12th 
USENIX Security Symposium, August 4-8, 2003, Washington, DC, USA
USENIX '03 Home  | USENIX Home  | Events  | Publications  | Membership

Register

Invitation

At a Glance

Tutorials

Technical Sessions

WiPs

BoFs

Exhibition

Activities

Hotel

Students

Program PDF

Questions

Author/Speakers

Author Instructions

Speaker Instructions

Call for Papers

Past Proceedings

Register Now!     TUTORIALS

To meet your needs, the Tutorial Program at the 12th USENIX Security Symposium provides in-depth, immediately useful instruction in the latest techniques, effective tools, and best strategies. USENIX tutorials survey the topic, then dive right into the specifics of what to do and how to do it. Instructors are well-known experts in their fields, selected for their ability to teach complex subjects. Attend USENIX tutorials at Security '03 and take valuable skills back to your company or organization. Register now to guarantee your first choice—seating is limited.

Monday, August 4, 2003    
M1 Intrusion Detection and Prevention Systems NEW
M2 Logging & Security: Building an Enterprise Logging Infrastructure
M3 WiFi Security: The Trials and Tribulations of Designing, Deploying, and Using WiFi Networks Securely NEW
M4 DDoS Attacks and Defenses: Overview, Taxonomy, and Future Directions NEW
Tuesday, August 5, 2003
T1 Building Honey Pots for Intrusion Detection
T2 Hacking and Securing Web-Based Applications NEW
T3 Network Security Protocols: Theory and Current Standards
T4 Using FreeBSD's Advanced Security Features NEW
Our Guarantee

If you're not happy, we're not happy. If you feel a tutorial does not meet the high standards you have come to expect from USENIX, let us know by the first break and we will change you to any other available tutorial immediately.

Continuing Education Units (CEUs)
USENIX provides Continuing Education Units for a small additional administrative fee. The CEU is a nationally recognized standard unit of measure for continuing education and training and is used by thousands of organizations. Each full-day tutorial, or two half-day tutorials, qualifies for 0.6 CEUs. You can request CEU credit by completing the CEU section on the registration form. USENIX provides a certificate for each attendee taking a tutorial for CEU credit and maintains transcripts for all CEU students. CEUs are not the same as college credits. Consult your employer or school to determine their applicability.

Monday, August 4, 2003

M1: INTRUSION DETECTION AND PREVENTION SYSTEMS NEW
Marcus Ranum, Consultant

Who should attend: Network or security managers responsible for an IDS roll-out, security auditors interested in assessing IDS capabilities, security managers involved in IDS product selection.

Overview: Attendees will learn the advantages and disadvantages of popular approaches to Intrusion Detection Systems (IDSes), how to deal with false positives and noise, where to deploy IDSes, how to test them, how to build out-of-band IDS management networks, and how they interact with switches, routers, and firewalls.

Topics include technologies, deployment issues, and management issues.

Marcus J. Ranum (http://www.ranum.com) is the inventor of the proxy firewall and the implementer of the first commercial firewall product. He holds both the TISC "Clue" award and the ISSA Hall of Fame award.

M2: LOGGING & SECURITY: BUILDING AN ENTERPRISE LOGGING INFRASTRUCTURE
Tina Bird, Stanford University

Who should attend: System administrators and network managers responsible for monitoring and maintaining computers and network devices in an enterprise environment. Participants should be familiar with the UNIX and Windows operating systems and basic network security.

Overview: Every device on your network spits out millions of lines of audit information a day. Hidden within that data are the first clues that systems are breaking down, attackers are breaking in, and end users are breaking up. This class will teach you how to build a log management infrastructure and how to figure out what your log data means.

Topics include the extent of the audit problem, logfile generation, log management, and legal issues.

Tina Bird is a Computer Security Officer at Stanford University. She designs and implements security infrastructure for University systems; provides security alerts for machines on the 40,000-host network; and works on healthcare information security and the university's logging infrastructure.

M3: WIFI SECURITY: THE TRIALS AND TRIBULATIONS OF DESIGNING, DEPLOYING, AND USING WIFI NETWORKS SECURELY NEW
William Arbaugh, University of Maryland, College Park

Who should attend: Anyone who needs to design, deploy, and/or operate a WiFi network. Previous experience with or knowledge of wireless networking is helpful but not required.

Overview: This tutorial presents security problems with WiFi equipment and explains standards changes designed to mitigate or eliminate those problems. Attendees will be shown how to design, deploy, and test wireless architectures using legacy, WPA, and RSN equipment and open source software.

Topics include known attacks and the tools that implement them, WiFi Protected Access and RSN, designing and deploying a secure WiFi
network, and testing your network using open source tools.

William A. Arbaugh has spent over 15 years performing security research and engineering. He and his students were among the first to identify security flaws contained in the IEEE 802.11 standard, as well as proposed fixes to the standard.

M4: DDOS ATTACKS AND DEFENSES: OVERVIEW, TAXONOMY, AND FUTURE DIRECTIONS NEW
Jelena Mirkovic and Peter Reiher, UCLA

Who should attend: Researchers intending to contribute to DDoS defense, and field and security officers who need to understand and deal with DDoS attacks.

Overview: Distributed denial of service (DDoS) attacks are a great threat to the Internet, because their diffuse nature makes it difficult to control or stop them. This tutorial will describe how DDoS attacks work, based on analysis of actual attacks and the tools used to perpetrate them.

Topics include the best uses of the tools available today; research that is likely to produce more powerful tools; probable future trends in DDoS attacks; and a taxonomy for classifying DDoS attack and defense mechanisms, which will aid in understanding the scope of the threat and the possible range of responses.

Jelena Mirkovic is completing her doctorate at UCLA. She has designed and implemented a source-end DDoS defense system that stops outgoing DDoS attacks while preserving legitimate traffic.

Peter Reiher is an adjunct associate professor at UCLA. His reseach focuses on distributed systems and security. Dr Reiher was a co-recipient of the Award for the Top 100 R&D Projects in the United States.

Tuesday, August 5, 2003

T1: BUILDING HONEY POTS FOR INTRUSION DETECTION
Marcus Ranum, Consultant

Who should attend: System and network managers with administrative skills and a security background. Attendees will benefit if they have at least basic UNIX system administration skills.

Overview: This class provides a technical introduction to the art of
building honey pot systems for intrusion detection and burglar-alarming networks. Attendees will learn how to assemble their own honey pot, install it, maintain it, keep it secure, and analyze the data from it.

Topics include the fundamentals of IDSes, burglar alarms, honey pots, and log-data analysis; a detailed explanation of honey pot design, including tools and techniques, services, spoofing, honeyd, LaBrea tarpitting, logging architecture, and simple tricks for information visualization; how
to get help in analyzing data; and legal issues of entrapment, privacy,
and liability.

Marcus J. Ranum (http://www.ranum.com) is the inventor of the proxy firewall and the implementer of the first commercial firewall product. He holds both the TISC "Clue" award and the ISSA Hall of Fame award.

T2: HACKING AND SECURING WEB-BASED APPLICATIONS NEW
David Rhoades, Maven Security Consulting, Inc.

Who should attend: People who are auditing Web application security or are developing or managing the development of a Web application.

Overview: Although numerous commercial and freeware tools assist in locating network-level security vulnerabilities, these tools are incapable of locating application-level issues. This course will demonstrate how to identify security weaknesses for Web-enabled services that could be exploited by remote users.

Topics include information-gathering attacks; user sign-off verification; OS and Web server weaknesses; finding the weakest link in encryption; session tracking; authentication; and transaction-level issues.

David Rhoades is a principal consultant with Maven Security Consulting, which provides information security assurance and training services. His work has taken him across the U.S. and to Europe and Asia, where he has lectured and consulted in various areas of information security.

T3: NETWORK SECURITY PROTOCOLS: THEORY AND CURRENT STANDARDS
Radia Perlman, Sun Microsystems

Who should attend: Anyone who wants to understand the theory behind network security protocol design and get an overview of the alphabet soup of standards and cryptography. Although the tutorial is technically deep, no background other than intellectual curiosity and a good night's sleep is required.

Overview: This tutorial first convers the conceptual problems and solutions, and then specifics of the standards. It describes the pieces out of which all these protocols are built, discusses subtle design issues, and covers the kinds of mistakes people make when designing protocols.

Topics include cryptography, key distribution, handshake issues, PKI standards, real-time protocols, secure email, and Web security.

Radia Perlman is a Distinguished Engineer at Sun Microsystems. She is one of the 25 people whose work has most influenced the networking industry, according to Data Communications Magazine, and she holds about 50 issued patents.

T4: USING FREEBSD'S ADVANCED SECURITY FEATURES NEW
Mike DeGraw-Bertsch, Consultant

Who should attend: System administrators and managers responsible for securing IT assets whose requirements have outgrown their existing infrastructure. Participants should be familiar with basic system security.

Overview: This tutorial addresses the risks companies face today, discusses how to evaluate and lessen those risks, and shows how to use FreeBSD to create cost-effective, secure computing environments.

Topics include assessing risks; TrustedBSD for security evaluation; using FreeBSD's ports system for patches; jails and virtual machines; firewalls; access controls; authentication via PAM or POPIE; and configuring secure firewalls, log hosts, servers, and clients.

Mike DeGraw-Bertsch is a security and networking consultant who has been working with FreeBSD for ten years and has been active in security for the past five years.

?Need help? Use our Contacts page.

Last changed: 3 Jun 2003 aw