Network Security (CS 600.424)

Meeting times:

MW from 2 to 3:15


This course focuses on security in computer systems and networks. The course covers selected areas in network security, with particular focus on relatively recent research topics. We examine (in no particular order) critical network security services such as authentication and access control, routing, firewalls, domain naming service, traffic monitoring and intrusion detection, malware propagation and detection, secure auditing and searchable encryption, IP traceback schemes, Java Security, Web security and privacy, among others. Where appropriate, we examine threats and vulnerabilities to specific architectures and protocols. There will be programming assignments, and a course project requiring an inclass presentation.


600.3/444 and 600.3/429, or instructor permission. Ideally, you should have already taken an intermediate-level object oriented programming course. Students are expected to have a sound understanding of networking fundamentals. Given that some of the assignments involve extending a Network Simulator designed specifically for this course, you should have good programming skills and in particular, familiarity with Java. If not, you should give serious thought as to whether you should take this course (at this time). In addition, students are expected to read the assigned material for in-class discussions.

Contact Info
contact location office hours email
Fabian Monrose Wyman, rm 419 4-5 pm Mondays  
Scott Coull (TA) Wyman, rm 414 2-3:30, ThF 424tas (at)

Please include the string CS600.424: in the subject line of all email messages sent to me regarding this course. If you do not, your email may be discarded without review. Sign up for the course mailing list by sending email to majordomo (at) with subscribe cs424 in the message body. Announcements regarding the course and assignments will be posted to that list, so please subscribe. Once subscribed, email regarding assignments should be sent to cs424 (at)

Course Materials

There is no required text, but the following textbooks are recommended:

  • Charlie Kaufman, Radia Perlman, and Mike Speciner. Network Security and Private Communications in a Public World, 2nd edition, Prentice Hall, 2002. ISBN: 0-13-046019-2.
  • Charles P. Pfleeger, Shari Lawrence Pfleeger. Security in Computing, 3rd edition, Prentice Hall, 2003. ISBN: 0-13-035548-8.
  • Grading (subject to change)
    Assignments 50%
    Midterm 20%
    Project + in-class Presentations 20%
    Class participation 10%

    Collaboration on homework assignments (except where explicitly stated) and exams is strictly forbidden. Exams are closed book. See the Hopkins policy regarding Academic Honesty. No late assignments will be accepted.


    Lectures will be based mostly on research papers, some of which will be required reading. See the 2007 syllabus.

    Ethics code:

    Please make sure to read the CS Ethic code