Lehrstuhl Netzarchitekturen und Netzdienste Institut für ...
Transcript of Lehrstuhl Netzarchitekturen und Netzdienste Institut für ...
Lehrstuhl Netzarchitekturen und NetzdiensteInstitut für InformatikTU München
Information session for the Master Seminars
Future Internet and
Innovative Internet-Technologies and Mobile Communications
Prof. Dr.-Ing. Georg Carle
Seminars SS 2011 2
AdministrationResponsibilitiesAppointments and DeadlinesGrading
Introduction to offered topics
Topic selection Future Internet
Seminars SS 2011 3
AdministrationResponsibilitiesAppointments and DeadlinesGrading
Introduction to offered topics
Topic selection Future Internet
Seminars SS 2011 4
Responsibilities and Appointments – Future Internet
Organisation: Prof. Dr.-Ing. Carle, SchmittAppointment: 18.-20.4.2011
9 a.m. – 6:30 p.m. Room 03.07.023
Formality:Diplom Students: 2 SWSCredits (B.Sc./ M.Sc): 4 ECTSAttendance list existsEach participant will be session chair for one talk (moderation, discussion leader, min. 1 question concerning the talk)Successfully attendance (Talk, Paper, Review, Moderation)Using department templates on our homepageLanguage: English or German
Registration via Seminar homepagehttp://www.net.in.tum.de/de/lehre/ss11/seminare/
Seminars SS 2011 5
Appointments and Deadlines – Future Internet
AppointmentsTopic selection 11.2.2011Meeting with advisor Soon as possibleTalk „How to write a scientific work?“ 21.2.2011
11:00 a.m., 03.07.023Talk “How to give feedback?” 21.2.2011
13:30 p.m., 03.07.023Talk „How to write a review?“ 21.2.2011
13:30 p.m., 03.07.023Upload of paper (1. Version) and talk slides 4.4.2011
TalksInvited Guest Talk: t.b.a.
18.4.2011-
20.4.2011Uploads of reviews 17.4.2011Upload of paper (2. Version) 30.4.2011Publication of Proceedings t.b.a.
Seminars SS 2011 6
Responsibilities and Appointments - IITM
Organisation: Prof. Dr.-Ing. Carle, SchmittAppointment: weekly
Friday 2 p.m. – 4 p.m. Room 03.07.023
Formality:Diplom Students: 2 SWSCredits (B.Sc./ M.Sc): 4 ECTSAttendance list existsEach participant will be session chair for one talk (moderation, discussion leader, min. 1 question concerning the talk)Successfully attendance (Talk, Paper, Review)Using department templates on our homepageLanguage: English or German
Registration via Seminar homepagehttp://www.net.in.tum.de/de/lehre/ss11/seminare/
Seminars SS 2011 7
Appointments and Deadlines - IITM
AppointmentsTopic selection 06.05.2011Meeting with advisor Soon as possibleTalk „How to write a scientific work?“ 13.05.2011Talk “How to give feedback?” 20.05.2011Talk „How to write a review?“ 20.05.2011Upload of paper (1. Version) and talk slides 27.05.2011
TalksInvited Guest Talk: t.b.a.
10.06.2011-
29.07.2011Uploads of reviews 24.06.2011Upload of paper (2. Version) 29.07.2011Publication of Proceedings t.b.a.
Seminars SS 2011 8
Grading for both seminars
General things:Paper structure (6-8 pages in ACM format)
• 1 Version for Peer-Review process• 2. Version (final) for publication in proceedings
Talk (20-30 min, following discussion and feedback)• Content counts• Talking style is not counted
Review about papers from other seminar participants (minimum of 2)
Special things:Attendance at all appointments
• absent without permission result in -0.3 or additional work
Session chair for 1 talkObservance of a deadlines (upload form on homepage)Self-written papers (no plagiarism)
Seminars SS 2011 9
Seminars SS 2011 10
Administration
Introduction to offered topics
Topic selection Future Internet
More topics for the seminar IITM are in process until 6.5.2011.
Seminars SS 2011 11
Patente: Von der Erfindung zum Patent (Andreas, Tobias)
Welche Schritte sind nötigErfindungErfindungsmeldungPatentschrift
Evaluation anhand eines BeispielsTechnische BeschreibungPatentschriftWas war dazwischen?
Seminars SS 2011 12
Patente: Patente in Standards (Andreas, Tobias)
Patente in Standards stellen hohen finanziellen Wert dar!
Warum ist das so?Beispiele? Qualcomm….
Wie gehen Standardisierungsgremien damit um?3GPP, IETF, IEEE,…Beispiele• IETF RFC mit patentierten Inhalten?
Seminars SS 2011 13
Locator/Identifier Split - Alexander
Routing table explosion in the default-free zone (DFZ)
Provider-independent addressingCompany has its own IP addresses
Multi-homing • Customer is connected by more
than one provider to increase reliability
• Traffic engineeringCountermeasure against prefix hijacking
• Smaller networks due to longest prefix match principle
Problem will become worse with IPv6 as a consequence of larger address space
VERGEBEN
Seminars SS 2011 14
Recent developments in interdomain traffic - Nils
Internet split up into autonomous systems (ASes)Traffic flowing between ASes
Decentrally organized by BGP; no global viewTrade secret: Providers will not reveal exact figures
Easy question: Which AS “peers” (exchanges traffic) with what other ASes?Hard question: How much traffic is actually flowing from where to where?Required knowledge: BGP, routing
Reference:Craig Labovitz, Scott Iekel-Johnson, Danny McPherson, Jon Oberheide, Farnam Jahanian: Internet Interdomain Traffic. Proceedings of SIGCOMM 2010
VERGEBEN
Seminars SS 2011 15
Analysis of Sybil Defenses in P2P – Ralph
P2P systems are open systemsAnyone may join
Some propose underlying algorithmsfor Future Internet
Sybil Attack: join with many nodes under your control infiltrationDefenses are generally weakNew direction: evaluate social links
Your Task:Overview and classification of defensesPresent 1-2 promising defenses
Honest nodes
Sybil nodes
Attack edges
Cut between honestand Sybil nodes
VERGEBEN
Seminars SS 2011 16
DNSSEC vs. DNSCurve for Securing the Net - Ralph
DNS is unsecured systemNumerous attacks possibleSome actually happen
Replacements:DNSSEC + PubKey(IETF, @dakami)DNSCurve, CurveCP (DJB),
All based on digital signaturesDNSSEC: more offlineDNSCurve: more online
Your Task:Present both concepts for securing DNSPresent both concepts for pub key distributionThoroughly analyse advantages and drawbacksFollow Kaminsky vs. DJB
VERGEBEN
Seminars SS 2011 17
Kryptanalyse der MS Office-Verschlüssung (Heiko)
Verschlüsselung bei MS Office (bis Office Version 2003)Stromchiffre RC4Schlüsseltext = Strom XOR InhaltSchlüssel wird aus Passwort abgeleitet
SicherheitsfragenSchlüssel wiederverwenden?
• Gleiche Ströme können bei Stromchiffren Inhalt preisgebenDowngrading? Wie auch sichere Chiffren aushebelbar? …
KenntnisseMinimale Kryptographiekenntnisse sind hilfreich, aber die angesprochenen Probleme sind einfacher Art und nicht mathematischer Natur.
Literatur (u.a.)Eric Filiol: How to operationally detect misuse or flawed implementation of weak stream ciphers(and even block ciphers sometimes) and break them – Application to the Office EncryptionCryptanalysis
VERGEBEN
Seminars SS 2011 18
Strategien zur Paketverarbeitung bei Dienstgüte-Unterstützung (Heiko)
WarteschlangenWie können verschiedene Paketklassen abgebildet werden?Wie kann die Dienstgüte-Anforderung abgebildet werden?Konzepte
• Klassifizierung / Markierung• Virtuelle Warteschlangen• Scheduling
Anforderungen durch TCP und AnwendungenReihenfolgetreue wichtigWunschdatenraten sollen erreicht werdenPaketströme mit geringerer Dienstgüte sollen immer schlechter dastehen als Paketströme mit höherer Dienstgüte!
Future InternetWarteschlangen werden auch da gebrauchtFür und Wider zu verschiedenen Ideen
VERGEBEN
Seminars SS 2011 19
Innovative Messverfahren (Dirk, Johann)
IP-Alias ErkennungWas sind IP-Aliase?Konzepte zur Erkennung
• Ally• RadarGun• Prespecified Timestamps
Vergleich und Bewertung der Konzepte
Large-Scale Messungen im InternetZiele
• Unauffälliges / Nicht-invasives Messen• Hohe Performanz (Abdeckung des Internets in Stunden/Tagen)
Vermessung unterschiedlicher Eigenschaften (Aktivität, Konnektivität, Topologie)Konzepte zur Vermessung
• Verwendbare Protokolle• Messstrategien
Vergleich von IRLscanner und scamper
VERGEBEN
Seminars SS 2011 20
Finding Malicious Domains - Lothar
Domain Name SystemDNS queries are used to find services (www.in.tum.de, mail.gmx.de, …)Also used for malicious purposes• Botnet Command & Control Traffic
– Control traffic– Update Servers
• Hosting malicious websites– Phising– Exploiting browsers
• ….
Topic: How can we identify malicious domains?Where can we look for malicious domains?• Spam? Domain registrars? Passive traffic measurements?Are there specific properties of malicious domains?• Domain registrar? Domain-Flux? Fast-Flux? Similarity to “normal” domains?Can we use these properties to distinguish between malicious and non-malicious domains?
VERGEBEN
Seminars SS 2011 21
Parallelisierte NIDS - Lothar
Network Intrusion Detection Systeme (NIDS)Verteilte Angriffserkennung auf Paket-Ebene
NIDS
Internet
Analysiert
Verworfen
Pakete
Problem:
Frontend
Internet
Pakete
Lösung:
VERGEBEN
Seminars SS 2011 22
A Minimum Delay Distributed Routing Algorithm - Stephan
Motivation:Minimize the total delay in a network using a distributed routing algorithm.
Your task:Describe the network modelExplain the intuition behind the algorithmOutline the algorithm
Reference: Robert G. Gallager, A Minimum Delay Routing Algorithm Using Distributed Computation
Seminars SS 2011 23
Minimum-Cost Multicast over Coded Packet Networks - Stephan
Motivation:Routing does not achieve capacity in multicast networks:
Routing Routing + Multicast Network Coding(cost 16) (cost 14) (cost 13)
Your task:Outline usage scnenarios of network codingFormulate multicast as flow problemState and solve selected optimization problems
Reference: Minimum-Cost Multicast over Coded Packet Networks (Desmond Lun et al.)
Seminars SS 2011 24
Random Linear Network Coding - Stephan
Motivation:How to construct network codes?
Your task:Introduce linear network codingExplain how random linear coding works
Reference: Network Coding: An Introduction (Tracey Ho and Desmond Lun)
Seminars SS 2011 25
User Interfaces for Smart Ambiences: A State of the Art Analysis (Pahl)
IntroductionShort overview in building automation technology (as background)Presentation of the evaluation/ comparison metrics
Motivate the choice of exactly these metrics, like• Interaction possibilities (e.g. keys, touch, voice)• Ability to adapt to user experience (e.g. admin, guest)• Running environment (e.g. Java, web)
Presentation of some products from the market that reflect the bandwidth of available products using the evaluation criteria
Try to find a representative selection with respect to the evaluation criteriaGive a conclusion including your personal judgment and your outlook where the evolution might go
VERGEBEN
Seminars SS 2011 26
Patente: Einführung in das Patentrecht (Andreas, Tobias)
Wie kommt man zu einem Patent?Was sind die Voraussetzungen um eine Erfindung anmelden zu können?• Erfindungshöhe• NeuartigkeitRechtliche RahmenbedingungenPatentfamilienUnterschiedliche Patentsysteme• Deutsches Patent• Europäisches Patent• US Patent
VERGEBEN
Seminars SS 2011 27
Dienstgüte-Unterstützung für zukünftige Netze (Heiko)
Idee für IPv6Pakete sollen nicht nur Best Effort (so gut wie es halt geht) durch das Internet reisen, sondern je nach Bezahlung oder Wichtigkeit mit unterschiedlicher garantierter Dienstgüte
DienstgüteGarantierte Datenrate für einen Nutzer / eine VerbindungGarantierte Latenz zwischen NutzernUnterscheidung je nach Bezahlung
Future InternetWunsch nach Dienstgüte-Unterstützung in zukünftigen Netzen!
Fallbeispiel: Differentiated ServicesSkalierbare Idee, um Dienstgüte im Internet zu erreichenIdee beschreibenWie passt das zu Future Internet-Ansätzen? Was kann man davon lernen?
VERGEBEN
Seminars SS 2011 28
Patente: Patentrecherche und Bewertung (Andreas, Tobias)
Wie findet man relevante Patente?PatentdatenbankenPatentfamilien
Bewertung und Verständnis von PatentenEinordnung eines PatentsWas steht im Patent?Wie versteht und analysiert man Claims?
Wieso ist eine Recherche so wichtig?Verletzt man selbst Patente?Hat eine eigene Erfindung Überschneidungen mit anderen Patenten
VERGEBEN
Seminars SS 2011 29
The New German „Personalausweis“ (ePA) - Holger
Germany will introduce the ePA at November, 1.
ePA holds Electronic Identity (eID) and performs qualified electronicsignatures.
ePA enables authentication towardseGovernment;eBussiness.
Aim of this seminar talk will be to explainthe ePA „ecosystem“;the eCard-API-Framework;legal issues;security issues;privacy issues.
Pict
ure:
wik
iped
ia
VERGEBEN
Seminars SS 2011 30
Standards zur Gerätevernetzung – Corinna, Andreas
Netzwerkbildung wird in verschiedenen Bereichen eingesetzt.Warum ist heutzutage die Vernetzung so attraktiv? – Bsp. Heimnetzwerke
Betrachtet werden sollen, verschiedene Architekturen zur Gerätevernetzung
OSGiEEBus
Wichtige AnsatzpunkteArchitekturaufbauKommunikationsprotokolle und -abläufeInfrastrukturServiceangeboteOpenSource Aktivitäten
VERGEBEN
Seminars SS 2011 31
Model Checking and Cryptographic Protocols – Ralph
Model Checking: check whether formal model of a system complies to a formal specificationNumber of techniquesAlso used to verify the security of cryptographic protocols
Your task:Learn about model checking (!)Present in context of crypto protocols
Seminars SS 2011 32
Vendor Root CA programs
Web browsers (IEx, Mozilla, Chrome, Opera…) haveroot stores
Certificates of Root CAsNeeded for building certificate chains SSL
Root CAs are added according to “Root Programs”:Mozilla: open mailing listIE: closed, but rules publishedMany of these programs refer to “standard audits”
Your Task:Go through the rules of the root programsPresent certification standardsAnalyse acceptable audit programs
Pre-requisites:X.509 PKI
Seminars SS 2011 33
Seminars SS 2011 34
Administration
Intoduction to offered topics
Topic selection Future Internet