Past Teaching: (July-2019)

 

 

1. Information Security

CSD-410

B.Tech (CSE), Dual Degree + B.Tech IIIT (CSE) VII Semester 

Study Material 

Week No

Topics Covered

Study Materials

1

Introduction: IDS, Types of IDS, host based IDS, Network based IDS, Stack based IDS, signature Based IDS, anomaly based IDS, TCP/IP and security concerns, DNS and security concerns, Mail server and security concerns, Web Server and security concern, firewall, Types of Intrusion, Symptoms that help in intrusion detection, statistical pattern recognition for detection and classification of attacks, vulnerabilities and Threats;

2

Attacks and Packet analysis: network based attacks such as probes & denial of service attacks, host based attacks such as buffer overflows and race conditions, malicious codes, Examining Packet Header Fields, normal and abnormal values in IP, TCP, UDP, and ICMP header fields, Fragmentation theory, packet capture examples, fragmentation-based attacks, ICMP protocol, ICMP based attacks, Network Traffic Analysis: malicious, normal and application traffic; discern malicious traffic from false positives. IDS Patterns, DoS attacks, network mapping, and coordinated attacks, Indications & Warnings and Traffic Correlation, Network correlation, Network Situational Awareness, anomaly detection, signature based analysis, Semantic aware signature, policy based analysis, and host based analysis

3

Data Collection Mechanism: Data Sampling, Packet Sampling, Flow Sampling, techniques for visualizing network data, Packet Sampling tools, Tcpdump windump, Wireshark tool, Writing Tcpdump/Windump Filters, libcap/winpcap libraries, pcap file, sniffing and spoofing tools, data and methodologies of computer intrusion detection, statistical & machine approaches to detection of attacks on computers.

5

IDS infrastructure: IDS Architecture, IDS/IPS Management and Architecture Issues with regard to deploying IDS/IPS systems, end point approach to security, system approach to security, IDS Interoperability models: CIDF (Common Intrusion Detection Framework), IDMEF (Intrusion Detection Message Exchange Format), IODEF (Incident Object Description Exchange Format), CVE (Common Vulnerabilities and Exposures), OVAL (Open Vulnerability and Assessment Language)

6

Protocol Analysis: Microsoft Protocols, SMB/CIFS, RPC, and Active Directory protocols, SIP protocol, Chat protocol, the key differences between IPv4 and IPv6, IPv6 based attacks

7

IDS tools: Snort and Bro IDS tools, NIDS Evasion, Insertion, and Checksums to confuse NID systems, Snort Fundamentals and Configuration, Snort GUIs & Sensor Management, Snort Performance, Active Response & Tagging, Snort Rules, Stimulus Response, hosts response to both normal and abnormal traffic, Advanced Snort Concepts as rule ordering and reduction of false negatives and positives. Evaluation and tuning of IDS, Cross over Rate (CER) of IDS.

SP1

Supplementary Materials

  1.  NIST Special Publication on Intrusion Detection System
  2. The ICSA.net Intrusion Detection Buyers Guide
  3. Network Intrusion Detection, Third Edition By Stephen Northcutt, Judy Novak
  4. PROJECT REPORT ON Intrusion Detection Systems (IIT Bombay)
  5. Intrusion Detection Systems with Snort by Rafeeq Ur Rehman
  6. An Introduction to Intrusion-Detection Systems Herv´e Debar
  7. Guide to Intrusion Detection and Prevention Systems (IDPS)
  8. Snort Intrusion Detection
  9.  

OL

Online Lectures

  1. NPTEL Lectures on Firewalls and Intrusion Detection System

RM

Reading Room Intrusion Detection

Week No

Topics Covered

Study Materials

1

Introduction:
Challenges in mobile computing, coping with uncertainties, resource poorness, bandwidth, etc. Cellular architecture, co-channel interference, frequency reuse, capacity increase by cell splitting. Introduction to adhoc networks – definition, characteristics features, applications. Characteristics of Wireless channel,

2

MEDIUM ACCESS PROTOCOLS
MAC Protocols: design issues, goals and classification. Contention based protocolswith reservation, scheduling algorithms, protocols using directional antennas.

3

IEEE standards: 802.11a, 802.11b, 802.11g, 802.15. HIPERLAN.

Bluetooth: User scenarios, Physical layer, MAC layer, Networking. Security, Link management.

4

GSM: Mobile services, System architecture, Radio interface, Protocols, Localization And Calling, Handover

5

Ad hoc networks: Routing.Design issues, goals and classification. Proactive Vs reactive routing, 

6

Mobile Network Layer

Mobile IP: Goals, assumptions and requirements, Entities and Terminology, IP packet delivery, Agent advertisement and discovery, Registration, Tunneling and Encapsulation, Optimizations, Reverse tunneling, Ipv6; Dynamic host configuration protocol, 

7

Mobile Transport Layer Traditional TCP:

Congestion control, Slow start, Fast retransmit/fast recovery, Implications on mobility; Indirect TCP, Snooping TCP, Mobile TCP, Fast retransmit/fast recovery, Transmission/timeout freezing, Selective retransmission, Transaction oriented TCP. 

Wireless security

Traditional security issues, mobile and wireless security issues, Problems in ad hoc networks. 

8

Data Dissemination and Management

Challenges, Data dissemination, Mobile data replication, Mobile data caching, Mobile cache maintenance, mobile web caching, caching in ad hoc networks.

9

Context Aware Computing

Ubiquitous computing, concept of context, context aware computing and applications, middleware support.

9A

Mobile Middleware

Service discovery, adaptation, mobile agents.

SM

Additional Reading

1. Other Notes and Slides

2.LECTURENOTES ON WIRELESS NETWORKS AND MOBILECOMPUTING

3. Mobile Computing materials by Prof. Christian Poellabauer

4. Mobile Computing Notes by www.tutorialspoint.com

5. Mobile COmputing by NPTEL

6. Some E-books

7. Some Paid/free books by Springer

8. Other Notes2

9. Wireless Communication by NPTEL

 

Registration for the Quiz:

 

1. Open the website, 

    http://quizstar.4teachers.org/student/registrs.jsp

    and register yourself with

your name, Last Name, and the Username:For an Example:

if your name is Amit Singh and Roll number is 18M501,then write

your name : "Amit",

Last  name: "Singh", and

the username: NITH18M501

2. After the successful registration, login your account at 

    http://quizstar.4teachers.org/indexs.jsp

3. After Login, try to enroll yourself into the Class.

 For this purpose, Click  on to the "Search" button on top right corner. 

4. Change the preference of the Class search into the

Search by "Teacher's Name" --> "LOKESH CHOUHAN "

5. Now you will get the list of various classes by me.

    But try to register yourself inside the "M.Tech II (IDS) Jan 2019".

6. Now wait for the approval from my side.

7. After Allowing/Approval, you will be ready to appear in the Online Quiz.

8. At the time of Quiz, your quiz will be available to you.

 

Teaching

 

 

Presently Teaching:(Jan-2020)

 

 

1. Intrusion Detection System

CSE-711

M.Tech II Semester (CSE)

Study Material 

 

2. Mobile Computing

CSD-422

Dual Degree (CSE) and B.Tech (IIITU) VIII Semester 

Study Material 

 

 

 

1. Intrusion Detection System (IDS)

    CSE-711, M.Tech II Semester 

    Syllabus

[Enrolled Students]

 

  Marks Evaluations:

  10 Marks: Class Test

  20 Marks: Mid Term Examination

  60 Marks: End Term Examination

  10 Marks: Class Perfomance/Quiz/

                   Seminar/Project

Assignment 1: Last Date 03/04/2020
Assignment 2: Last Date 10/04/2020

Assignment 3: Last Date 17/04/2020

 

 
 
 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

2.Mobile Computing [CSD-422]

   Dual Degree VIII Semester  [Enrolled Students]

   B.Tech (CSE, IIIT) VIII Semester [Enrolled Students]

    Syllbus

Marks Evaluations:

 

  10 Marks: Class Test 

  30 Marks: Mid Term Examination

  50 Marks: End Term Examination

  10 Marks: Class Perfomance/Quiz/Seminar/Project

 Assignment 1: Last Date 03/04/2020

  Assignment 2: Last Date 10/04/2020

 Assignment 3:  Last Date 17/04/2020

 

Registration for the Quiz:

 

1. Open the website, 

    http://quizstar.4teachers.org/student/registrs.jsp

    and register yourself with

your name, Last Name, and the Username:

    For an Example:

if your name is Amit Singh and Roll number is 16501,

then write your name : "Amit",

Last  name: "Singh", and

the username: NITH13501

2. After the successful registration,

login your account at 

    http://quizstar.4teachers.org/indexs.jsp

3. After Login, try to enroll yourself into the Class.

    For this purpose,

Click  on to the "Search" button on top right corner. 

4. Change the preference of the

Class search into the

Search by

"Teacher's Name" --> "LOKESH CHOUHAN "

5. Now you will get the list of various classes by me.

    But try to register yourself inside

the "Final Year CSE".

6. Now wait for the approval from my side.

7. After Allowing/Approval,

you will be ready to appear in the Online Quiz.

8. At the time of Quiz, your quiz will be available to you.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

3.Mobile Computing Lab [CSD-427]

      LAB1: 

  1. Installation of MATLAB and study of basic functions and Wireless/Communication Toolbox.
  2. To become familiar with the networking accessories and facilities in the Department of the Computer Science and Engineering:

          a)   Find out what networking devices are installed in the department.

          b)   Describe the network type and topology of the department

          c)   Finding IP and MAC address

          d)   Workgroup and domain configuration

          e)   Use of utilities: arp, ipconfig/ifconfig, tracert, nslookup.

      LAB2: 

      3. Demonstrate the use of Network tools: ping, ipconfig, ifconfig, tracert, arp, netstat, whois.

      4. Write a program in MATLAB to simulate and demonstrate the TDMA, FDMA systems.

      5. Write a program in MATLAB to simulate and demonstrate the GSM (TDMA+FDMA) systems.

       6. Simulate Cyclic Redundancy Check (CRC) error detection algorithm for noisy channel in MATLAB.

      LAB3: 

      7. Write a program in MATLAB to simulate and demonstrate CSMA/CA protocol.

      8. Write a program in MATLAB to simulate and demonstrate 802.11 a/b/g/n protocol.

      9. Write a program in MATLAB to simulate and demonstrate DSDV protocol.

      10. Write a program in MATLAB to simulate and demonstrate WRP protocol.

      LAB4: 

      11. Write a program in MATLAB to simulate and demonstrate AODV protocol.

      12. Write a program in MATLAB to simulate and demonstrate CSGR protocol.

      13. Write a program in MATLAB to Mobile IP protocol.

      14. Write a program in MATLAB to simulate and demonstrate IPv6 for Mobile Devices.

      LAB5: 

      15. Write a program in MATLAB to simulate and demonstrate Indirect TCP, Snooping TCP, Mobile TCP protocols.

      LAB6: 

      16. Write a program in MATLAB to simulate and demonstrate mobile web caching.

      LAB7: 

 

 

gallery/image005
gallery/image005