this course is that students "learn by doing". For that purpose students perform many exercises that need to be closely coupled to the MOOC platform. OpenEdx provides us the right environment for that.
I did not receive an activation email
If you created an account on our OpenEdx platform but did not receive an activation email, please check your SPAM folder. Many mail systems conceive such activation emails as SPAM.
How do I setup a Virtual Machine (VM)?
On the Internet and YouTube you can find many videos and other resources that explain how to setup and use VirtualBox. Once VirtualBox is installed and tested, you should install Vagrant, for which you can also find many resources on the Internet. Note that you don't have to create any vagrant configuration files; such files will be provided to you as part of the course.
My Virtual Machine is not running! What should I do?
Occasionaly we find that problems occur while installing and using the VM. Sometimes problems are caused by outdated equipment, such as 10 year old laptops. In such cases you should try to arrange a newer machine, and try on that machine if the problems are gone. Problems may also occur if (Linux) kernel extensions are installed, such as grsec. In such cases some tweaking of configurations and options may solve the problems. Finally we sometimes observe that, especially with Windows systems, shared directories between guest and host OS may not work. This may be due to timing issues, and sometimes a restart of the VM solves the problem.