计算机网络安全》实验教学大纲

课程代码

045102881

课程名称

计算机网络安全

英文名称

Computerand Network Security

课程类别

专业基础课

课程性质

必修

学时

总学时48:实验学时:16实习学时:0其他学时:0

学分

2.5

开课学期

5

开课单位

计算机科学与工程学院

适用专业

信息安全

授课语言

中文

先修课程

计算机网络、高级语言程序设计、操作系统、数据库

毕业要求(专业培养能力)

本课程对学生达到如下毕业要求的贡献:

  1. 设计/开发解决方案:能够设计针对信息安全复杂工程问题的解决方案,设计满足特定需求的信息安全解决方案,并能够在设计环节中体现创新意识,考虑社会、健康、安全、法律、文化以及环境等因素。

  2. 使用现代工具:能够针对信息安全复杂工程问题,开发、选择与使用恰当的技术、资源、现代工具和信息技术工具,包括对信息安全复杂工程问题的预测与模拟,并能够理解其局限性。

  3. 工程与社会:能够基于信息安全工程相关背景知识进行合理分析,评价信息安全专业工程实践和复杂工程问题解决方案对社会、健康、安全、法律以及文化的影响,并理解应承担的责任。

  4. 职业规范:具有人文社会科学素养、社会责任感,能够在工程实践中理解并遵守工程职业道德和规范,履行责任。

课程培养学生的能力(教学目标)

完成课程后,学生将具备以下能力:

  1. 熟悉TCP/IP协议存在的缺陷、网络安全威胁以及网络安全防护等。

  2. 掌握网络侦察技术、网络扫描技术、拒绝服务攻击、计算机病毒、特洛伊木马、网络监听技术、Web网站攻击技术等常见攻击技术原理与应用。

  3. 掌握防火墙技术、入侵检测技术和蜜罐技术等防范技术原理与应用。

课程简介

本课程属于信息安全专业基础课程,结合理论讲解、实例学习和实验,全面介绍计算机网络安全的基本概念、技术和原理。主要内容包括:网络协议缺陷、网络安全威胁以及网络安全防护,网络侦察技术,网络扫描技术,拒绝服务攻击,计算机病毒,特洛伊木马,网络监听技术,Web网站攻击技术,防火墙技术,虚拟专用网技术,入侵检测技术,蜜罐技术。

主要仪器设备与软件

PC机、网络安全设备

实验报告

每次实验需提交实验报告,实验报告的内容应包括实验目的及要求、实验环境、实验过程和实验小结等。

考核方式

本实验课程成绩将结合出勤、实验操作以及实验报告等进行综合评估,其中出勤占实验课程总评成绩的10%,实验操作占实验课程总评成绩的60%,实验报告占实验课程总评成绩的30%

教材、实验指导书及教学参考书目

实验指导书与参考书:

  1. 吴礼发,洪征,李华波,《网络攻防原理》,机械工业出版社,2012

  2. 吴灏,《网络攻防技术》,机械工业出版社,2009

  3. 牛少彰,江为强,《网络的攻击与防范-理论与实践》,北京邮电大学出版社,2006

  4. 卿斯汉,蒋建春,《网络攻防技术原理与实战》,科学出版社,2004

  5. ChuckEasttomNetworkDefense and Countermeasures: Principles and PracticesPrenticeHall2005

制定人及发布时间

何军辉,2019430


计算机网络安全》实验教学内容与学时分配

实验项目编号

实验项目名称

实验学时

实验内容提要

实验类型

实验要求

每组人数

主要仪器设备与软件


网络侦察

网络扫描

4

  1. 网络侦察的几种常用方法(如搜索引擎、Whois数据、网络拓扑发现等)

  2. 利用常见网络扫描软件NMAP进行主机扫描、端口扫描、操作系统检测和漏洞扫描等)

验证性

必做

4

PC机、网络设备


ARP欺骗

口令嗅探

木马程序

4

  1. 利用ARPSpoof进行单向或双向ARP欺骗

  2. 利用Bettercap嗅探口令

  3. 利用msfvenom生成木马程序

验证性

必做

4

PC机、网络设备


Windows防火墙/Linux防火墙

PPTPVPN

4

  1. Windows高级防火墙配置和测试

  2. LinuxUFW防火墙配置和测试

  3. PPTPVPN服务端建立与客户端连接

设计性

必做

4

PC机、网络设备


入侵检测系统Snort/虚拟蜜罐Honeyd

4

  1. 入侵检测系统snort的配置和使用

  2. 利用Honeyd配置蜜罐

设计性

必做

4

PC机、网络设备


Computerand Network SecuritySyllabus

CourseCode

045102881

CourseTitle

Computerand Network Security

CourseCategory

SpecialtyBasic Courses

CourseNature

CompulsoryCourse

ClassHours

Totalhours: 48 Lab hours: 16 Practice hours: 0 Other hours:0

Credits

2.5

Semester

5

Institute

Schoolof Computer Science & Engineering

ProgramOriented

InformationSecurity

TeachingLanguage

Chinese

Prerequisites

ComputerNetworks, Advanced Language Programming, Operating Systems,Database

StudentOutcomes (Special Training Ability)

Thiscourse contributes to the following graduation requirements forstudents:

  1. Designingand Developing Solutions: with the ability to design thesolutions to complex and specific engineering problems ininformation security, to have an innovative sense in the designphase by considering the factors of society, health, safety, lawand culture.

  2. Applyingthe Modern Tools: with the ability to develop, select and use theappropriate techniques, resources, and modern tools and IT tools,including prediction and simulation, to solve the complexengineering activities in information security and understand thelimitations.

  3. Engineeringand Society: with the ability to reasonably analyze and evaluatethe impacts of professional engineering practice and solutions tothe complex engineering problems to society, health, safety, lawand culture issues by using the background knowledge ofinformation security engineering, to understand the consequentresponsibility.

  4. ProfessionalRegulations: to understand the humanity science and have thesense of social responsibility, be able to responsibly understandand abide the professional ethics and regulations in engineeringpractice.

TeachingObjectives

Uponcompletion of the course, students will have the followingabilities:

  1. Befamiliar with TCP / IP protocol flaws, network security threatsand network security protection.

  2. Mastercommon attack technology principles and applications, includingnetwork reconnaissance technology, network scanning technology,denial of service attacks, computer viruses, Trojan horses,network monitoring technology, Web site attack technology.

  3. Mastercommon defending technology principles and applications,including firewall technology, intrusion detection technology andhoneypot technology.

CourseDescription

Thiscourse belongs to the basic courses of information security. Thebasic concepts, techniques and principles of computer networksecurity may be introduced by combining theoretical explanation,case study and experiment. The main contents include: networkprotocol defects, network security threats and network securityprotection, network reconnaissance technology, network scanningtechnology, denial of service attacks, computer viruses, Trojanhorses, network monitoring technology, Web site attack technology,firewall technology, virtual private network technology, intrusiondetection technology, and honeypot technology.

Instrumentsand Equipments

PCand network security equipment

ExperimentReport

Eachexperiment must submit an experimental report, the experimentalreport should include the contents of the experimentalrequirements, experimental environment, experimental process andexperimental summary.

Assessment

Theexperimental result will be evaluated with a comprehensiveassessment, including attendance, experimental operation andexperimental reports. Attendance accounts for 10% of the totalscore of the experimental course, experimental operations accountfor 60% of the total score of the experimental course, theexperimental reports account for 30% of the total score.

TeachingMaterials and Reference Books

ExperimentalGuidance and Reference:

  1. 吴礼发,洪征,李华波,《网络攻防原理》,机械工业出版社,2012

  2. 吴灏,《网络攻防技术》,机械工业出版社,2009

  3. 牛少彰,江为强,《网络的攻击与防范-理论与实践》,北京邮电大学出版社,2006

  4. 卿斯汉,蒋建春,《网络攻防技术原理与实战》,科学出版社,2004

ChuckEasttomNetworkDefense and Countermeasures: Principles and PracticesPrenticeHall2005

Preparedby Whom and When

JunhuiHe, April 30, 2019

Computerand Network SecurityExperimentalTeaching Arrangements

No.

ExperimentItem

ClassHours

ContentSummary

Category

Requirements

Numberof StudentsEach Group

Instruments,Equipments and Software

1

Networkreconnaissance

Networkscanning

4

  1. Networkreconnaissance of several common methods (such as search engines,whois, network topology discovery, etc.)

  2. Usage ofcommon network scanning software, such as NMAP, for hostscanning, port scanning, operating system detection andvulnerability scanning, etc.

Verification

Compulsory

4

PCand network security equipment

2

ARPspoofing

Passwordintercept

Trojanhorse attack

4

  1. UseARPSpoof for one-way or two-way ARP spoofing

  2. UseBettercap to crack password

  3. Use msfvenom to generate Trojan horse

Verification

Compulsory

4

PCand network security equipment

3

FirewallWindows/Linux

PPTPVirtual Private Network

4

  1. Configureand test Windows advanced firewall

  2. Configureand test Linux firewall

  3. Use PPTP VPN server toestablish a security connection with the client

Design

Compulsory

4

PCand network security equipment

4

IntrusionDetection System Snort / Virtual Honeypot Honeyd

4

  1. Intrusiondetection system - Snort configuration and use

  2. Use Honeyd toconfigure honeypots

Design

Compulsory

4

PCand network security equipment