BSCI'24: Best Student Paper Award

Best Student Paper Award at BSCI 2024

Our publication "On the Impact of Network Transport Protocols on Leader-Based Consensus Communication" has been awarded with the Best Student Paper Award at the 6th ACM International Symposium on Blockchain and Secure Critical Infrastructure 2024.

In our work we investigate the performance and robustness impact of network transport protocols, secure channels and their configuration onto leader-based consensus. We experimentally quantify the impact of four transport protocols and two secure channel implementations on a HotStuff deployment. Our results show, that delays of a single processing layer often impact all layers above, and typical optimizations such as command batching or pipelining act as amplifiers. We demonstrate that tuning of the transport protocol building block opens a novel optimization space to a class of leader-based consensus algorithm deployments.

2024-07-01 Richard von Seck, Filip Rezabek, Sebastian Gallenmüller, Georg Carle, “On the Impact of Network Transport Protocols on Leader-Based Consensus Communication,” in Proceedings of the 6th ACM International Symposium on Blockchain and Secure Critical Infrastructure, Jul. 2024. Best Student Paper Award [Preprint] [Bib]

TUM Blockchain Salon 2024

Abstract

On 16 and 17 May 2024 we organize the second edition of the TUM Blockchain Salon at the Institute of Advanced Studies (IAS). The event will host more than 20 speakers distributed over 8 sessions with a parallel poster session. Researchers involved in SUPREMS will be present both as organizers and presenters. The event is organized as a hybrid event with on-site audience. The link to the agenda and registration can be found under a link to event. Registration available on the event website here

Date and Location

NetSec Guest Lecture: Cyber Security Assessments in Practice

Abstract

At universities, cyber security is often viewed solely from the perspective of the attackers and defenders. In their guest lecture "Cyber Security Assessments in Practice", Nico Fechtner and Merten Nagel from usd AG shed light on a new perspective: They outline how compliance with legal and regulatory requirements in terms of cyber security is essential for a large number of companies. The presentation will look at the different motivations for and types of security analyses. In particular, security audits and penetration tests and the role of network security will be discussed in more detail and highlighted using practical examples.

Date and Location

WueWoWas'23: Best Workshop Contribution Award

Best Contribution Award at WueWoWas 2023

Our publication "Never Miss Twice - Add-On-Miss Table Updates in Software Data Planes" has been awarded as the one Best Workshop Contribution at the KuVS Fachgespräch - Würzburg Workshop on Modeling, Analysis and Simulation of Next-Generation Communication Networks 2023 (WueWoWas’23).

In our work, we investigated the potential and performance of state insertions in P4 programmable data planes. Together with our previous work on updatable table entries, add-on-miss insertions enable powerful state-heavy applications with high performance directly in the data plane. The idea of add-on-miss insertions is brought up by the upcoming P4 Portable NIC Architecture targeting P4 applications running on the end hosts. We showed that the overhead of add-on-miss insertions in software targets is small, and therefore the approach is suited to run at line rate.

2023-06-01 Manuel Simon, Sebastian Gallenmüller, Georg Carle, “Never Miss Twice - Add-On-Miss Table Updates in Software Data Planes,” in KuVS Fachgespräch - Würzburg Workshop on Modeling, Analysis and Simulation of Next-Generation Communication Networks 2023 (WueWoWAS’23), Würzburg, Germany, Jun. 2023, p. 5. Best Workshop Contribution [Pdf] [Preprint] [Slides] [DOI] [Bib]

TMA'23: Best Paper Award

Best Paper Award at TMA 2023

Our publication "Target Acquired? Evaluating Target Generation Algorithms for IPv6" has been awarded with the Best Paper Award at the Network Traffic Measurement and Analysis Conference (TMA 2023).

The publication is a collaboration with Oliver Gasser from the Max Planck Institute for Informatics.

In our work we investigated biases in the IPv6 Hitlist Service , a service maintained by our chair, which offers active IPv6 addresses to Internet researchers. This service is used to run measurements in the IPv6 address space and can also function as input for Target Generation Algorithms (TGAs). We found that being aware of and filtering a bias towards certain address categories can reduce unnecessary scan overhead and limit the bias in the addresses generated by TGAs.

2023-06-01 Lion Steger, Liming Kuang, Johannes Zirngibl, Georg Carle, Oliver Gasser, “Target Acquired? Evaluating Target Generation Algorithms for IPv6,” in Proceedings of the Network Traffic Measurement and Analysis Conference (TMA), Jun. 2023. Best Paper Award [Pdf] [Bib]

PerFail'23: Best Paper Award

Best Paper Award at the PerFail 2023

Our publication "TSN Experiments Using COTS Hardware and Open-Source Solutions: Lessons Learned" has been awarded with the Best Paper Award at the Second International Workshop on Negative Results in Pervasive Computing (PerFail 2023), co-located with IEEE Pervasive Computing (PerCom) 2023, Atlanta, USA.

The publication presents lessons learned from using Commodity off-the shelf (COTS) hardware and open-source solutions for Time Sensitive Networking (TSN) experiments. We focus on three main observations related to Linux queueing disciplines (CBS, ETF, and TAPRIO) and Precision Time Protocol (PTP). We built on top of the open-source EnGINE framework EnGINE framework with newly created measurements results supporting the observed behavior.

2023-03-01 Filip Rezabek*, Marcin Bosk*, Georg Carle, Jörg Ott, “TSN Experiments Using COTS Hardware and Open-Source Solutions: Lessons Learned,” in 2nd International Workshop on Negative Results in Pervasive Computing (PerFail 2023), Atlanta, USA, Mar. 2023. Best Paper Award [Pdf] [Slides] [Bib]

Kolloq. Arthur Gervais, topic: Whitehat Hacks?

7 Mar 2023 11:00, 03.07.023 (MI-Building, Campus Garching)

Abstract

The DeFi ecosystem has experienced rapid growth, reaching over $253 billion in total value locked in just four years. However, this growth has been accompanied by numerous attacks resulting in a loss of at least $3.24 billion. This talk will introduce a systematic approach for evaluating and comparing DeFi attacks. Using data from academic papers, audit reports, and real-world incidents, we will identify gaps between academia and the practitioners' community. We will also examine potential defenses and their effectiveness. We will provide specific use cases showcasing how dynamic and advanced current attackers are. By understanding the challenges and potential solutions in DeFi, we aim to help strengthen its security and resilience.

Bio

Arthur Gervais is a computer scientist and researcher in the field of blockchain technology. He is currently an Associate Professor of Information Security at University College London, where he leads a research group focused on improving the security and scalability of blockchain systems. Gervais has made significant contributions to the field, including his work on smart contract security, decentralized systems, and blockchain privacy. He has published numerous academic papers and has been recognized for his innovative ideas and impactful research. In addition to his academic work, Gervais is also an active advisor and speaker in the blockchain  community, and has served as a technical advisor for several blockchain startups. He continues to push the boundaries of what is possible in the field of blockchain, and is dedicated to improving the overall security and usability of these systems.

Contact

Veronika Fleischner, M.A.
phone: +49 89 289 - 18032
email: fleischnernet.in.tum.de

TUM ACE SUPPRA Project

TUM Research Groups Selected as Global Winners for Blockchain and Education Program offered by Algorand Foundation

The Algorand protocol [1] is a carbon-zero Layer 1 Blockchain technology, founded by the Turing Award winner and MIT professor Silvio Micali. Based on pure Proof-of-Stake (POS) consensus, Algorand currently supports 1000 transactions per second (TPS) with a 4.5 second settlement finality and offers a powerful smart contract platform based on the Algorand Virtual Machine (AVM).

The Algorand Centres of Excellence (ACE) programme [2], funded by the Algorand Foundation, is dedicated to support research, education, development, and social impact of projects in the Blockchain and distributed ledger space. In total, the Algorand Foundation selected 10 centers of excellence globally out of 77 proposals with over 550 participants, representing 46 countries. The projects were evalauted by 27 international experts with various backgrounds.

TUM is represented among other awardees such as University of California Berkeley, Carnegie Mellon University, Yale and Purdue Universities, and Nanyang Technological University from Singapore. In total 36 additional sub-organizations are involved with representation from the USA, Europe, Africa, Australia and Asia.

In the challenging competition, the TUM project ACE-SUPPRA (Security, Usability, Performance, and Privacy Research in Algorand) was selected for a five year long research initiative grant with educational and outreach elements. The Principal Investigator (PI) of ACE-SUPPRA is Prof. Georg Carle, head of the Chair of Network Architectures and Services (NET). ACE-SUPPRA is an interdisciplinary initiative, involving teams of different TUM departments with the following Co-PIs:

  • Prof. Andreas Herkersdorf – Chair of Integrated Systems (LIS)
  • Prof. Florian Matthes – Chair of Software Engineering for Business Information Systems (SEBIS)
  • Prof. Alexander Pretschner – Chair of Software and Systems Engineering (SSE)
  • Prof. Isabell Welpe – Chair for Strategy and Organization (SAO)

Research of the involved groups, building on their key competencies, addresses technical, economic, and social aspects of blockchain technologies in relation to the Algorand protocol. The Chair of Prof. Carle targets assessment of the Algorand infrastructure, aiming for the improvement of its performance, and research of more secure and privacy-preserving techniques for the Algorand users. Prof. Herkersdorf and his team address performance enhancements using SmartNICs to which certain operations can be offloaded. Smart contract capabilities are a key factor to blockchain adoption and usability, which will be investigated by the research group of Prof. Preschner, aiming to improve robustness, quality, and security. Focusing on secure usability, Prof. Matthes aims to offer solutions to minimize risks and overhead caused by smart contract development. The team of Prof. Welpe addresses aspects of tokenomics and governance of Algorand. ACE-SUPPRA outreach activities include the organization of workshops and Hackathons.

The official announcement of the award winners by the Algorand Foundation can be found here.

TMA'22: Best Paper Award

Best Paper Award at TMA 2022

Our publication "Active TLS Stack Fingerprinting: Characterizing TLS Server Deployments at Scale" has been awarded with the Best Paper Award at the Network Traffic Measurement and Analysis Conference (TMA 2022).

The publication is a collaboration with Claas Grohnfeldt, Michele Russo, and Daniele Sgandurra from AI4Sec, Huawei Technologies Munich.

The publication investigates how large-scale server fingerprinting can be achieved by utilizing TLS meta data. We propose an approach and show the feasibility based on a Content Delivery Network (CDN) and Command and Control (CnC) server detection. We extended the TUM goscanner with active TLS fingerprinting capabilites and open-sourced our measurement data and code under the publication website.

2022-06-01 Markus Sosnowski, Johannes Zirngibl, Patrick Sattler, Georg Carle, Claas Grohnfeldt, Michele Russo, Daniele Sgandurra, “Active TLS Stack Fingerprinting: Characterizing TLS Server Deployments at Scale,” in Proc. Network Traffic Measurement and Analysis Conference (TMA), Jun. 2022. Best Paper Award [Pdf] [Slides] [Homepage] [Rawdata] [Bib]

Kolloq. Prof. Ralph Holz, topic: The Era of TLS 1.3: Characterising Deployment and Use

20 Feb 2020 14:00, FMI 03.07.023 (MI-Building, Campus Garching)

Abstract

The design and development of TLS 1.3 was different from previous versions of the Transport Layer Security protocol (TLS). Community consensus led to it enforcing the latest generation of cryptography and making fundamental changes to the protocol flow. Prominent industry engaged at an unprecedented level, making TLS 1.3 the best-tested version ever to be deployed. TLS 1.3 is also the first TLS version to be developed in the age of pervasive mobile devices.

We track the rollout of TLS 1.3 since nearly its conception. We use longitudinal, active scans to measure the increasing deployment over more than 275m domains (including more than fifty ccTLDs), paying special attention to the role that big hosting and frontend providers play. We characterize the evolution of both deployment and use for both draft versions and the final RFC version, including an analysis of connection errors. We show which industries lead in the deployment of TLS 1.3, and we characterize the very different deployment in a variety of countries. We use passive monitoring at two positions on the globe to understand the initial testing phase and the degree to which users profit from the new protocol and its new features. Finally, we exploit data from a widely deployed measurement app in the Android ecosystem to analyze the use of TLS 1.3 in mobile applications. The design and development of TLS 1.3 was different from previous versions of the Transport Layer Security protocol (TLS). Community consensus led to it enforcing the latest generation of cryptography and making fundamental changes to the protocol flow. Prominent industry engaged at an unprecedented level, making TLS 1.3 the best-tested version ever to be deployed. TLS 1.3 is also the first TLS version to be developed in the age of pervasive mobile devices.

We track the rollout of TLS 1.3 since nearly its conception. We use longitudinal, active scans to measure the increasing deployment over more than 275m domains (including more than fifty ccTLDs), paying special attention to the role that big hosting and frontend providers play. We characterize the evolution of both deployment and use for both draft versions and the final RFC version, including an analysis of connection errors. We show which industries lead in the deployment of TLS 1.3, and we characterize the very different deployment in a variety of countries. We use passive monitoring at two positions on the globe to understand the initial testing phase and the degree to which users profit from the new protocol and its new features. Finally, we exploit data from a widely deployed measurement app in the Android ecosystem to analyze the use of TLS 1.3 in mobile applications.

Bio

Ralph Holz is an Associate Professor at University of Twente in the Netherlands. His research interests revolve around empirical studies of Internet infrastructure, in particular with respect to security and the social impact and drivers of a new technology. Before joining University of Twente, Ralph was a Lecturer (Asst. Prof.) at the University of Sydney, Australia and affiliated with Australia’s prime ICT research centre, NICTA. Ralph holds a PhD from TU Munich.

Contact

Prof. Dr.-Ing. Georg Carle
phone: +49 89 289 18030
email: carlenet.in.tum.de

Kolloq. Krzysztof Rusek, topic: RouteNet: a neural architecture for routing

10 Feb 2020 15:00, 03.07.023 (MI-Building, Campus Garching)

Abstract

RouteNet is a novel network model based on Graph Neural Network (GNN) that can understand the complex relationship between topology, routing, and input traffic to produce accurate estimates of the per-source/destination per-packet delay distribution and loss. RouteNet leverages the ability of GNNs to learn and model graph-structured information and as a result, the model can generalize over arbitrary topologies, routing schemes and traffic intensity. In the evaluation,the RouteNet can predict accurately the delay distribution (mean delay and jitter) and loss even in topologies, routing and traffic unseen in the training.

Bio

Krzysztof Rusek defended his Ph.D. Thesis on queuing theory in 2016 at AGH University of Science and Technology, Kraków, Poland. Prior that He has worked as a system administrator and machine learning engineer in the research group focused on processing and protection of multimedia content. Currently, he is an assistant professor at AGH. He also works as a data scientist for Barcelona Neural Networking Center, IT advisor for the department of Atsronomy of Jagiellonian University and a Member of the Board of an AI-focused spin-of company. His main research interests are performance evaluation of telecommunications systems, machine learning, and data analysis. Currently, he is working on the applications of Graph Neural Networks and probabilistic modeling for performance evaluation of communications systems.

Contact

Veronika Fleischner, M.A.
phone: +49 89 289 - 18032
email: fleischnernet.in.tum.de

Kolloq. Prof. Miguel Pardal, topic: SureThing: Device Location Certification for the Internet of Things

29 Jan 2020 15:00, Raum 03.07.023 (MI-Building, Campus Garching)

Abstract

The scale and geographic dispersion of the Internet of Things (IoT) will surpass the size of the current day Internet in, at least, 3 orders of magnitude. The IoT will be the largest and most widely distributed system ever, with a multitude of connected sensors and actuators. The current Internet already has some serious, unresolved security problems. Adding physical world autonomous connections brings even more concerns about attacks and their consequences to people and goods. The SureThing project (http://surething-project.eu) is addressing an IoT security need: creating and validating location certificates. The project’s goal is to allow for constrained devices, needed in the provisioning of IoT services, to obtain proof of their location or to request proof of location to other devices. The certificates issued using the SureThing framework will contain location data, obtained and verified using: WiFi and Bluetooth fingerprinting, and ambience sensing. The SureThing framework will allow developers to choose between faster location proofs and more reliable proofs, which will be digitally signed and kept in a ledger. The witness models – providing a validation role for other devices at the same location – will play an important role, particularly when only limited cryptographic mechanisms are available.

Bio

Miguel L. Pardal is an Assistant Professor at Instituto Superior Técnico, Universidade de Lisboa and a researcher at INESC-ID in the Distributed Systems Group (GSD). He is currently leading the SureThing project (FCT) and completed a participation in the Safe Cloud EU Project (H2020). He is collaborating with TU Munich as Guest Scientist. During his PhD, he was a visiting student at the Auto-ID Labs at MIT. He currently has more than 40 publications and his main research interest is Cybersecurity applied to the digital frontiers of the Internet of Things and Cloud Computing.

Contact

Prof. Dr.-Ing. Georg Carle
phone: +49 89 289 18030
email: carlenet.in.tum.de

CCNC'20: Best Demo Award

Best Demo Award at CCNC 2020

Our demo of NCSbench has been awarded the Best Demo Award at the IEEE Consumer Communications and Networking Conference (CCNC'20) in Las Vegas, Nevada, USA.

The demo presented NCSbench a platform consisting of a networked control system (NCS) and an NCS-specific benchmarking platform. The NCS is a two-wheeled inverted pendulum robot built upon Lego Mindstorms. The constuction plans for the robot, its software, and the benchmark is publicly available in our GitHub repository. All components are affordable and widely available so others can easily recreate NCSbench.

2020-01-01 Samuele Zoppi, Onur Ayan, Fabio Molinari, Zenit Music, Sebastian Gallenmüller, Georg Carle, Wolfgang Kellerer, “NCSbench: Reproducible Benchmarking Platform for Networked Control Systems,” in 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC) (CCNC 2020), Las Vegas, USA, Jan. 2020. [Pdf] [Bib]

ANCS'19: Best Paper Award

Best Paper Award at ANCS 2019

Our publication The Case for Writing Network Drivers in High-Level Programming Languages has been awarded with the Best Paper Award at the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS'19) in Cambridge, United Kingdom.

The publication is a feasability study investigating network drivers in high-level programming languages. We present high-speed network drivers written in Rust, Go, C#, Java, OCaml, Haskell, Swift, JavaScript, and Python. All implementations are available in a GitHub repository.

2019-09-01 Paul Emmerich, Simon Ellmann, Fabian Bonk, Alex Egger, Esaú García Sánchez-Torija, Thomas Günzel, Sebastian Di Luzio, Alexandru Obada, Maximilian Stadlmeier, Sebastian Voit, Georg Carle, “The Case for Writing Network Drivers in High-Level Programming Languages,” in ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS 2019), Best Paper Award, Sep. 2019. [Pdf] [Bib]

Kolloq. Prof. Florian Kerschbaum, topic: Secure Analytics

30 July 2019 15:00, Fakultätsraum Informatik 00.12.019 (FMI, Campus Garching)

Abstract

This talk covers two recent works in computing analytical functions over encrypted data. I will start with the traditional range search problem and show how to encrypt data, such that it can be efficiently searched and stored, but is provably secure against attacks by a snap-shot attackers. The problem entails a definition of securely encrypting a datastructure. Our approach can withstand all recent attacks on property-preservingly encrypted databases. In the second part of the talk I will talk about the problem of computing rank functions over the blockchain. This can be used to implement sealed-bid auctions over the blockchain. Our approach is secure against malicious adversaries and requires only 3 to 4 blocks to compute. We combine a number of techniques in an usual way to achieve this trade-off.

Bio

Florian is an associate professor in the David R. Cheriton School of Computer Science at the University of Waterloo (since 2017) and executive director of the Waterloo Cybersecurity and Privacy Institute (since 2018). Before he worked as chief research expert at SAP in Karlsruhe (2005 – 2016) and as a software architect at Arxan Technologies in San Francisco (2002 – 2004). He holds a Ph.D. in computer science from the Karlsruhe Institute of Technology (2010) and a master's degree from Purdue University (2001). He is interested in data security and privacy in data management, machine learning, and blockchains. He extends real-world systems with cryptographic security mechanisms to achieve (some) provable security guarantees.

Contact

Prof. Dr.-Ing. Georg Carle
phone: +49 89 289 18030
email: carlenet.in.tum.de

Kolloq. Prof. Anja Feldmann, Ph.D., topic: The Internet: A complex system at its limits

24 May 2019 12:30, FMI 03.07.023 (MI-Building, Campus Garching)

Abstract

While the Internet is a hugely successful, human made artifact that has changed the society fundamentally, it has become a complex system with many challenges. In this talk, I will outline some of them and also point out a number of surprises in terms of our mental models of the Internet that we develop over the years. Next, I will focus on the evolution of the Internet and discuss methods for detecting Internet infrastructure outages and combat major DDoS attacks. I will end with an outlook on how we may evolve the Internet to tackle the network management challenges as well as handle the flood of ubiquitous data availability from sensors and devices everywhere.

Bio

Anja Feldmann is a director at the Max Planck Institute for Informatics in Saarbrücken, Germany, since 2018. Her research interests include Internet measurement, traffic engineering and traffic characterization, network performance debugging, intrusion detection, network architecture. She has published more than 70 papers and has served on more than 50 program committees, including as Co-Chair of ACM SIGCOMM 2003, ACM IMC 2011, PAM 2018 and as Co-PC-Chair of ACM SIGCOMM, ACM IMC, and ACM HotNets. She held professor positions at TU Berlin, Germany (2006-2017), TU München, Germany (2002) and Saarland University (2000). Before that she was a member of AT&T Labs - Research in Florham Park, NJ. She received a M.S. degree from the University of Paderborn, and M.S. and Ph.D. degrees from Carnegie Mellon University.

She is a member of the German Academy of Sciences Leopoldina, the BBAW, Academia Europaea, and was a member of the supervisory board of SAP SE from 2012 to 2018. She is a recipient of the Gottfried Wilhelm Leibniz Preis 2011, the Berliner Wissenschaftspreis 2011, the Vodafon Innovation Award 2018, and the Schelling-Preis 2018 of the Bayrische Akademie der Wissenschaften.

Contact

Dr. Oliver Gasser
email: oliver.gassermpi-inf.mpg.de

PAM'19: Best Dataset Award

Best Dataset Award at PAM 2019

The publication "A First Look at QNAME Minimization in the Domain Name System" has been awarded with the Best Dataset Award at the Passive and Active Measurement (PAM) Conference (PAM'19).

The publication is an international collaboration with Wouter B. de Vries (University of Twente), Moritz Müller (SIDN and University of Twente) Willem Toorop (NLNet Labs), Ralph Dolmans (NLnet Labs), and Roland van Rijswijk-Deij (University of Twente and NLnet Labs).

The IMC Community Contribution Award is "given to the best paper that makes datasets and corresponding code available to the public". Website of PAM'19 Awards

2019-03-01 Wouter B. de Vries, Quirin Scheitle, Moritz Müller, Willem Toorop, Ralph Dolmans, Roland van Rijswijk-Deij, “A First Look at QNAME Minimization in the Domain Name System,” in Proceedings of the Passive and Active Measurement Conference (PAM 2019), Best Dataset Award, Puerto Varas, Chile, Mar. 2019. [Url] [Bib]

Kolloq. Leonardo Linguaglossa, topic: High-speed NFV: performance evaluation and modeling

18 Feb 2019 17:00, FMI 03.07.023 (MI-Building, Campus Garching)

Abstract

Network Functions Virtualization (NFV) is among the latest network revolutions, bringing flexibility and avoiding network ossification. While NFV provides a flexible way of implementing network functions on commodity hardware, an all-software NFV implementation may present a performance gap with respect to hardware-based solutions. In the last decade numerous software acceleration techniques have appeared to bring high-speed capabilities to software network frameworks, thus trying to reduce the distance w.r.t. pure hardware solutions. Batching is one example of such techniques, consisting in processing packets in groups as opposed to individually, which is required at high-speed to minimize the framework overhead, reduce interrupt pressure, and leverage instruction-level cache hits. Whereas several system implementations have been proposed and experimentally benchmarked, the scientific community has so far only to a limited extent attempted to model the system dynamics of modern NFV routers exploiting batching acceleration. We fill this gap by proposing a simple generic model for such batching-based mechanisms, which allows a very detailed prediction of highly relevant performance indicators. These include the distribution of the processed batch size as well as queue size, which can be used to identify loss-less operational regimes or quantify the packet loss probability in high-load scenarios. In this talk I will present our experimental campaign for performance evaluation using a state-of-the-art NFV router, namely VPP. Then I will introduce our model for a generic NFV router. We contrast the model prediction with experimental results gathered in our testbed, showing that the model not only correctly captures system performance under simple conditions, but also in more realistic scenarios in which traffic is processed by a mixture of functions. rials will be discussed.

Bio

Leonardo Linguaglossa is currently a post-doctoral researcher at Telecom PairsTech (France) working in a collaboration with Cisco named "NewNet@Paris". In 2018/2019 he is working in a joint collaboration between TPT and TUM with a project named "AI4P" (Artificial Intelligence for Performance). Leonardo's main research interests include high-speed networking, future network architectures (NFV, SDN), performance evaluation and modeling.

Contact

Prof. Dr.-Ing. Georg Carle
phone: +49 89 289 18030
email: carlenet.in.tum.de

IMC'18: Community Contribution Award

Community Contribution Award at IMC 2018

The publication "A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists" has been awarded with the Community Contribution Award at the ACM SIGCOMM Internet Measurement Conference (IMC'18).

The publication is an international collaboration with Oliver Hohlfeld (RWTH Aachen University), Julien Gamba (IMDEA, Universidad Carlos III de Madrid), Torsten Zimmermann (RWTH Aachen University), Stephen D. Strowes (RIPE NCC), and Narseo Vallina-Rodriguez (IMDEA Networks Institute / ICSI)

The IMC Community Contribution Award recognizes "a paper with an outstanding contribution to the community in the form of a novel dataset, source code distribution, open platform, or other noteworthy service to the community". Website of IMC'18 Awards

2018-11-01 Quirin Scheitle, Oliver Hohlfeld, Julien Gamba, Jonas Jelten, Torsten Zimmermann, Stephen D. Strowes, Narseo Vallina-Rodriguez, “A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists,” in Internet Measurement Conference (IMC’18), IMC’18 Community Contribution Award, Boston, USA, Nov. 2018, pp. 478–493. [Homepage] [Rawdata] [Arxiv] [DOI] [Bib]

Kolloq. Prof. Rute Sofia, topic: Unified Communications in IoT, Evolutionary Aspects and the Role of Information-centric Networking

29 Oct 2018 04:00, FMI 03.07.023 (MI-Building, Campus Garching)

Abstract

The interconnection of heterogeneous devices in IoT is today performed via multiple IP-based messaging protocols which have been developed to assist a faster delivery of information over IP networks. These protocols, which perform well under restrained scenarios, require interoperability support (from/to the network as well as towards services) to scale well. Yet, today there is no standardized nor unified ICT model, capable of sustaining not only millions of heterogeneous devices, as well as: bi-directional communication towards people and devices.

In parallel, the Internet research community is exploiting novel networking paradigms, such as Information Centric Networking (ICN). ICN has, by design, a few networking architecture features (such as integrated security and the support for N to M communications) which seem to be better suited for large-scale, dense and mobile IoT environments, where bi-directional communication is required.

This talk provides an overview on the evolution of IoT communications and environments. It explains the requirements that need to be met when handling data transmission, be it in industrial IoT or personal IoT. The talk also provides a debate on the applicability of ICN to IoT; advantages and limitations, as well as interoperability towards today's environments.

Bio

Rute C. Sofia (PhD 2004) is, since 2010, a Senior Researcher at the Cognitive and People-centric Computing R&D unit, and an Associate Professor of University Lusófona de Humanidades e Tecnologias. She is also, since 2017, an Associated Researcher of ISTAR, ISCTE-IUL. Rute's research background has been developed on industrial and on academic context, and she has co-founded COPELABS (2012), research unit which she steered between 2013-2017. She has also co-founded Senception Lda (2013), a startup focused on personal communication platforms. Her current research interests are: network architectures and protocols; IoT; mobility management and estimation; network mining. Rute holds over 50 peer-reviewed publications in her fields of expertise, and 9 patents. She is an ACM member and an IEEE Senior member.

Contact

Prof. Dr.-Ing. Georg Carle
phone: +49 89 289 18030
email: carlenet.in.tum.de

Kolloq. Michel Barbeau, topic: Low Frequency Communications in Underwater Acoustic Sensor Networks

01 Oct 2018 01:00, FMI 03.07.023 (MI-Building, Campus Garching)

Abstract

Underwater Acoustic Sensor Networks are used for the exploration of natural undersea resources, collection of oceanographic data, pollution monitoring, offshore exploration, disaster prevention, assisted navigation and tactical surveillance. Utilizing acoustic communications, sensor nodes gather and send data to sink nodes. Employing radio communications, the sinks forward the data to other surface located nodes or satellites. The Internet type of communication protocols work solely for sink nodes with classical wireless access. Specific protocols are required for submerged node communications.

In this talk, I will address protocol design for long range underwater/under ice acoustic communications. In the present state of scientific and technical progress, long range underwater communications are more likely to be achievable at low frequency and narrow bandwidth. We concentrate on low frequency mobile acoustic communications in the 300 Hz to 3 kHz range. Because of the narrow half-power bandwidth at low frequency and long distance, solely extremely low data rates are possible. At low data rates, the Doppler effect is also a difficult problem. My research draws on the science of extremely weak signal communications that can deal with channels with 250 dB attenuation or more. I will focus on the design of a data link layer protocol, which includes framing and high redundancy Forward Error Correction. The complexity is in the receiver. Algebraic and probabilistic decoding techniques are combined to determine what is most likely the content of a message. Performance results obtained through simulation and sea trials will be discussed.

Bio

Michel Barbeau is a professor of Computer Science. He got a Bachelor (Universite de Sherbrooke, Canada ’85), a Master’s and a Ph.D., in Computer Science (Universite de Montreal, Canada ’87 & ’91). From ’91 to ’99, he was a professor at Universite de Sherbrooke. During the ’98-’99 academic year, he was a visiting researcher at the University of Aizu, Japan. Since 2000, he works at Carleton University, School of Computer Science, Canada. His current research interests are wide area ad hoc networks, underwater communications and networks, quantum communications and networks.

Contact

Prof. Dr. Marc-Oliver Pahl
email: pahlcybercni.fr

IEEE ComSoc ITC Best Paper Award 2017

I8 team awarded IEEE ComSoc ITC Best Paper Award for 2017

A team from TUM's Chair of Network Architectures and Services have been awarded the IEEE ComSoc ITC Best Paper Award 2017. This award honors the best paper in the set of IEEE ComSoc ITC sponsored conferences in 2017, namely the Global Internet, ICC NGNI, ICC Cloud Networking SAC, ITC, NetGames, NetSys, NoF, TMA, and CSNet conferences. IEEE ComSoc ITC Best Paper Award

The award has been presented at the TMA 2018 conference: TMA 2018 Award Presentation

The awarded publication, "Push Away Your Privacy: Precise User Tracking Based on TLS Client Certificate Authentication" describes privacy implications in Apple Push Notification Service (APNs), that have been discovered, thoroughly described and responsibly disclosed by a team of I8 researchers. Before publication, Apple released a fix in January 2017. CVE Apple Release Note Code & Dataset

The publicaton has previously been awarded the Best Paper Award of TMA'17: TMA'17 Award

2017-06-01 Matthias Wachs, Quirin Scheitle, Georg Carle, “Push Away Your Privacy: Precise User Tracking Based on TLS Client Certificate Authentication,” in Network Traffic Measurement and Analysis Conference (TMA), Best Paper Award TMA’17, IEEE ComSoc ITC Best Paper Award 2017, Jun. 2017. [Pdf] [Slides] [Recording] [Bib]

Kolloq. Arne Bröring, topic: Keys to Building IoT Ecosystems - Discovery, Interoperability & Composition

18 May 2018 09:30, FMI 03.07.023 (MI-Building, Campus Garching)

Abstract

This talk presents solutions and open challenges on the corner stones of the Internet of Things (IoT): discovery, interoperability and composition. While discovery of suitable IoT devices is the initial step for interaction, various technologies (e.g. via networks or directories) exist. This talk presents generic discovery patterns useful for facilitating IoT usage. Once discovered, the interface of the IoT device needs to be understood. The broad heterogeniety of these interfaces has created a further gap of interoperability. We present a generic approach that utilizes semantic models to integrate IoT devices and platforms. Finally, once devices are interoperably accessible, their composition is crucial to facilitate re-usage and higher value creation. An approach is presented that allows the definition of IoT choreographies, their instantiation as applications, and automated re-configuration at runtime. The intention of this talk is to discuss the presented solution as well as challenges identified from an industry perspective.

Bio

Arne Bröring is a Senior Researcher at Siemens’ corporate research unit in Munich (Germany). Previously, he worked as a researcher for Esri (Switzerland), the 52°North initiative, as well as the University of Münster. He has an MSc in Geoinformatics from the University of Münster and received his PhD related to IoT, Semantic Web and Sensors from the University of Twente (Netherlands). He has been one of the key designers of the Sensor Web Enablement framework at the Open Geospatial Consortium (OGC). As the chairperson of the Sensor Observation Service working group, he has co-authored multiple international standards. More recently, he has been involved in standardization at the W3C and its Web of Things group. Since 10 years, he is researching on IoT related topics, has contributed to over 70 publications, and has served on various programme committees for conferences and workshops. He has been involved in numerous research projects (FP-7, H2020) and is currently responsible for the scientific and technical coordination of the BIG IoT project (http://big-in order to.eu).

Contact

Prof. Dr. Marc-Oliver Pahl
email: pahlcybercni.fr

PAM'18: Best Paper Award

Best Paper Award at PAM 2018

The publication "In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements" has been awarded with the Best Paper Award at the Passive and Active Measurement Conference (PAM'18). The publication is the result of an international collaboration with Maciej Korczynski (Grenoble Alps University and Delft University of Technology) and Ralph Holz (University of Sydney).

The publication evaluates the security of certificate in Certificate Transparency (CT) logs. The team downloads 600 million certificate entries from 30 different CT logs and evaluates their compliance to the industry's Baseline Requirements. The Baseline Requirements define standards for HTTPS certificates and issuing processes, such as minimum key lengths or maximum duration of certificates. Additionally, the authors perform active HTTPS measurements and compare CT logs to actual deployment spanning from 2009 to 2017. Moreover, the team analyzes inclusion of non-HTTPS certificates and CT logs and provides a CT-extended IPv6 hitlist for public download.

Website of PAM 2018 Awards

IMC'17: Community Contribution Award

Community Contribution Award at IMC 2017

The publication "Mission Accomplished? HTTP Security After DigiNotar" has been awarded with the Community Contribution Award at the ACM SIGCOMM Internet Measurement Conference (IMC'17). The publication is an international collaboration with Johanna Amann (ICSI), Lexi Brent (University of Sydney) and Ralph Holz (University of Sydney).

The publication takes a look at security extensions for the HTTP Eco System that have been developed after the disruptive breach of DigiNotar in 2012. The team conducted large-scale active and passive scans of the Internet to evaluate adoption, configuration and security contributions of these novel methods. These include Certificate Transparency (CT), for making the CA system auditable; HSTS and HPKP headers, to harden the HTTPS posture of a domain; the DNS-based extensions CAA and TLSA, for control over certificate issuance and pinning; and SCSV, for protocol downgrade protection.

The IMC Community Contribution Award recognized "a paper with an outstanding contribution to the community in the form of a novel dataset, source code distribution, open platform, or other noteworthy service to the community". Website of IMC'17 Awards

MoonGen wins the Applied Networking Research Prize

Our open source packet generator MoonGen won the Applied Networking Research Prize (ANRP)! The Internet Research Task Force (IRTF) awards this prize for applied networking research that is relevant for standardization efforts and research transitioning into shipping Internet products. The ANRP prize will be awarded at the IETF-100 meeting in Singapore in November 2017. More information on the Applied Networking Research Prize.

MoonGen aims at providing a packet generator for academic use: it's programmable, fast, precise, and runs on inexpensive commodity hardware. This combination ensures that performance evaluations are reliable and reproducible without relying on expensive hardware black-boxes. Researchers can define their entire test setup and logic within a MoonGen script which can then be published together with the results. MoonGen is open source on GitHub.

2015-10-01 Paul Emmerich, Sebastian Gallenmüller, Daniel Raumer, Florian Wohlfart, Georg Carle, “MoonGen: A Scriptable High-Speed Packet Generator,” in Internet Measurement Conference (IMC) 2015, IRTF Applied Networking Research Prize 2017, Tokyo, Japan, Oct. 2015. [Pdf] [Bib]

Kolloq. Narseo Vallina-Rodriguez, topic: Dissecting the Mobile Ecosystem with the Lumen Privacy Monitor

Wednesday, 27th of September 2017, 11:00 am FMI 03.07.023 (MI-Building, Campus Garching), talk will be held in English

Abstract

As a society we have come to rely upon our mobile phones for myriad daily tasks. It is striking how little insight we, as mobile users and researchers, have into the operation and performance of our devices and network, into how (or whether) mobile apps protect the information we entrust to them, and with whom they share it. The research community (including the speaker) have energetically used a variety of approaches to gain empirical understanding of the mobile device/network ecosystem; however, these techniques have had to make trade-offs that affect either the scale, scope or granularity of measurements.

This talk describes how we leverage ideas from this prior work to design and develop the Lumen Privacy Monitor. The talk will demonstrate its utility to researchers and average users alike by providing case studies on mobile traffic characterization, identification of privacy risks inflicted by mobile apps, and perform network performance measurements.

Bio

Narseo Vallina-Rodriguez is an Assistant Research Professor at IMDEA Networks and a research scientist at the Networking and Security team at the International Computer Science Institute (ICSI) in Berkeley. Narseo received his degree in Telecommunications Engineering from the University of Oviedo in 2007, which he extended with a 6-month visit at the University of Cambridge to complete his degree dissertation. In 2008, Dr. Vallina-Rodriguez joined Vodafone R&D, returning to the University of Cambridge to complete his Ph.D. program under the supervision of Prof. Jon Crowcroft one year after. In July 2013, Dr. Vallina-Rodriguez joined ICSI in Berkeley (California) as a Post-Doc, becoming a Research Scientist and Principal Investigator one year after. During his doctoral studies Dr. Vallina-Rodriguez also interned in world-class industry research labs, such as Deutsche Telekom Labs in Berlin (Germany) and the scientific group at Telefonica Research (Spain). The outcome of his research has been awarded with a Qualcomm Innovation Fellowship in 2012, the best short-paper award at ACM CoNEXT'14, the best paper award at ACM HotMiddlebox'15 and a DataTransparencyLabs grant in 2016 for characterizing mobile tracking services with the Lumen Privacy Monitor.

Contact

Prof. Dr.-Ing. Georg Carle
phone: +49 89 289 18030
email: carlenet.in.tum.de

Kolloq. Prof. Rolf Stadler, topic: Data-driven network and cloud engineering

Friday, 14th of July 2017, 10:00 am FMI 03.07.023 (MI-Building, Campus Garching)

Abstract

We start with discussing the opportunities of using machine learning for network and cloud engineering and operation. We then focus on the specific problem of KPI estimation and present an approach that is based based upon statistical learning, whereby the behavior of a system is learned from observations. Following this approach, we collect device statistics from servers and switches on a testbed and use regression techniques to predict client-side service metrics for a video service and a key-value store. One surprising finding is that these service metrics can be predicted quite accurately using network device statistics alone.

Bio

Rolf Stadler is a professor with the Department of Network and Systems Engineering at KTH Royal Institute of Technology in Stockholm, Sweden. He holds an M.Sc. degree in mathematics and a Ph.D. in computer science from the University of Zurich. Before joining KTH in 2001, he held positions at the IBM Zurich Research Laboratory, Columbia University, and ETH Zürich. Rolf Stadler is currently EiC of IEEE TNSM. His group has made contributions to real-time monitoring, resource management, and self-management for large-scale networks and clouds. His current interests include advanced monitoring techniques, as well as data-driven methods for network engineering and management.

Contact

Prof. Dr.-Ing. Georg Carle
phone: +49 89 289 18030
email: carlenet.in.tum.de

AIMS'17: Best Paper Award

I8 team awarded Best Paper Award at AIMS 2017

A team from TUM's Chair of Network Architectures and Services has been awarded with the Best Paper Award at the "11th International Conference on Autonomous Infrastructure, Management and Security" (AIMS 2017). AIMS'17 Web Page

The publication awarded with the Best Paper Award, "Achieving Reproducible Network Environments with INSALATA" describes a framework for reproducing physical or virtual environments in a virtual testbed. The system features a flexible, modularized framework that can be extended to fit various architectures. Network environments can be automatically scanned by a collection component. They can then be described using the INSALATA network information model. Based on this description an automated setup process can be utilized to deploy the environment to a testbed. Code

2017-07-01 Nadine Herold, Matthias Wachs, Marko Dorfhuber, Christoph Rudolf, Stefan Liebald, Georg Carle, “Achieving reproducible network environments with INSALATA,” in 11th International Conference on Autonomous Infrastructure, Management and Security (AIMS’2017), Best Paper Award, Zurich, Switzerland, Jul. 2017. [Pdf] [Slides] [Bib]

Kolloq. Prof. Dr. Rute Sofia, topic: Contextual Interaction inference and characterization derived from wireless network mining

Monday, 10th of Juli 2017, 11:15am FMI 03.07.023 (MI-Building, Campus Garching), talk will be held in English

Abstract

This talk is focused on wireless network mining and on context and behavior characterization derived from the application of non-intrusive, pervasive sensing approaches in connected wireless environments. The research described in this talk goes over the development of networking solutions and mechanisms that can assist data capture and distributed inference of roaming habits in a way that may lead to social interaction stimulation (and as a consequence, to a better design of networking communication).

Related pointers:

Bio

Rute Sofia is a Senior Researcher at COPELABS, Lisbon, a private not for profit research unit fusing pervasive wireless systems and social psychology with the goal of contributing to improving well-being. She is an Associate Professor at University Lusofona, and a co-founder as well as CTO of Senception Lda, a spin-off of COPELABS, focused on wireless network mining. Since 95 she has been developing research both in an industrial environment as well as in an academic environment. She was a Senior Researcher and co-coordinator of the Internet Architectures and Networking area (IAN) of INESC TEC, Porto. Before, she was a Senior Researcher at Siemens AG Corporate Technology, Munich, focusing on aspects such as carrier grade Ethernet; QoS; IPv6. She was a Senior Researcher at Bundeswehr Universitaet Munich, focusing on QoS. She was a Visiting Scholar at University of Pennsylvania, Multimedia and Networking Lab, Philadelphia, USA, and at ICAIR, Northwestern University, Evanston, IL, USA, focusing on QoS research. She is on sabbatical leave (July 2017-September 2018), visiting the Technical University of Munich (TUM), Siemens AG Corporate Technology, and University of Lisbon as well as the portuguese National Cybersecurity Center (CNCS, Lisbon). Her sabbatical research is focused on Networked Cyber-Physical Systems, with emphasis on network mining and pervasive data analytics for wireless networks.

Contact

Prof. Dr.-Ing. Georg Carle
phone: +49 89 289 18030
email: carlenet.in.tum.de

Seminar Information Session for the IITM and FI Seminar

Seminar Information Session for the IITM and FI Seminar on 7.7.17; 16:30 in MI Hörsaal 2 (00.04.011)

The information session for the IITM and FI seminar in Winter Term 2017/18 will take place on 7.7.17; 16:30 in MI Hörsaal 2 (00.04.011)

Contact

Daniel G. Raumer, M.Sc.
phone: +49 89 289 - 18021
email: raumernet.in.tum.de

Kolloq. Panayiotis Kolios, topic: ProximAid: Proximal adhoc networking to Aid emergency response

Monday, 3rd of July 2017, 4:00 pm FMI 03.07.023 (MI-Building, Campus Garching), talk will be held in English

Abstract

After introducing the KIOS CoE and the overall vision of the center this talk will delve into a technical presentation of ProximAid. ProximAid is an innovative wireless adhoc emergency response protocol that aims to complement traditional communication means in cases of natural (fire, earthquakes) or man-made (war) disasters. Using an ad-hoc based approach introduces resilience and enables the introduction of features that are hard to get with traditional communication services. ProximAid has been implemented an as Android application that uses Wi-Fi direct to establish the ad-hoc network and run the overlay communication protocols. This work emphasizes the development of the algorithm, explains the app services, and presents challenges and future research directions.

Bio

Panayiotis Kolios received his BEng and PhD degree in Telecommunications Engineering from Kings College London in 2008 and 2011, respectively. He is currently a senior researcher at the KIOS Research Centre of the University of Cyprus, conducting both basic and applied research on networked intelligent systems. His expertise include primarily optimization for efficient monitoring and control of intelligent systems, as well as novel networking solutions for next generation applications and services.

Contact

Prof. Dr.-Ing. Georg Carle
phone: +49 89 289 18030
email: carlenet.in.tum.de

TMA'17: Best Paper Award and Best Dataset Award

I8 teams awarded Best Paper Award and Best Dataset Award at TMA 2017

Teams from TUM's Chair of Network Architectures and Services have been awarded the prices for Best Paper Award and Best Dataset Award at the 2017 "Network Traffic Measurement and Analysis Conference" (TMA'17). TMA'17 Web Page

The publication awarded with the Best Paper Award, "Push Away Your Privacy: Precise User Tracking Based on TLS Client Certificate Authentication" describes privacy implications in Apple Push Notification Service (APNs), that have been discovered, thoroughly described and responsibly disclosed by a team of I8 researchers. Before publication, Apple released a fix in January 2017. CVE Apple Release Note Code & Dataset

The publication awarded with the Best Dataset Award, "HLOC: Hints-Based Geolocation Leveraging Multiple Measurement Frameworks", develops and evalutes a novel method for the geolocation of Internet infrastructure. This approach easily integrates ready-to-use measurement frameworks such as RIPE Atlas. The dataset includes latency and location data for millions of IPv4 and IPv6 routers. Code & Dataset

2017-06-01 Quirin Scheitle, Oliver Gasser, Patrick Sattler, Georg Carle, “HLOC: Hints-Based Geolocation Leveraging Multiple Measurement Frameworks,” in Network Traffic Measurement and Analysis Conference (TMA), Best Dataset Award, Dublin, Ireland, Jun. 2017. [Pdf] [Slides] [Rawdata] [Arxiv] [Bib]
2017-06-01 Matthias Wachs, Quirin Scheitle, Georg Carle, “Push Away Your Privacy: Precise User Tracking Based on TLS Client Certificate Authentication,” in Network Traffic Measurement and Analysis Conference (TMA), Best Paper Award TMA’17, IEEE ComSoc ITC Best Paper Award 2017, Jun. 2017. [Pdf] [Slides] [Recording] [Bib]

Kolloq. Prof. Dr. Tanja Zseby, topic: Stealthy Communication Methods: Generation and Detection of Covert Channels in TCP/IP Traffic

Monday, 15th of May 2017, 2:00 pm FMI 03.07.023 (MI-Building, Campus Garching), talk will be held in English

Abstract

Covert channels conceal the information transfer between communication partners by hiding it in an existing unsuspicious data exchange. In TCP/IP traffic there are many possibilities to hide information in header fields or packet timing. Such techniques can be used by sophisticated malware for clandestine data exfiltration or to establish hidden command and control structures. The detection of covert communication is very challenging if the hidden data replicates statistical properties of classical TCP/IP communication.

In this talk a set of methods, the DAT (Descriptive Analytics of Traffic) detectors, for detecting covert channels in TCP/IP traffic are introduced. The detectors are based on lightweight statistical analysis methods and provide a collection of technique to assess the probability of covert communication in a given traffic trace. The DAT detectors are also used in the TU Wien network steganography lab as part of the Network Security Advanced class. The lab material (exercises, data, grading) is made available to other lecturers in the area of network security and data analysis.

Bio

Tanja Zseby is a full professor of communication networks and head of the Institute of Telecommunications at the Faculty of Electrical Engineering and Information Technology at TU Wien. She received her diploma degree (Dipl.-Ing.) in electrical engineering and her doctoral degree (Dr.-Ing.) from TU Berlin, Germany. Before joining TU Wien, she lediglich the Competence Center for Network Research at the Fraunhofer Institute for Open Communication Systems (FOKUS) in Berlin and worked as visiting scientist at the University of California, San Diego. Her research focus is network security, anomaly detection and secure smart grid communication.

Contact

Prof. Dr.-Ing. Georg Carle
phone: +49 89 289 18030
email: carlenet.in.tum.de

Kolloq. Christian Grothoff, topic: Big Data, Little Data, No Such Data

Thursday, 23rd of March 2017, 3:00 pm FMI 03.07.023 (MI-Building, Campus Garching), talk will be held in English

Abstract

Starting with a horrific Big Data application that literally sprung from a 1984 movie, the talk will explore the limits of Little Data analysis when it comes to fighting trolls before proposing a design for a future with No Such Data.

Supervised learning and exotic applications of cryptography abound, but not to a degree that would warrant a Top Secret classification on those grounds.

Bio

Christian Grothoff is leading the Décentralisé team at Inria Rennes. He maintains GNUnet, a network designed with the goal to provide privacy and security without the need for trusted third parties. He earned his PhD in computer science from UCLA, an M.S. in computer science from Purdue University, and a Diplom in mathematics from the University of Wuppertal.

Contact

Prof. Dr.-Ing. Georg Carle
phone: +49 89 289 18030
email: carlenet.in.tum.de

Kolloq. Dr. Ralph Holz, topic: Consensus and the network -- research directions in blockchain

Friday, 3rd of March 2017, 2:00 pm FMI 03.07.023 (MI-Building, Campus Garching), talk will be held in English

Abstract

Over the last six years, blockchains have developed into a 'mainstream' technology that entire industry sectors are talking about. The latest generation even supports smart contracts - programs that are executed by all participants and that may govern everything from simple transactions to the setup of organisations. Taking a closer look, however, we find that there is very little deployment beyond the two most prominent examples, Bitcoin and Ethereum. In this talk, we are going to look at some of the reasons: the problem of dependability and abortion of transactions, which is crucial for enterprises; the influence of the underlying network structure on transaction execution; and the problem of exploitable smart contracts. Correspondingly, we discuss some research directions that could prove fruitful in a number of systems, blockchains or beyond.

Bio

Ralph Holz is Lecturer in Networks and Security at the School of IT at the University of Sydney, where he leads the Node for Cybersecurity and Usable Security inside the Human-Centred Technologies cluster. He works closely with Data61|CSIRO, Australia's prime innovation body, and is a Visiting Fellow at the University of New South Wales. Ralph's research interest is empirical security, in particular measuring the deployment properties of critical infrastructure (including blockchains) and the effects and causes of network and routing incidents. He led the research efforts that culminated in the world's first large-scale, long- term analysis of the deployment of the Web Public Key Infrastructure. Most recently, he has turned his attention to analysing the security and dependability of blockchain networks. Ralph received his PhD from Technical University of Munich (TUM) in May 2014.

Contact

Prof. Dr.-Ing. Georg Carle
phone: +49 89 289 18030
email: carlenet.in.tum.de

Joint Meeting of the VDE/ITG Sections Network Security & IP and Mobility

Joint Meeting of the VDE/ITG Sections 5.2.2 (Network Security & 5.2.4 (IP and Mobility)

Workshop Topic: "Network and Services Security towards 5G"
Date: December 5th, 2016
Location: Technical University of Munich (TUM),
IAS Faculty Club, Lichtenbergstraße 2a, Garching, Germany

See our ITG-page for more information.

Price of the Association of German Computer Science Departments for the best Computer Science Thesis awarded to Daniel Hugenroth

Price of the Association of German Computer Science Departments for the best Computer Science Thesis awarded to Daniel Hugenroth

The price of the Association of German Computer Science Departments for the best Computer Science Thesis was awarded to the Thesis

"HRTP: A Broadcast-Based System for Unobservable Internet Telephony"

of Daniel Hugenroth (Technical University of Munich), Advisor Lukas Schwaighofer, Supervisor Prof. Dr.-Ing. Georg Carle.

The price was handed over to Daniel Hugenroth at the evening reception of the Annual Conference of the German Computer Science Society in Klagenfurt, Austria, on September 28, 2016.

The thesis was selected for this price because of its convincing breadth (formalisation, proof, implementation, validation), depth and originality (unobservable meta-data) and the societal relevance of the topic.

Author Title Type Advisors Year Links
Daniel Hugenroth HRTP: A Broadcast-Based System for Unobservable Internet Telephony MA Advisor: Lukas Schwaighofer, Supervisor: Prof. Georg Carle 2015

Kolloq. Miguel Pardal, topic: Exploring security solutions for Internet of Things and Cloud

Friday, 16th of September 2016, 10:15 am FMI 03.05.033 (MI-Building, Campus Garching)

Abstract

Miguel is exploring security solutions for Internet of Things and Cloud in his more recent work. He will present UpdaThing, a framework for IoT gateway updates; and GarlicStrap, a defense for vampire attacks in small sensors running Contiki. The SafeCloud project prototypes will also be presented, covering vulnerability-tolerant TLS, route hijacking detection and multi-path communication for security purposes.

Bio

Miguel L. Pardal is a researcher at INESC-ID in the Distributed Systems Group (GSD) and an Assistant Professor at Instituto Superior Técnico, Universidade de Lisboa. He is currently participating in the Safe Cloud EU Project (H2020) in partnership with TUM and others. During his PhD, he was a visiting student at the Auto-ID Labs at MIT. He currently has more than 30 publications and his main research interests are: Distributed Systems, Security, Internet of Things, Cloud Computing, and Enterprise Systems.

Contact

Prof. Dr.-Ing. Georg Carle
phone: +49 89 289 18030
email: carlenet.in.tum.de

Pre-course meeting iLabs: January 22, 10:30 in MI HS 2

The pre-course meeting for the "iLab" lab courses takes place on Thursday, January 22, 10:30 in MI HS 2.

Pre-course meeting seminar courses: January 21, 14:30 in room 00.07.014

The pre-course meeting for the chair's seminar courses "Future Internet" and "Innovative Internet Technologies and Mobile Communications" takes place on Thursday, January 21, 14:30 in room 00.07.014.

Student Awards at the Graduation Ceremony

At this year's Graduation Ceremony of the department for Informatics at Technische Universität München, two students who wrote their Master's Thesis at our chair received an award.

Daniel Hugenroth received the Siemens Award for completing his Master's Degree as one of the top students. In his Master's thesis he worked on a protocol for unobservable VoIP and developed a prototype for Android. [more info] The Master's Thesis written by Rainer Schönberger on the design and implementation of a high performance software router based on DPDK received the "Master Coder" Award from TNG. [more info]

The Chair of Network Architectures and Services congratulates its graduates!

Kolloq. Jörg Widmer, topic: Efficient Networking in Millimeter Wave Bands

Friday, 27th of November 2015, 10:00 am, FMI 00.12.019 (MI-Building, Campus Garching)

Abstract

State-of-the-art wireless communication already operates close to Shannon capacity and one of the most promising options to further increase data rates is to increase the communication bandwidth. Very high bandwidth channels are only available in the extremely high frequency part of the radio spectrum, the millimeter wave band (mm-wave). Upcoming communication technologies, such as IEEE 802.11ad, are already starting to exploit this part of the radio spectrum to achieve data rates of several GBit/s. However, communication at such high frequencies also suffers from high attenuation and signal absorption, often restricting communication to line-of-sight (LOS) scenarios and requiring the use of highly directional antennas. This in turn requires a radical rethinking of wireless network design. On the one hand side, such channels experience little interference, allowing for a high degree of spatial reuse and potentially simpler MAC and interference management mechanisms. On the other hand, such an environment is extremely dynamic and channels may appear and disappear over very short time intervals, in particular for mobile devices. This talk will highlight some of the challenges of and possible approaches for networking in the mm-wave band.

Bio

Joerg Widmer is Research Professor at Institute IMDEA Networks in Madrid, Spain. He received his M.S. and PhD degrees in computer science from the University of Mannheim, Germany in 2000 and 2003, respectively. His research focuses primarily on wireless networks, ranging from extremely high frequency millimeter-wave communication and MAC layer design to mobile network architectures. From 2005 to 2010, he was manager of the Ubiquitous Networking Research Group at DOCOMO Euro-Labs in Munich, Germany, leading several projects in the area of mobile and cellular networks. Before, he worked as post-doctoral researcher at EPFL, Switzerland on ultra-wide band communication and network coding. He was a visiting researcher at the International Computer Science Institute in Berkeley, CA, USA and University College London, UK. Joerg Widmer authored more than 100 conference and journal papers and three IETF RFCs, holds 13 patents, serves on the editorial board of IEEE Transactions on Communications, and regularly participates in program committees of several major conferences. Recently he was awarded an ERC consolidator grant as well as a Spanish Ramon y Cajal grant. He is senior member of IEEE and ACM.

Contact

Prof. Dr.-Ing. Georg Carle
phone: +49 89 289 18030
email: carlenet.in.tum.de

Vortrag & Live Hack: IT-Security Awareness

Freitag, 23. Oktober; 14:30; HS 2; FMI Gebäude

Im Rahmen unseres Proseminars Network Hacking laden wir herzlich zu dem öffentlichen Talk zum Thema IT-Security Awareness unseres Gastredners Andreas Rieb von der Firma brainsecurity ein. Der Talk wird durch einige Live Hacks ergänzt.

Themen:

  • Social Engineering und Information Leakage
  • Password Attacks
  • Phishing mit Hardware
  • Bad USB Devices
  • Linux Rootkits

Anschließend ist Zeit für eine Diskussion mit dem Vortragenden.

Kolloq. Prof. James Sterbenz, topic: Multilevel Resilient Topology, Transport and Routing for the Future Internet

Wednesday, October 7h 2015, 15:00 pm, FMI 03.07.023 (MI-Building, Campus Garching)

Abstract

As the Internet becomes increasingly important to all aspects of society, the consequences of disruption are increasingly severe. Thus it is critical to increase the resilience and survivability of the future networks in general, and the Internet in particular. We define resilience as the ability of the network to provide desired service even when the network is challenged by attacks, large-scale disasters and other failures. Resilience subsumes the disciplines of survivability, fault-tolerance, disruption-tolerance, traffic-tolerance, dependability, performability and security. This presentation will provide a brief introduction to the disciplines and challenges to network resilience and to our ResiliNets strategy for resilient network design. Then this presentation will describe the complex multilevel structure of the Internet topology, along with complex-systems analysis and heuristics to improve infrastructure resilience under cost constraints. Then this presentation will describe ongoing work in the design and analysis of a new composable, cross-layered resilient transport (ResTP) and geodiverse multipath routing protocol (GeoDivRP). These protocols are designed to are being developed to provide resilience and survivability in the face of targeted attacks and large-scale disasters to the network infrastructure.

Bio

James P.G. Sterbenz is Professor of Electrical Engineering & Computer Science and a member of technical staff at the Information & Telecommunication Technology Center at The University of Kansas, is a Visiting Professor of in the School of Computing and Communications in InfoLab 21 at Lancaster University in the UK, an adjunct professor in the Computing Department at The Hong Kong Polytechnic University and has been a Visiting Guest Professor in the Communication Systems Group at ETH Zürich. He has previously held senior staff and research management positions at BBN Technologies, GTE Laboratories and IBM Research. His research interests include resilient, survivable and disruption tolerant networking, future Internet architectures, active and programmable networks and high-speed networking and components. He is the director of the ResiliNets Research Group and has been PI in a number of projects including the NSF FIND and GENI programs, the EU FIRE ResumeNet project, leads the GpENI international programmable network testbed project and has lead a US DoD project in highly-mobile ad hoc disruption-tolerant networking. He received a DSc in computer science from Washington University in 1991. He has been program chair for IEEE GI, GBN and HotI; IFIP RNDM, IWSOS, PfHSN and IWAN; and was on the editorial board of IEEE Network. He is principal author of the book High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication.

Contact

Prof. Dr.-Ing. Georg Carle
phone: +49 89 289 18030
email: carlenet.in.tum.de

Kolloq. Prof. Martin Reisslein, topic: Recent Advances in Access and Sensor Networking

Thursday, 23rd of July 2015, 14:00 pm, FMI 00.12.019 (MI-Building, Campus Garching)

Abstract

In this presentation, I will give an overview of recent advances in access and sensor networking in my group at ASU. In the area of access networks involving an optical fiber component, we have recently completed extensive studies on passive optical networks (PONs) as well as fiber-wireless (FiWi) access networks. Presently, we are examining the combination of high-speed PON access networks with slower-speed digital subscriber line (DSL) networks.

In the area of purely wireless access networks, we have analyzed the connection establishment in LTE-A networks. We found that for access systems with a long timeout and high barring probability, the numbers of user equipment (UE) nodes participating in random access contention in successive slots tend to Poisson process, irrespective of the arrival process (e.g., even for Markov Modulated Poisson Process arrivals).

In the area of sensor networks, we are working on developing a complete video sensor network solution ranging from the sensor node platform to the application layer streaming protocol. I will briefly outline a novel Wireless Sensor Node Platform (WSNP) approach to Dynamic Adaptive Streaming over HTTP (DASH).

Bio

Martin Reisslein is a Professor in the School of Electrical, Computer, and Energy Engineering at Arizona State University, Tempe. He received the Dipl.-Ing. (FH) degree from the Fachhochschule Dieburg, Germany, in 1994, and the M.S.E. degree from the University of Pennsylvania, Philadelphia, in 1996. Both in electrical engineering. He received his Ph.D. in systems engineering from the University of Pennsylvania in 1998. During the academic year 1994-1995 he visited the University of Pennsylvania as a Fulbright scholar. From July 1998 through October 2000 he was a scientist with the German National Research Center for Information Technology (GMD Fraunhofer FOKUS), Berlin and lecturer at the Technical University Berlin. From October 2000 through 2005 he was an Assistant Professor and from 2005 through 2011 he was an Associate Professor at ASU.

Martin Reisslein has published over 120 journal articles and over 60 conference papers in the areas of multimedia networking over wired and wireless network, video traffic characterization, optical networking, and engineering education. His Google Scholar h-index is 39, and his ISI Web of Science h-index is 21. He received the NSF Career Award in 2002. He served as Editor-in-Chief of the IEEE Communications Surveys and Tutorials from January 2003 through February 2007, and serves currently as Associate EiC for this journal. He served as Associate Editor for the IEEE/ACM Transactions on Networking (2009-2013), and currently serves as Associate Editor for Computer Networks (Elsevier), Optical Switching and Networking (Elsevier), the Journal of Communications and Networks, and the IEEE Transactions on Education. He has served on the Technical Program Committees of IEEE Infocom, IEEE Globecom, and IEEE ICC. He is a Fellow of the IEEE (Class of 2014) and a Senior Member of the ACM.

Contact

Prof. Dr.-Ing. Georg Carle
phone: +49 89 289 18030
email: carlenet.in.tum.de

Kolloq. Jörg Liebeherr, topic: Adaptive Protocols for Adaptive Networks

22nd of July 2015, 12:00, FMI 00.12.019 (MI-Building, Campus Garching), this talk will be held in English

Abstract

Self-organizing networks have emerged as a powerful paradigm for providing network services. Unlike traditional infrastructure-based networks, self-organizing networks are formed and operated in a fully distributed manner, and do not rely on centralized mechanisms for network formation, management, or operation. Compared to conventional networks, self-organizing networks are better suited to adapt to changes of network topology, traffic mix, and service requirements. This talk will make a case that self-organizing networks are suitable to dynamically adapt network services offered to applications. We present our recent efforts on developing mechanism to deploy customizable data delivery services. In our approach, a data delivery service is expressed in terms of an XML specification, which defines a finite-state machine for the service. Network nodes dynamically load a service specification and instantiate finite-state machines on-demand without the need to update the protocol implementation. An evaluation of these mechanisms in the HyperCast overlay middleware, sheds light on the performance tradeoffs of the approach.

Bio

Jörg Liebeherr received the Ph.D. degree in Computer Science from the Georgia Institute of Technology in 1991. After a Postdoc at the University of California, Berkeley, he joined the Department of Computer Science at the University of Virginia in 1992. Since Fall 2005, he is with the Department of Electrical and Computer Engineering of the University of Toronto. He has served on editorial boards and organization committees of several journals and conferences in computer networking. He was Editor-in-Chief of IEEE Network in 1999-2000. He is a co-author of the textbook ``Mastering Networks: An Internet Lab Manual'', published by Addison-Wesley in 2004. He was co-recipient of a best paper award at ACM Sigmetrics 2005. He served on the Board of Governors of the IEEE Communications Society in 2003-2005. He was Co-chair of ACM CoNext 2009 and ACM Sigcomm 2011. He is a Fellow of the IEEE. His current research interests are self-organizing networks and network calculus.

Contact

Prof. Dr.-Ing. Georg Carle
phone: +49 89 289 18030
email: carlenet.in.tum.de

Prof. Dr.-Ing. Eike Jessen * 28. August 1933, † 18. März 2015

Prof. Dr.-Ing. Eike Jessen * 28. August 1933, † 18. März 2015

Die Nachricht vom Tode von Prof. Dr.-Ing. Eike Jessen, der von 1983 bis 2001 Inhaber des Lehrstuhls Informatik 8 der TU München war, traf uns schmerzlich. Die Welt ist um einen wunderbaren Menschen ärmer geworden, der mit seiner beispielhaften Haltung vielen ein Vorbild war.

Im Namen des gesamten Lehrstuhls

Georg Carle

Man lebt zweimal:
das erste Mal in der Wirklichkeit,
das zweite Mal in der Erinnerung.
                          Honoré de Balzac

trauer.sueddeutsche.de/Traueranzeige/Eike-Jessen

Kolloq. Deep Medhi, topic: Optimal Standby Virtual Routers Selection for Node Failures in a Virtual Network Environment

13.3.2014 14: FMI 00.12.019 (MI-Building, Campus Garching). This talk will be held in English

Abstract

Network virtualization allows flexibility to configure virtual networks in a dynamic manner. In such a setting, to provide resilient services to virtual networks, we consider the situation where the substrate network provider wants to have standby virtual routers ready to serve the virtual networks in the event of a failure. Such a failure can affect one or more virtual routers in multiple virtual networks. The goal of our work is to make the optimal selection of standby virtual routers so that virtual networks can be dynamically reconfigured back to their original topologies after a failure. We present an optimization formulation and a heuristic for this problem. By considering a number of factors, we present numerical studies to show how the optimal selection is affected, and the results showed that the proposed heuristic's performance was close to the optimization model when there are sufficient standby virtual routers for each virtual networks and the substrate nodes have capability to support multiple standby virtual routers to be in service concurrently. We also report on an experimental study with a wide-area virtual network platform.

Contact

Prof. Dr.-Ing. Georg Carle
phone: +49 89 289 18030
email: carlenet.in.tum.de

Mit Peeroskop auf der CeBIT

Der Lehrstuhl für Netzarchitekturen und Netzdienste ist vom 15.03. bis 19.03. mit dem Projekt Peeroskop am BMBF-Stand auf der CeBIT vertreten.

Weitere Details finden sich auf den Seiten des BMBF: www.bmbf.de/de/messen.php

Kolloq. Dr. Pavel Laskov, topic: Detection of Advanced Persistent Threats

10.11.2014, 14:00, FMI 00.12.019 (MI-Building, Campus Garching). This talk will be held in English

Abstract

Many recent high-profile security incidents have been categorized as "Advanced Persistent Threats" (APT). Their characteristic features include exploitation of previously unknown vulnerabilities and sophisticated social engineering carefully tailored to a specific recipient. To mitigate the growing risk of APT attacks arising from the economic and political motivation, novel detection methodology must be developed to complement the traditional signature-based techniques. In this talk, I will review the key features of APT and discuss the technical challenges arising in their detection. In particular, I will focus on methods for retrospective identification of 0-day attacks and evasion-resistant detection of malicious PDF documents commonly used for delivery of APT attacks. As an outlook, I will discuss potential architectures for security products which should provide adequate protection against APT.

Bio

Pavel Laskov graduated from the Moscow Institute of Radio, Electronics and Automation (Russia) in 1994 with a diploma in computer engineering. He received a M.Sc. and a Ph.D. in computer science from the University of Delaware (Newark, DE, USA) in 1996 and 2001 respectively. From 2001 to 2010 he was a senior researcher at the Fraunhofer Institute FIRST in Berlin. In 2004 he started investigation of machine learning methods for intrusion detection and has lead the development of a self-learning intrusion detection system ReMIND. From 2009 to 2014 he was a Heisenberg Fellow of the German Science Foundation at the University of Tuebingen. In September 2014 he joined Huawei's European Research Center in Munich as the head of the Security Product Innovation Team responsible for advanced architectural and technological design of security products. His research interests span intrusion detection, static and dynamic malware analysis, applications of machine learning and big data to security and many other related topics.

Contact

Prof. Dr. Ralph Holz
email: ralphralphholz.science

Christopher Palow, topic: Facebook¹s Anti-Phishing System

6.11.2014, 16:00, Interims Hörsaal 2 (Campus Garching, Boltzmannstr. 5 this talk will be held in English

Abstract

Facebook prevents and mitigates many forms of abuse from a variety of actors most commonly focused on making money. Facebook's Site Integrity team combats these abuses in order to protect people using the service. This talk outlines the anti-phishing system at Facebook protecting the logins of the 1.35 billion people who visit Facebook every month. #Bio Christopher Palow leads engineering teams at Facebook's London office focused on account security. Over the past seven years Chris has focused on stopping abuse on Facebook from phishing, fake accounts, malware, and various other scams through various detection and response systems. Prior to joining Facebook Chris spent two years each at MITRE and Crossbeam Systems working on the Linux kernel in the networking stack. Chris graduated with a BS & MS from CMU.

Contact

Prof. Dr.-Ing. Georg Carle
phone: +49 89 289 18030
email: carlenet.in.tum.de

Vortrag: "Cyber Crime"

Vortrag zum Thema

Cyber Crime

 

Sprecher:

Günter Seibold

Dezernatsleiter Cyber Crime LKA Bayern

 

Inhalt:

Internetvergehen und Möglichkeiten zu deren Verfolgung

Zeit und Ort:

 

24.10.2014

14:14

HS2 FMI Gebäude

iLab: Research Experience (ilab2): Places available

We have two places left for the iLab: Research Experience (ilab2). If you are interested contact <%= protected_email("ilab2@net.in.tum.de")%.

Dimitri Papadimtriou "Analytical methods in system analysis"

18.9.2014, 2:00 pm, FMI 03.05.033 (MI-Building, Campus Garching), this talk will be held in English Abstract: Predictive simulations provide insight into the physics that drive complex systems enabling identification of key mechanisms and allows for rigorous and robust optimization/design. However, predictive simulation requires careful assessment of all sources of numerical errors (discretization, resolution, etc.) and uncertainty (sampling, model parameters and equations, etc.) in particular, when aleatory (inherent to the variability present in system and its surroundings) and irreducible. Uncertainty propagation methods quantifies uncertainties in system output from all sources of input uncertainty by means of computational model (forward uncertainty propagation), determines which uncertainties contribute the most to output uncertainties (sensitivity analysis) and characterizes uncertainty. In turn, uncertainty quantification assists in model prediction (interpolation, extrapolation, etc.) and thus decision making. In this context, validation (process of determining the degree to which a model is an accurate representation of the real world for) of computational models for establishing confidence in model predictions plays a fundamental role. While predictive methods are mostly based on sampling, this talk investigates the use of analytical methods (such as reliability methods) to compute the probability of failure of structural systems.
contact person:
Heiko Niedermayer
phone: +49.89.289.18012
Email: niedermayernet.in.tum.de

Kolloq. Nasko Oskov, topic: Browser security in Google Chrome

Tuesday, 29th of July 2014, 1:00 pm,  FMI 03.07.023 (MI-Building, Campus Garching) this talk will be held in English

Abstract: This talk will explore the current state of web browser security. It will cover the basic design architecture behind the Chromium browser, what has been done to make it harder to attack and exploit, the different approaches the security team takes and more. Security is a road with no end in sight, but the talk will discuss ongoing projects to further improve in the future.

Bio: Nasko Oskov is a security engineer working on the Chromium browser. He has spent most of his energy on the defensive side of computer security working on the building blocks of technology - operating systems, authentication protocols, and now browsers.


contact person:
Ralph Holz
phone: +49.89.289.18043
Email: holznet.in.tum.de

Kolloq. Dr. Paulo Mendes, topic: Impact of Human Behavior on Social Opportunistic Forwarding

22.7.2014, 2:00 pm, FMI 00.12.019 (MI-Building, Campus Garching), this talk will be held in English Abstract: The current Internet design is not capable of supporting communications in environments characterized by very long delays and frequent network partitions. To allow devices to communicate in such environments, delay-tolerant networking solutions have been proposed by exploiting opportunistic message forwarding, with limited expectations of end-to-end connectivity and node resources. However, such proposals present two major drawbacks: first, they ignore the impact that human behavior has on the dynamics of the network; and second, they focus on low density scenarios. This talk presents a study about the impact that human behavior has on opportunistic forwarding showing: i) that performance can be improved by taking the dynamics of the network into account; and ii) to show that delay-tolerant networking can also be used to reduce communication costs in networks with high density by considering the users' behavior. Bio: Paulo Mendes is the vice-director of the Cognition and People centric computing Research Center (COPELabs) at University Lusofona, where he is associated professor, and director of the Ph.D program on Informatics - New Media and Pervasive Systems (NEMPS). In 2004 he got his Ph.D. degree in Informatics Engineering from the University of Coimbra, having performed his Ph.D. thesis work as a visiting Scholar at Columbia University, New York. Before COPELABS, Paulo was a senior researcher at NTT DOCOMO Euro-labs for 4 years, and a research coordinator at the portuguese research lab INESCTEC for 3 years. The publication record includes over 100 scientific articles, 14 international patents, and contributions of IETF.
contact person:
Georg Carle
phone: +49.89.289.18030
Email: carle@net.in.tum.de

Kolloq. Rebekah Overdorf, topic: Blogs, Comments, and Twitter Feeds: A Study of Domain Adaptation in Stylometry

15.7.2014, 2:00 pm, FMI 03.07.023 (MI-Building, Campus Garching), this talk will be held in English

Abstract: Stylometry is a form of authorship attribution that relies on the linguistic information found in documents. This paper focuses on the cross-domain case where the known and suspect documents differ in what setting they were created in. These domains include Twitter feeds, blog entries, Reddit comments, and emails. We determine that state-of-the-art methods in stylometry do not perform as well in cross-domain situations as they do in in-domain situations and propose a method that increases the accuracy in the cross-domain setting. We are able to improve the accuracy of cross-domain stylometry to as high as 80%. Being able to identify authors across domains facilitates linking identities across the Internet making this a key security and privacy concern; users can take other measures to ensure their anonymity, but due to their unique writing style, they may not be as anonymous as they believe.
contact person:
Christian Grothoff
phone: +49.89.289.18040
Email: grothoff@net.in.tum.de

Kolloq. Peter Schaar, topic: Technik, Recht und Überwachung

7.7.2014, 6:00 pm, FMI 00.02.001 (MI-Building, Friedrich L. Bauer Hörsaal, Campus Garching), this talk will be held in German

Abstract: Überwachung gibt es bereits seit Jahrhunderten. Aber erst das Internet und die umfassende Digitalisierung ermöglichen eine Totalüberwachung in Echtzeit. Im Vortrag geht es um die Frage, was dagegen unternommen werden kann. Bio: Vorsitzender der Europäischen Akademie für Informationsfreiheit und Datenschutz, Lehrbeauftragter an der Universität Hamburg, 2003-2013 Bundesbeauftragter für den Datenschutz und die Informationsfreiheit. Buchveröffentlichungen: Datenschutz im Internet (2002), Das Ende der Privatsphäre - Der Weg in die Überwachungsgesellschaft (2007), Total überwacht - Wie wir in Zukunft unsere Daten schützen (2014). Auszeichnungen: Preis der Friedrich-Ebert-Stiftung „Das politische Buch 2008“ für sein Werk Das Ende der Privatsphäre; „eco Internet AWARD 2008“ der deutschen Internetwirtschaft, „Deutscher Datenschutzpreis“ der Gesellschaft für Datenschutz und Datensicherheit (GDD) 2013; “Louis D. Brandeis Privacy Award 2014” der US-Patientenrechteorganisation Patients Privacy Rights.
contact person:
Christian Grothoff
phone: +49.89.289.18040
Email: grothoff@net.in.tum.de

Proseminar Vorbesprechung

Die Vorbesprechung des diesjährigen Proseminars "Network Hacking und Abwehr" findet am 27.06.2014 um 13:00 in Raum 03.07.023 statt. Dauer ca. 30 Minuten.

Neben einer Vorstellung der wichtigsten Spielregeln werden wir kurz Themen vorstellen. Eine Vergabe erfolgt erst nach den Semesterferien. Der Zeitpunkt der Vergabeveranstaltung wird noch bekannt gegeben.

Smart Space Orchestration Hands-On | 9h00# @LRZ (copy 1)

Go to the event page: here.

Kickoff iLab2 | 10h00# @room 03.07.023

If you want to participate in the iLab² practical exercise joining this meeting is mandatory as we will build the teams and schedule your lab slots.

The first meeting will not only be used for administrative things but we will get right into the topic. First we will do a recap of static and dynamic routing followed by a lecture about the Border Gateway Protocol.

If you did not register for the exercise yet please do so here.

Kolloq. Various, topic: Network of Excellence in Internet Science EINS Advisory Committee Talks

Mon 25 Nov 9:15 am, LRZ lecture hall (HE 009, LRZ Building, Garching)

Abstract:

This session consists of three talks of 30 minutes each. The first talk, by Barry Wellman, has the topic:  “Triple revolution: the intersection of social network analysis,   the far-flung personalized internet, and the mobile revolution”. The second speaker, David Clark, will talk about   “Evaluating Network Architectures”. Finally, Marcelo Thompson will give a presentation entitled   “The (Moral) Responsibility of Internet Intermediaries”.

 

Bio Berry Wellman: Professor Barry Wellman studies networks: community, communication, computer, and social.  His research examines virtual community, the virtual workplace, social support, community, kinship, friendship, and social network theory and methods.  Based at the University of Toronto, he directs NetLab at the Faculty of Information, is the former S.D.  Clark Professor at the Department of Sociology, and is a member of the Cities Centre and the Knowledge Media Design Institute.  Wellman is the co-author of the prize-winning Networked: The New Social Operating System (with Lee Rainie, Director of the Pew Internet and American Life Project) published by MIT Press in Spring 2012.  The book analyzes the social nature of networked individualism, growing out of the Social Network Revolution, the Internet Revolution, and the Mobile Revolution.

 

Bio David Clark: David Clark is a Senior Research Scientist at the MIT Computer Science and Artificial Intelligence Laboratory, where he has worked since receiving his Ph.D. there in 1973.  Since the mid 70s, Dr. Clark has been leading the development of the Internet; from 1981-1989 he acted as Chief Protocol Architect in this development, and chaired the Internet Activities Board.  His current research looks at re-definition of the architectural underpinnings of the Internet, and the relation of technology and architecture to economic, societal and policy considerations.  He is helping the U.S. National Science foundation organize their Future Internet Design program.  Dr. Clark is past chairman of the Computer Science and Telecommunications Board of the National Academies, and has contributed to a number of studies on the societal and policy impact of computer communications.  He is co-director of the MIT Communications Futures Program, a project for industry collaboration and coordination along the communications value chain.

 

Bio Marcelo Thompson: Marcelo Thompson is an Assistant Professor of Law and Deputy Director of the LLM in Information Technology and Intellectual Property Law at the Faculty of Law, The University of Hong Kong.  Courses Marcelo teaches or has taught at HKU include “Law and Society”, “Legal Theory”, “Privacy and Data Protection” and “Regulation of Cyberspace”.  Marcelo's core research interests lie in the intersection between law, political theory and the study of technological change.  He is particularly interested in what the entrenchment of new forms of normativity in the design of the information environment means for the life of law and politics in the 21st century.

 

contact persons:
Georg Carle
phone: +49.89.289.18030
Email: carlenet.in.tum.de

Heiko Niedermayer
phone: +49.89.289.18012
Email: niedermayernet.in.tum.de

Kickoff iLab2 | 10h00# @room 03.07.023

If you want to participate at the practical exercise please join the first meeting as we will build the teams and schedule your lab slots then.

The first meeting will not only be used for administrative things but we will right get into the topic by reminding you to the world of static routing.

If you did not register for the exercise yet please do so here.

Info Meeting Proseminar "Network Hacking"

The first info meeting of this winter term's Proseminar "Network Hacking" will take place at

* 05.07.2013 * 13:00 (s.t.) * Room 03.07.023

More information and online registration at the Proseminar Homepage.

Kolloq. Prof. Dr. Biersack, topic: HybridNN -- An accurate and scalable network location service based on the inframetric model

HybridNN: An accurate and scalable network location service based on the inframetric model

Abstract: Locating servers that have shortest interactive delay towards an Internet host provides an important service for large-scale latency sensitive networked applications, such as VoIP, online network games, or interactive network services on the cloud. Existing algorithms assume that the delay space is a metric space, which implies that the delay between two nodes is symmetric and the triangle inequality holds. In practice, the delay space is not metric, which lowers the accuracy of metric-based algorithms. We develop a new scheme whose theoretical foundation is based on the inframetric model, which has weaker assumptions than the metric model. We prove that the location requests can be completed efficiently if the delay space exhibits modest inframetric dimensions, which we can confirm empirically. Finally, we propose HybridNN (Hybrid N earest Service N ode Location) that finds the closest service node accurately thanks to the inframetric model and scalably by combining delay predictions with direct probes to a pruned set of neighbors. Simulation results show that HybridNN locates in nearly all cases the true nearest service nodes. Experiments on PlanetLab show that with modest query overhead and maintenance traffic HybridNN can provide accurate nearest service nodes that are close to optimal. This is joint work with Y. Fu and Y. Wang from National University of Defense Technology, Hunan province, 410073, China Bio: Ernst Biersack studied computer science at the Technische Universität München and at the University of North Carolina at Chapel Hill. He received the Dipl. Infom. (M.S.) and Dr. rer. nat. (Ph.D.) degrees in computer science from the Technische Universität München, and the Habilitation à Diriger des Recherches from the University of Nice, France. From March 1989 to February 1992, he was a Member of Technical Staff with the Computer Communications Research District of Bell Commu- nications Research, Morristown, US. Since March 1992, he has been a Professor in telecommunications at Eurecom, Sophia Antipolis, France. His current research is on peer-to peer systems and network tomography.

Kickoff iLab1 | 16h00# @room 00.13.009A

If you want to participate at the practical exercise please join the first meeting as we will build the teams and schedule your lab slots then.

 

Kickoff iLab2 | 10h00# @room 03.07.023

If you want to participate at the practical exercise please join the first meeting as we will build the teams and schedule your lab slots then.

The first meeting will not only be used for administrative things but we will right get into the topic by reminding you to the world of static routing.

If you did not register for the exercise yet please do so here.

Kickoff Hauptseminar ACN2013 | 18h00# @room 03.07.023

In summer term 2013 we will introduce a new form of seminar. The ACN2013 will be organised like a conference. You will submit and review a paper, you will defend it against the reviewer's comments, you will moderate a talk, and your talk will be recorded so that you can improve your style by watching yourself.

Have a look at the conference page and come to the kickoff!

Anmeldung zu den Seminaren im SS 13 - Kickoff 28.1.13, 15:30 p.m. @ 03.07.023

Wie jedes Semester bietet der Lehrstuhl wieder folgende Masterseminare an:

  1. Future Internet - FI (Blockveranstaltung 11.-12.04.2013, ganztägig)
  2. Innovative Internettechnologien und Mobilkommunikation - IITM (wöchentlich freitags 14:00-16:00 Uhr)

Die Hauptseminarsprache ist jeweils Deutsch. Die angebotenen Themen sind herausvordernd und setzen teilweise Vorwissen voraus. In den Seminaren können sowohl deutsche als auch englische Vorträge gehalten und Ausarbeitungen abgegeben werden. Jeder Student kann die Sprache selber wählen!

Informationsveranstaltungen finden wie folgt statt:

 

28.01.2013 - 15:30-17:30 Uhr, FMI 03.07.023
  • Seminar Future Internet inkl. Themenvergabe
  • Seminar Innovative Internettechnologien und Mobilkommunikation (weitere Veranstaltung am 19.04.2013 mit Themenvorstellung und Themenvergabe)

 

Um einen groben Überblick über die Anzahl der Interessenten zu bekommen, bitten wir um eine unverbindliche Anmeldung zu den Seminaren:

  • Anmeldung Future Internet
  • Anmeldung IITM

Erst wenn Sie ein Thema gewählt und zugeteilt bekommen haben, ist die Teilnahme bindend.  Sie können gerne zur Infoveranstaltung erscheinen, auch wenn Sie sich noch nicht sicher sind, ob Sie wirklich am Seminar teilnehmen möchten. Unser Lehrstuhl freut sich, Sie bei der Informationsveranstaltung und später auch im Seminar begrüßen zu dürfen und Ihnen einen Einblick in unsere Forschungsgebiete geben zu können.

Folien online / Ankündigung Vortrag "Eine kleine Historie der IT-Sicherheit: Von den (Mainframe-) Dinosauriern bis zur Cloud."

Wir freuen uns Sie zu einen weiteren Vortrag im Rahmen unseres Proseminars Network Hacking einladen zu dürfen. In diesem Jahr haben wir einen Sprecher gewonnen, der bereits in den 80er Jahren als IT Security Experte aktiv war. Herr Kurth wirkte u.A. beim bekannten "KGB-Hack" (http://de.wikipedia.org/wiki/KGB-Hack) als Ermittler mit. Heute ist Herr Kurth wissenschaftlicher Leiter beim Münchener IT-Security Spezialisten atsec.

Der Vortrag wird wie folgt stattfinden:

Freitag, 19. Oktober 2012, 14:30 - 16:30 Uhr Ivar-Ugi-Hörsaal, Laborgebäude CH 2

Wir freuen uns - trotz des weiten Fußwegs bis zur Chemie - auf Ihr zahlreiches Erscheinen und einen interessanten Vortrag.

 

Update: 

Die Materialien zum Vortrag sind hier zu finden!

Kickoff iLab2 | Oct 18 @ 10:15 | room 03.07.023

If you want to participate at the practical exercise please join the first meeting as we will build the teams and schedule your lab slots then.

The first meeting will not only be used for administrative things but we will right get into the topic by reminding you to the world of static routing.

If you did not register for the exercise yet please do so here.

Talk by Richard Stallman| Jul 11 18:00 | MW 2001

Richard Stallman will be visiting us in Munich in mid-July.On July 11th at 18:00 he will give a public talk in English on "Copyright vs. Community" at the Technische Universität München.

The talk will be in the "Rudolf-Diesel" Hörsal "MW 2001" on the Campus Garching. The talk is open to the public and attendance is free. Registration is not required, but you can register with the Free Software Foundation for notifications about related activities here.

Summary

Copyright developed in the age of the printing press, and was designed to fit with the system of centralized copying imposed by the printing press. But the copyright system does not fit well with computer networks, and only draconian punishments can enforce it. The global corporations that profit from copyright are lobbying for draconian punishments, and to increase their copyright powers, while suppressing public access to technology.

This applies to scientific publishing too: scholarly articles must permit redistribution and remix for the good of science. We must strip the journal publishers of the power to prevent this.

If we seriously hope for copyright to serve its only legitimate purpose --to promote progress, for the benefit of the public-- then we must make changes in the other direction.

About the Speaker

Richard Stallman launched the free software movement in 1983 and started the development of the GNU operating system in 1984. GNU is free software: everyone has the freedom to copy it and redistribute it, with or without changes. The GNU/Linux system, basically the GNU operating system with Linux added, is used on tens of millions of computers today. Stallman has received the ACM Grace Hopper Award, a MacArthur Foundation fellowship, the Electronic Frontier Foundation's Pioneer Award, and the the Takeda Award for Social/Economic Betterment, as well as several honorary doctorates.

 

Talk Internet Censorship and the Tor network

Invitation to a "TUM Informatik-Kolloquium"
Internet Censorship and the Tor network Speaker: Jacob Applebaum University of Washington Date: Tuesday, 7th of February 2012, 6:30pm Location: FMI Interimshörsaal 2(Campus Garching, Boltzmannstr. 5) This talk will be held in English

Abstract: Internet censorship as done by governments is a very real problem faced by many people all over the planet. This is a lecture about who censors and why they censor. Specifically, the talk covers how governments and corporations attempt to censor access to the Tor anonymisation network and to what lengths governments have gone to stop Tor as a way to communicate safely with the outside world. The talk will cover some real world examples that the Tor network has faced and continues to face and it will discuss deployed solutions and provide a forum for discussion of possible future developments. Speaker's bio: Jacob Appelbaum is a computer security researcher currently employed by the University of Washington. He is also a core member of the Tor project. He is a founding member of the hacklab Noisebridge in San Francisco where he indulges his interests in magnetics, cryptography and consensus based governance. He was a driving force in the team behind the creation of the Cold Boot Attacks; winning both the Pwnie for Most Innovative Research award and the Usenix Security best student paper award in 2008. Contact persons:
Christian Grothoff
phone: 089/ 289-18032
Email: grothoffnet.in.tum.de

"Live Hacking" Demo & Talk

Im Rahmen unseres Proseminars "Network Hacking & Abwehr" leden wir regelmäßig Redner aus der Industrie ein, um unseren Studenten praxisrelevantes Wissen zu vermitteln und Kontakt zur Wirtschaft zu schaffen. Wir konnten den aus TV und Presse bekannten IT-Sicherheitsexperten Herrn Sebastian Schreiber von der Syss GmbH als Redner gewinnen. Herr Schreiber wird einen lehrreichen und unterhaltsamen Vortrag über Angriffe auf Geräte, Dienste und Netzwerke halten. Nach dem Vortrag laden wir die interessierten Gäste zur Diskussion ein.

Zeit: Freitag, 3.2.2012 um 14:30 (bis ca. 16:30) Ort: Interimshörsaal 1

Anmeldung zu den Seminaren im SS 12 freigeschaltet (copy 1)

Wie jedes Semester bietet der Lehrstuhl wieder folgende Masterseminare an:

  1. Future Internet - FI (Blockveranstaltung 12.-13.04.2012, ganztägig)
  2. Innovative Internettechnologien und Mobilkommunikation - IITM (wöchentlich freitags 14:00-16:00 Uhr)
  3. Aerospace Networks (abhängig von Teilnehmeranzahl wöchentlich oder Blockveranstaltung)
  4. Sensorknoten: Betrieb, Netze & Anwendungen (Blockveranstaltung 23.-24.07.2012)

Die Hauptseminarsprache ist jeweils Deutsch. Die angebotenen Themen sind herausvordernd und setzen teilweise Vorwissen voraus. In den Seminaren können sowohl deutsche als auch englische Vorträge gehalten und Ausarbeitungen abgegeben werden. Jeder Student kann die Sprache selber wählen!

Informationsveranstaltungen finden wie folgt statt:

 

24.01.2012 - 12:00-14:00 Uhr, FMI 03.07.023
  • Seminar Future Internet inkl. Themenvergabe
  • Seminar Aerospace Networks inkl. 1. Themenvergabe
  • Seminar Innovative Internettechnologien und Mobilkommunikation (weitere Veranstaltung am 20.04.2012 mit Themenvorstellung und Themenvergabe)

 

31.01.2012 - 12:00-14:00 Uhr, FMI 03.07.023
  • Seminar Sensorknoten inkl. 1. Themenvergabe (weitere Veranstaltung zu Beginn des SS 12, wenn noch Plätze frei)

 

 

Um einen groben Überblick über die Anzahl der Interessenten zu bekommen, bitten wir um eine unverbindliche Anmeldung zu den Seminaren:

Erst wenn Sie ein Thema gewählt und zugeteilt bekommen haben, ist die Teilnahme bindend.  Sie können gerne zur Infoveranstaltung erscheinen, auch wenn Sie sich noch nicht sicher sind, ob Sie wirklich am Seminar teilnehmen möchten. Unser Lehrstuhl freut sich, Sie bei der Informationsveranstaltung und später auch im Seminar begrüßen zu dürfen und Ihnen einen Einblick in unsere Forschungsgebiete geben zu können.

Hauptseminar IITM noch Plätze frei

Wie jedes Semester bietet der Lehrstuhl wieder folgendes Haupt- (Master-) Seminar an:

  • Innovative Internettechnologien und Mobilkommunikation - IITM (wöchentlich montags 14:00-16:00 Uhr)

In dem Seminar können sowohl deutsche als auch englische Vorträge gehalten und Ausarbeitungen abgegeben werden. Jeder Student kann die Sprache selber wählen! Veranstaltung wird seitens der Organisation in Deutsch gehalten.

Aktuell gibt es noch 5 freie Plätze, die bis zum 21.10.2011 vergeben werden können. Die Folien zur Vergabeveranstaltungen mit allen Themen sind hier zu finden. Mit dem Themenvorschlag bitte Kontakt zur Seminarleitung aufnehmen. Unser Lehrstuhl freut sich, Sie im Seminar begrüßen zu dürfen und Ihnen einen Einblick in unsere Forschungsgebiete geben zu können.

Kickoff iLab | Oct 20 @ 16:00 |Room 03.07.023

If you want to participate at the practical exercise please join the first meeting as we will build the teams and schedule your lab slots then.

The first meeting will not only be used for administrative things but we will right get into the topic by reminding you to the world of static routing.

 

Kickoff iLab2 | Oct 20 @ 10:15 |Room 03.07.023

If you want to participate at the practical exercise please join the first meeting as we will build the teams and schedule your lab slots then.

The first meeting will not only be used for administrative things but we will right get into the topic by reminding you to the world of static routing.

If you did not register for the exercise yet please do so here.

Info iLab2 | Jul 28 @ 12:15 |Room 03.07.023

Wie in jedem Semester bieten wir das iLab 2 (Internetpraktikum) für unsere Studenten an.

Weitere Informationen finden Sie auf der Homepage zum Praktikum. http://ilab.net.in.tum.de/

Der Termin für die zweite Informationsveranstaltung und Bildung der Zweier-Teams wird noch bekannt gegeben. Falls Sie sich schon jetzt anmelden wollen, können sie dies hier  tun.

Workshop: Future Networked IT for Buildings online

Workshop: Future Networked IT for Buildings

Am 18.5.2011 fand am Lehrstuhl für Netzarchitekturen und Netzdienste an der Technischen Universität München der Workshop "Future networked IT for Buildings" statt.

Die zugehörige Website ist nun online:

http://www.net.in.tum.de/EnablingSmartBuildings/

Vorbesprechung zu den Seminaren FI und IITM im WS 11/12 am 25.7.2011 in Raum 03.07.023 von 14:00-16:00 Uhr (copy 1)

Wie jedes Semester bietet der Lehrstuhl wieder folgende Masterseminare an:

  • Future Internet - FI (Blockveranstaltung 13./14.10.2011, ganztägig)
  • Innovative Internettechnologien und Mobilkommunikation - IITM (wöchentlich montags 14:00-16:00 Uhr)

In den Seminaren können sowohl deutsche als auch englische Vorträge gehalten und Ausarbeitungen abgegeben werden. Jeder Student kann die Sprache selber wählen! Zu den beiden Seminaren findet am 25.7.2011 von 14:00-16:00 Uhr in Raum 03.07.023 eine Informationsveranstaltung statt. Für das Seminar Future Internet werden im Rahmen dieser Veranstaltung auch gleich die Themen verteilt. Die übrig bleibenden Themen werden erweitert und stehen dann für die Vergabeveranstaltung des Seminars IITM am 17.10.2011 zur Verfügung. Um einen groben Überblick über die Anzahl der Interessenten zu bekommen, bitten wir um eine unverbindliche Anmeldung zu den Seminaren (wird in den nächsten Tagen aktiviert):

Erst wenn Sie ein Thema gewählt und zugeteilt bekommen haben, ist die Teilnahme bindend.  Sie können gerne zur Infoveranstaltung erscheinen, auch wenn Sie sich noch nicht sicher sind, ob Sie wirklich am Seminar teilnehmen möchten. Unser Lehrstuhl freut sich, Sie bei der Informationsveranstaltung und später auch im Seminar begrüßen zu dürfen und Ihnen einen Einblick in unsere Forschungsgebiete geben zu können.

Vorbesprechung Proseminar 21.07.2011 13:00 in Raum 03.07.023

Für das Proseminar Network Hacking findet die erste Informationsveranstaltung am 21.07.2010 um 14:00 in Raum 03.07.023 statt.

Weitere Informationen hier

Vorbesprechung iLab (Bachelor/Master) am 21.07.11 um 12:00 Uhr in Raum 03.07.023

Wie in jedem Semester bieten wir das iLab (Internetpraktikum) für unsere Studenten an. In diesem Semester ist die Teilnahme sowohl von Bachelor- als auch von Master-Studenten möglich. Für Studenten im Master-Studiengang, die bereits das iLab besucht haben, bieten wir ein zusätzliches Praktikum für Fortgeschrittene an: iLab².

Das Ziel des iLab ist es sowohl theoretische Kenntnisse zu vermitteln bzw. zu wiederholen als auch diese durch praktische Versuche in unserem Labornetzwerk zu vertiefen. Die Versuche werden in Teams von jeweils zwei Personen durchgeführt. 

Wir behandeln folgende Themen:

  • allgemeine Grundlagen (IP, ARP, Schichtenmodell, ...)
  • statisches und dynamisches Routing
  • TCP/UDP
  • DNS/DNSSec
  • NAT/DHCP/IPv6
  • Sicherheitsmechanismen (Firewalls, kryptographische Protokolle wie TLS, IPSec, ...)
  • WLAN (Sicherheit, Konfiguration, Access Control, ...)

Weitere Informationen finden Sie auf der Homepage des iLab.

Der Termin für die zweite Informationsveranstaltung und Bildung der Zweier-Teams wird noch bekannt gegeben. Falls Sie sich schon jetzt anmelden wollen, können sie dies hier  tun.

Vorbesprechung zu den Masterseminaren IITM und Sensorknoten im SS 2011 am 6.5.2011 in Raum 03.07.023

Wie jedes Semester bietet der Lehrstuhl wieder folgende Masterseminare an:

  • Innovative Internettechnologien und Mobilkommunikation - IITM (wöchentlich freitags 14:00-16:00 Uhr)
    • Informationsveranstaltung mit Themenvergabe: 6.5.2011, 14:15 Uhr, Raum 00.08.038
    • Anmeldeliste (aktuelle Anmeldungen landen auf der Warteliste)
  • Sensorknoten - Betrieb, Netze und Anwendungen (Blockveranstaltung im Juli)
    • Informationsveranstaltung und Themenvergabe: 6.5.2011, 16:00 Uhr, Raum 00.08.038
    • Anmeldeliste

In den Seminaren können sowohl deutsche als auch englische Vorträge gehalten und Ausarbeitungen abgegeben werden. Jeder Student kann die Sprache selber wählen! Um einen groben Überblick über die Anzahl der Interessenten zu bekommen, bitten wir um eine unverbindliche Anmeldung zu den Seminaren. Erst wenn Sie ein Thema gewählt und zugeteilt bekommen haben, ist die Teilnahme bindend.  Sie können gerne zur Infoveranstaltung erscheinen, auch wenn Sie sich noch nicht sicher sind, ob Sie wirklich am Seminar teilnehmen möchten. Unser Lehrstuhl freut sich, Sie bei der Informationsveranstaltung und später auch im Seminar begrüßen zu dürfen und Ihnen einen Einblick in unsere Forschungsgebiete geben zu können.

Kick-Off for master practical exercise iLab2

Only few places left... be fast to register!

 

The registration for the ilab2 is possible now: register here.

ilab2-logo

 

The kickoff event will be on

2011-05-05 @ 10h15 in 03.07.023

Vorbesprechung iLab (Bachelor/Master) am 05.05.11 um 16:00 Uhr in Raum 03.07.023 (copy 1)

Wie in jedem Semester bieten wir das iLab (Internetpraktikum) für unsere Studenten an. In diesem Semester ist die Teilnahme sowohl von Bachelor- als auch von Master-Studenten möglich. Für Studenten im Master-Studiengang, die bereits das iLab besucht haben, bieten wir ein zusätzliches Praktikum für Fortgeschrittene an: iLab².

Das Ziel des iLab ist es sowohl theoretische Kenntnisse zu vermitteln bzw. zu wiederholen als auch diese durch praktische Versuche in unserem Labornetzwerk zu vertiefen. Die Versuche werden in Teams von jeweils zwei Personen durchgeführt. 

Wir behandeln folgende Themen:

  • allgemeine Grundlagen (IP, ARP, Schichtenmodell, ...)
  • statisches und dynamisches Routing
  • TCP/UDP
  • DNS/DNSSec
  • NAT/DHCP/IPv6
  • Sicherheitsmechanismen (Firewalls, kryptographische Protokolle wie TLS, IPSec, ...)
  • WLAN (Sicherheit, Konfiguration, Access Control, ...)

Weitere Informationen finden Sie auf der Homepage des iLab.

Die zweite Informationsveranstaltung und Bildung der Zweier-Teams wird am 05.05.2011 um 16:00 Uhr in Raum 03.07.023 stattfinden. Falls Sie sich noch nicht angemeldet haben, können sie dies hier noch tun. Nachmeldungen sind bis 12.05.2011 möglich.

MunichJS - Javascript User Group Meetup

JavaScript ist eine Sprache um bunte Effekte auf Webseiten zu bauen! Das war vielleicht wahr, aber die Dinge haben sich geändert. Man kann mit JavaScript ernsthafte Softwareprojekte umsetzen - und dabei Spass haben. Du glaubst uns nicht? Dann komm doch einfach zum nächsten Usergroup-Treffen!

In Zusammenarbeit mit der Münchner JavaScript-Usergroup MunichJS veranstaltet der Lehrstuhl das aktuelle Meetup mit Vorträgen und Diskussionsrunde. Wolfram Kiesling von Uxebu und Philipp Fehre vom Lehrstuhl I8 werden Vorträge zum Thema Javascript halten:

  • Wolfram Kiesling - JavaScript is a toy language!
  • Philipp Fehre - Low-level networking with Node.js

Zeit: 04.05.2011, 19:00 Ort: Medienraum 00.13.009A, FMI-Gebäude 

Bitte registriert euch unter munichjs.org (oder direkt bei eventbride) da die Plätze begrenzt ist.

Vorbesprechung zu den Seminaren FI und IITM im SS 2011 am 11.2.2011 in Raum 03.07.023 von 14:00-16:00 Uhr (copy 1)

Wie jedes Semester bietet der Lehrstuhl wieder folgende Masterseminare an:

  • Future Internet - FI (Blockveranstaltung 18./19.4.2011, ganztägig)
  • Innovative Internettechnologien und Mobilkommunikation - IITM (wöchentlich freitags 14:00-16:00 Uhr)

In den Seminaren können sowohl deutsche als auch englische Vorträge gehalten und Ausarbeitungen abgegeben werden. Jeder Student kann die Sprache selber wählen! Zu den beiden Seminaren findet am 11.2.2011 von 14:00-16:00 Uhr in Raum 03.07.023 eine Informationsveranstaltung statt. Für das Seminar Future Internet werden im Rahmen dieser Veranstaltung auch gleich die Themen verteilt. Die übrig bleibenden Themen werden erweitert und stehen dann für die Vergabeveranstaltung des Seminars IITM am 6.5.2011 zur Verfügung. Um einen groben Überblick über die Anzahl der Interessenten zu bekommen, bitten wir um eine unverbindliche Anmeldung zu den Seminaren (wird in den nächsten Tagen aktiviert):

Erst wenn Sie ein Thema gewählt und zugeteilt bekommen haben, ist die Teilnahme bindend.  Sie können gerne zur Infoveranstaltung erscheinen, auch wenn Sie sich noch nicht sicher sind, ob Sie wirklich am Seminar teilnehmen möchten. Unser Lehrstuhl freut sich, Sie bei der Informationsveranstaltung und später auch im Seminar begrüßen zu dürfen und Ihnen einen Einblick in unsere Forschungsgebiete geben zu können.

Information ilab2 in 03.05.033 | Registration now possible

The registration for the ilab2 is possible now: register here.

ilab2-logo

 

The informational event will be on

2011-02-10 @ 15h15 in 03.05.033

Vorbesprechung iLab (Bachelor-Kurs) am 10.02.11 um 16:00 Uhr in Raum 03.07.023

Wie in jedem Semester bieten wir das iLab (Internetpraktikum) für Bachelor-Studenten an. Das Ziel des iLab ist sowohl theoretische Kenntnisse zu vermitteln bzw. zu wiederholen als auch diese durch praktische Versuche in unserem Labornetzwerk zu vertiefen. Die Versuche werden in Teams von jeweils zwei Personen durchgeführt. Wir behandeln folgende Themen:

  • allgemeine Grundlagen (IP, ARP, Schichtenmodell, ...)
  • statisches und dynamisches Routing
  • TCP/UDP
  • DNS/DNSSec
  • NAT/DHCP/IPv6
  • Sicherheitsmechanismen (Firewalls, kryptographische Protokolle wie TLS, IPSec, ...)
  • WLAN (Sicherheit, Konfiguration, Access Control, ...)

Weitere Informationen finden Sie auf der Homepage des iLab.

Die erste Informationsveranstaltung zum iLab wird am 10.02.2011 um 16:00 Uhr in Raum 03.07.023 stattfinden. Das Anmeldesystem ist hier zu finden. Am 05.05.2011 um 16:00 Uhr wird in Raum 03.07.023 die zweite Informationsveranstaltung und die Zusammenstellung der Zweierteams stattfinden. Bitte beachten Sie: Für das iLab² für Master-Studenten wird eine gesonderte Informationsveranstaltung angeboten.

Vorbesprechung zum Seminar Sensorknoten im SS 2011 am 8.2.2011 in Raum 03.07.023 von 16:15-18:00 Uhr

Wie jedes Sommersemester bietet unser Lehrstuhl in Kooperation mit dem Lehrstuhl Informatik 13 (Prof. Baumgarten) wieder das Masterseminar "Sensorknoten - Betrieb, Netze und Anwendungen" an.

Die 1. Vorbesprechung wird am 8.2.2011 von 16:15-18:00 Uhr in Raum 03.07.023 stattfinden. Das Seminar wird als Blockveranstaltung im Juli stattfinden. Nähere Informationen können auf der Seminarhomepage entnommen werden.

Im Seminar können sowohl deutsche als auch englische Vorträge gehalten und Ausarbeitungen abgegeben werden. Jeder Student kann die Sprache selber wählen! Um einen groben Überblick über die Anzahl der Interessenten zu bekommen, bitten wir um eine unverbindliche Anmeldung zum Seminar:

Erst wenn Sie ein Thema gewählt und zugeteilt bekommen haben, ist die Teilnahme bindend.  Sie können gerne zur Infoveranstaltung erscheinen, auch wenn Sie sich noch nicht sicher sind, ob Sie wirklich am Seminar teilnehmen möchten. Unsere beiden Lehrstühle freuen sich, Sie bei der Informationsveranstaltung und später auch im Seminar begrüßen zu dürfen und Ihnen einen Einblick in unsere Forschungsgebiete geben zu können.

Gastvortrag Herr Dr. Dirk Henrici (Telefonica o2 Germany)

Im Rahmen des Hauptseminars "Innovative Internettechnologien und Mobilkommunikation" dürfen wir als Gastredner Herrn Dr. Dirk Henrici von Telefonica o2 Germany begrüßen. Er wird voraussichtlich einen Vortrag über RFIDs halten. Im Anschluss an die Präsentation laden wir die Zuschauer zu einer Diskussionsrunde ein. Zeit: .7.02.2011, 14:00 Ort: 03.07.023, FMI

Vortrag und Demo: "Web 2.0-Hacking"

Im Rahmen des Proseminars "Network Hacking und Abwehr" veranstaltet der Lehrstuhl zusammen mit der Secaron AG München, eine Unternehmensberatung im Bereich der Informationssicherheit, einen Vortrag zum Thema "Web 2.0 Hacking". Herr Phillip Rocholl von Secaron wird über Angriffe auf Web 2.0 Dienste sprechen. Zu den Inhalten seines Vortrags zählen u.A. SQL-Injection- und Cross-Site-Scripting-Attacken. Der Vortrag wird durch mehrere live durchgeführte Demo-Hacks und Informationen über den Beruf des Security-Consultants abgerundet. Im Anschluss an die Präsentation laden wir die Zuschauer zu einer Diskussionsrunde ein. Zeit: 28.01.2011, 14:00 Ort: Hörsaal 2, FMI-Gebäude

Umfrage zum Sicherheitsbewusstsein in Sozialen Netzwerken

Wir führen auf Facebook eine Umfrage zum Sicherheitsbewusstsein in Sozialen Netzwerken durch. Wir freuen uns über zahlreiche Teilnahme.

Weihnachtsfeier 2010

Wie in jedem Jahr veranstaltet unser Lehrstuhl eine Weihnachtsfeier zu der wir unsere (zukünftigen) Studenten und Hiwis einladen möchten.

Datum: 21.12.2010 Zeit: ab 18:00 Uhr Ort: MI 03.07.023

Wir bitten um eine kurze Anmeldung, damit wir die Anzahl der Teilnehmer abschätzen können.

iLab - Weitere 10 Plätze verfügbar

Wir haben erneut weitere Praktikumsplätze in unserem Bachelor-Level Praktikum iLab geschaffen. Zur Anmeldung bitte hier klicken. Weitere Informationen gibt es hier.

Seminar IITM - Plätze frei

Wie jedes Semester bietet der Lehrstuhl während des Vorlesungsbetriebes wieder ein Hauptseminar an:

Im Seminar können sowohl deutsche als auch englische Vorträge gehalten und Ausarbeitungen abgegeben werden. Jeder Student kann die Sprache selber wählen! Die Informations- und Vergabeveranstaltung findet am 18.10.2010 ab 14:00 Uhr in Raum 03.07.023 statt. Um einen groben Überblick über die Anzahl der Interessenten zu bekommen, bitten wir um eine unverbindliche Anmeldung zum Seminar:

Erst wenn Sie ein Thema gewählt und zugeteilt bekommen haben, ist die Teilnahme bindend.  Sie können gerne zur Infoveranstaltung erscheinen, auch wenn Sie sich noch nicht sicher sind, ob Sie wirklich am Seminar teilnehmen möchten. Unser Lehrstuhl freut sich, Sie bei der Informationsveranstaltung und später auch im Seminar begrüßen zu dürfen und Ihnen einen Einblick in unsere Forschungsgebiete geben zu können.

iLab1 erster Termin/Teameinteilung Do, 21.10.2010, 16 Uhr, Raum 03.07.023

iLab - Weitere Plätze verfügbar

Wir haben weitere Praktikumsplätze in unserem Bachelor-Level Praktikum iLab geschaffen. Derzeit sind noch sechs Plätze frei (Stand: 14.9.10). Zur Anmeldung bitte hier klicken. Weitere Informationen gibt es hier.

IPTComm 2010 August 2 and 3, 2010

IPTComm 2010 will take place at the Leibniz Supercomputing Center, Munich at August 2 and 3. The chair will participate with one paper and a demo that will show security in future home networks.

Vorbesprechung Proseminar 23.07.2010 14:00 in Raum 03.07.023 (copy 1)

Für das Proseminar Network Hacking findet die erste Informationsveranstaltung am 23.07.2010 um 14:00 in Raum 03.07.023 statt. Weitere Informationen hier

Information ilab2 in 03.05.033 | Registration now possible

The registration for the ilab2 is possible now: register here.

ilab2-logo

 

The informational event will be on

2010-07-15 @ 14h15 in 03.05.033

Vorbesprechung zu den Seminaren FI und IITM im WS 10/11 am 13.7.2010 in Raum 03.07.023 von 12:00-14:00 Uhr

Wie jedes Semester bietet der Lehrstuhl wieder folgende Hauptseminare an:

In den Seminaren können sowohl deutsche als auch englische Vorträge gehalten und Ausarbeitungen abgegeben werden. Jeder Student kann die Sprache selber wählen! Zu den beiden Seminaren findet am 13.7.2010 von 12:00-14:00 Uhr in Raum 03.07.023 eine Informationsveranstaltung statt. Für das Seminar Future Internet werden im Rahmen dieser Veranstaltung auch gleich die Themen verteilt. Die übrigen bleibenden Themen werden erweitert und stehen dann für die Vergabeveranstaltung des Seminars IITM am 18.10.2010 zur Verfügung. Um einen groben Überblick über die Anzahl der Interessenten zu bekommen, bitten wir um eine unverbindliche Anmeldung zu den Seminaren (wird in den nächsten Tagen aktiviert):

  • Anmeldung Future Internet
  • Anmeldung IITM

Erst wenn Sie ein Thema gewählt und zugeteilt bekommen haben, ist die Teilnahme bindend.  Sie können gerne zur Infoveranstaltung erscheinen, auch wenn Sie sich noch nicht sicher sind, ob Sie wirklich am Seminar teilnehmen möchten. Unser Lehrstuhl freut sich, Sie bei der Informationsveranstaltung und später auch im Seminar begrüßen zu dürfen und Ihnen einen Einblick in unsere Forschungsgebiete geben zu können.

Information iLab in 01.06.011 | Registration now possible

An introduction to the iLab will be given at 12.07.2010 at 16:15 in Room 01.06.011.

You can find more information and the application form here:

Gastvortrag von Prof. Wolfinger am 17.06.10 um 17:15

Es spricht:       Prof. Bernd Wolfinger Universität Hamburg

Termin: Donnerstag, den 17.06.10 um 17:15 Ort:    Raum MI Hörsaal 2 (MI-Gebäude, Campus Garching) Thema:  Performance Engineering and Traffic Engineering for Multimedia Applications in the Internet and in Mobile Networks

Abstract: Performance Engineering of computer and communication networks, among others, comprises practices, methods and tools which can be applied in order to design, implement and operate networks and their applications in such a way that given performance and Quality-of-Service (QoS) requirements are fulfilled. ‘Traffic Engineering’ for networks – in its broader sense – comprises formal specification, measurement, modelling, characterization and manipulation (routing, traffic shaping,  etc) as well as the generating of traffic loads in networks. Performance engineering and traffic engineering are particularly relevant in the context of the Internet and of mobile networks, more so, if those networks are used for real-time communications. The talk summarizes the long-term experiences in traffic and performance engineering within the Telecommunications and Computer Networks Division at Hamburg University. In particular, emphasis will be given to our recent research results related to measurement-based load characterization of audio and video streams, to formal load specification and analytical modelling of load transformations (stochastic load transformations as they are currently studied within the DFG project LUPUS) as well as to the elaboration of two powerful performance and traffic engineering tools: a distributed load generator for multimedia traffic in service-integrated networks and a network emulator to reflect the packet delay and loss behaviour of, possibly interconnected, computer and communication networks. A case study will be presented to illustrate the broad applicability of our load generator (UniLoG) and network emulator (NetEmu) prototypes. These experiments will also show that valid QoS-related studies for distributed real-time applications can be flexibly supported by a combined usage of both, the network emulator and the load generator tool. With our approach the strict separation between network-oriented and application-oriented performance studies is no longer required – an important step towards a realistic QoS evaluation from an end-user’s point of view. Bio: Prof. Dr. Bernd E. Wolfinger has been with the Computer Science Department of Hamburg University since 1981, where he is presently heading the Telecommunications and Computer Networks (TKRN) Subdivision. Dr. Wolfinger has obtained degrees from Université Claude-Bernard, Lyon/F. (Maîtrise, ‘74), University of Karlsruhe/D (Diploma, Mathematics ‘75; Ph.D., Comp. Sc. ’79). He has spent long-term sabbaticals at IBM Research / Yorktown, N.Y. (‘85), Internat. Computer Science Institute / Berkeley, Ca. (’91,’96), as well as at Université P. et M. Curie, LIP 6, Paris (’01, ‘06). Professor Wolfinger is active in Networking research since 1975, has been responsible for numerous conference organizations and has served on a large variety of TPCs. He has been editor of books and special issues of journals; he has published more than 100 papers in areas such as High-speed & Wireless Networks and Real-time (audio/video) Communications as well as in Modeling (Simulation & Queueing Networks) , Measurement, Traffic Engineering, Performance & Reliability Evaluation, QoS Management and eLearning.
contact person:
Prof. Georg Carle
phone: 089/ 289-18032
Email: calre@in.tum.de

ACMP auf der Langen Nacht der Wissenschaften am 15.5.2010 von 18:00-24:00Uhr

Mit unser autonomen Control und Managementplatform (ACMP) nehmen wir an der Langen Nacht der Wissenschaften 2010 an der Technischen Universität München teil. Mehr Information hier. Wir freuen uns, Sie willkommen zu heißen!

Es sind noch Plätze im iLab frei! nächstes Meeting: Do 29.04. 16:00 @ 00.08.038

Im Internet-Praktikum (Bachelor, 10 ECTS) lernen Sie in praktischen Versuchen viele Kerntechnologien und Services des Internet kennen.

Es sind noch Plätze frei!

Neue Teilnehmer sind auch bei der nächsten Veranstaltung am 29.04.2010 um 16:00 Uhr im Raum 00.08.038 willkommen

Zusätzliche Informationen und Registrierung hier.

Kickoff meeting ilab² 04/20/2010 @ 16h15 in 00.08.038 (for master students) [Currently 1 place left]

Kick-off for ilab1 (Bachelor): 22.4.10 16h00 @ MI 00.13.009A

Kickoff meeting for the new practical exercise on master level ilab² will be on

04/20/2010 @ 16h15 in 00.08.038

More information here.

Currently 1 place left.

Vorbesprechung zum Internetpraktikum am 11.2.2010, 16-17 Uhr, Raum 00.13.009A

Die Infoveranstaltung zum Internetpraktikum findet am 11.2. um 16:00 in 00.13.009A statt.

Nähere Informationen zum Praktikum gibt es

Informational meeting ilab² 02/09/2010 @ 16h15 in 03.05.033 (for master students)

Informational meeting for the new practical exercise on master level ilab² will be on

02/09/2010 @ 16h15 in 03.05.033

More information here.

Gastvortrag von Dr. Henning Sanneck am 08.02.2010 um 14:15

Es spricht:       Dr. Henning Sanneck Research Manager OAM Automation Research, Technology & Platforms Nokia Siemens Networks GmbH&Co KG, München

http://sanneck.net Termin: Montag, den 08.02.2010, 14:15 Uhr Ort:    Raum MI Multimediaraum 00.08.038 (MI-Gebäude, Campus Garching, Finger 8, Erdgeschoss) Thema:  Mobile Network Management Research

Due to the high cost pressure put on mobile network operators, the efficient Management of Mobile Networks (Deployment, Operation, Maintenance) has gained a lot of importance and visibility. Particularly automation solutions ("Self Organizing Networks") are considered to be a key building block for LTE networks by operators and network equipment vendors. Based on an overview on mobile networks and their management, a concrete example (self-configuration of basestations) will be discussed, showing the opportunities and challenges in this area. Additionally the presentation gives some insights into the product development process (idea -> concept -> product-feature) and the tasks of a research group within a large network equipment manufacturer.

Bio: Henning Sanneck is Research Manager at Nokia Siemens Networks in Munich where he is leading projects on Self-Organizing Networks for LTE.

Dr. Henning Sanneck studied Electrical Engineering at the University of Erlangen-Nuremberg, Germany. He was a Visiting Student (ERASMUS scholarship) at the University of Nantes, France, in 1993. After receiving his Diploma in 1995, he joined GMD Fokus (now: Fraunhofer Fokus) in Berlin. At Fokus, Dr. Sanneck worked as a Researcher in the area of Quality-of-Service (QoS) support for Real-Time Services in IP-based networks. He received his Dr.-Ing. (PhD) degree in Electrical Engineering from the Technical University of Berlin with a thesis on Voice over IP QoS in 2000. In 2001 Dr. Sanneck joined Siemens - Mobile Networks in Munich, working as a Senior Research Engineer on cross-layer design for IP-based Radio Access Networks (RANs), Software Technologies for Mobile Networks and Technology Management. He became a Project Manager for technology innovation projects in the area of Network Management for 3G and beyond RANs in 2003. Since the formation of Nokia Siemens Networks in 2007 he is heading the "OAM Automation" group in the Research, Technology & Platforms unit.

Vorbesprechung zu den Hauptseminaren "Future Internet" und "Innovative Internettechnologien und Mobilkommunikation" am 1.2.2010, 14ct-16 Uhr, Raum 00.08.038

Weiter Informationen zu den Seminaren unter der jeweiligen Semianrhomepage zu finden:

Vorbesprechung zu dem Seminar "Sensorknoten: Betrieb, Netze und Anwendungen" am 5.2.2010, 12-14 Uhr, Raum 03.07.023

weitere Informationen sind auf der Seminarhomepage zu finden.

Weihnachtsfeier 2009

Wie in jedem Jahr veranstaltet der Lehrstuhl eine Weihnachtsfeier zu der wir unsere (zukünftigen) Studenten und Hiwis einladen möchten. Datum: 21.12.2009 Zeit: ab 18:00 Ort: FMI, Raum 03.07.023 Wir bitten um eine kurze Anmeldung, damit wir die Anzahl der Teilnehmer einschätzen können.

Live Hacking Demo am 13.11.09

Im Rahmen des Proseminars "Network Hacking" veranstaltet der Lehrstuhl zusammen mit der Firma Syss eine "Live Hacking Demo". Herr Sebastian Schreiber, Geschäftsführer von Syss, wird während der Live-Demo eine Vielzahl von Hackertechniken demonstrieren und erläutern. Insbesondere finden Angriffe auf Systeme in Netzwerken und dem Internet statt. Im Anschluss laden wir die Anwesenden zu einer Diskussion ein.

Weitere Informationen hier.

Zeit:

Freitag, der 13. November 2009 14:00 - 16:00

Ort:

Fakultät für Maschinenwesen Hörsaal 1801 Boltzmann Straße 15 85748 Garching

Proceedings IITM und Sensorknoten abholbereit

Im Rahmen unsere Seminare im SS2009 haben wir ein gemeinsames Proceeding (NET-2009-10-1)angefertigt, welches folgende Seminare beinhaltet:

  • Innovative Internettechnologien und Mobilkommunikation (IITM)
  • Sensorknoten: Betrieb, Netze und Anwendungen (SN)

 

Das gebundene Proceeding kann ab sofort in unserem Sekretariat abgeholt werden. Eine PDF-Version ist zu finden unter http://www.net.in.tum.de/publications/NET/ .

TUM Informatik I8-Sonderkolloquium mit James Sterbenz am 05.10.09

E I N L A D U N G

       zu einem TUM Informatik I8-Sonderkolloquium: Es spricht:       Prof. James P.G. Sterbenz, Ph.D. The University of Kansas, U.S.A. http://www.ittc.ku.edu/~jpgs Termin: Montag, den 05.10.09, 14 Uhr Ort:    Raum MI Besprechungsraum Informatik8 03.05.033 (MI-Gebäude, Campus Garching, 3. OG, Finger 5) Thema:  Resilience, Survivability, and Heterogeneity in the Postmodern Internet James P.G. Sterbenz Abstract Society increasingly relies on computer networks in general, and the Internet in particular. Consumers rely on networks for access to information and services, personal finance, and for communication with others. The Internet has become indispensable to the routine operation of businesses and to the global economy. The military depends on network centric operations and warfare. Governments depend on networks for their daily operation, service delivery, and response to natural disaster and terrorist attacks. Furthermore, the Internet is being used in ways not anticipated by its designers and evolution of the protocols, in particular: TCP, IP, BGP, DNS, and HTTP. Emerging application paradigms and mashups coupled with usage scenarios that are increasingly disconnected and mobile challenge the current architecture. This has been recognised by research and development initiatives including NSF FIND (Future Internet Design), GENI (Global Environments for Network Innovation), and EU FIRE (Future Internet Research and Experimentation).  This presentation will focus on two key aspects of the future Internet: resilience and heterogeneity. Resilience: The consequences to disruption of the Internet are increasingly severe, and threaten the lives of individuals, the financial health of business, and the economic stability and security of nations and the world. With the increasing importance of the Internet, so follows it's attractiveness as a target from bad guys: recreational and professional crackers, terrorists, and from information warfare. The EU FIRE ResumeNet project is exploring resilience and survivability as critical properties of the future Internet architecture. Heterogeneity: New applications and usage scenarios stress the Internet architecture that has evolved assuming a stable wired infrastructure. While the current hourglass waist provided by IP, DNS, and BGP has served the Internet well, the demand for heterogeneity stresses the least-common-denominator of the waist. The NSF FIND Postmodern Internet project (PoMo) is exploring heterogeneity as a first-class citizen in the Postmodern Internet, in which a new internetworking protocol serves as the glue for heterogeneous realms with explicit support for trust and policy boundaries. The Great Plains Environment for Network Innovation (GpENI) is constructing part of the GENI infrastructure, which will in part be used as a platform to test and evaluate ResumeNet and PoMo architecture. Additionally, research in two domain-specific realms will be described. Highly Dynamic Airborne Networking Highly dynamic mobile wireless networks present unique challenges to end-to-end communication, particularly caused by the time varying connectivity of high-velocity nodes combined with the unreliability of the wireless communication channel. Addressing these challenges requires the design of new protocols and mechanisms specific to this environment. Our research explores the tradeoffs in the location of functionality such as error control and location management for high-velocity multihop airborne-sensor networks and presents cross-layer optimizations between the MAC, link, network, and transport layers to enable a domain specific network architecture, which provides high reliability for telemetry applications. We have designed new transport, network, and routing protocols for this environment: TCP-friendly AeroTP, IP-compatible AeroNP, and AeroRP, which show significant performance improvement over the traditional TCP/IP/MANET protocol stack. Weather Disruption-Tolerant Millimeter-Wave Mesh Networking Millimeter-wave networks have the potential to supplement fiber in providing high-speed Internet access, as well as backhaul for emerging mobile 3G and 4G services. However, due to the high frequency of operation (70-90 GHz), such networks are highly susceptible to attenuation from rain. A resilient mesh topology with cross-layering between the physical and network layer has the potential to self-optimise under the presence of unstable links. Our research investigates mechanisms to overcome the disruptive effects of rain storms on network connectivity and service reliability. We propose two novel domain-specific predictive routing algorithms: P-WARP that uses real-time radar data to dynamically reroute traffic in advance of link failures, as well as a modified link-state algorithm XL-OSPF that uses cross-layering to instantaneously react to link failures. Simulations evaluate the effectiveness of the proposed algorithms based on data from real storms in the Midwest US. Bio Dr. James P.G. Sterbenz is Associate Professor of Electrical Engineering & Computer Science and on staff at the Information & Telecommunication Technology Center at the University of Kansas, and is a Visiting Professor of Computing in InfoLab 21 at Lancaster University in the UK. He has previously held senior staff and research management positions at BBN Technologies, GTE Laboratories, and IBM Research. His research interests include resilient, survivable, and disruption tolerant networking, future Internet architectures, active and programmable networks, and high-speed networking and components. He is currently in the NSF-funded FIND and GENI programs, and the EU-funded FIRE ResumeNet project. He received a doctorate in computer science from Washington University in 1991. He has been program chair for IEEE GBN and HotI, IFIP IWSOS, PfHSN, and IWAN, and is on the editorial board of IEEE Network. He is principal author of the book High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication.

Neue Hiwi-Stellen im Angebot

Der Lehrstuhl i8 sucht zum nächstmöglichen Zeitpunkt mehrere Hilfswissenschaftler.

  • Hiwis gesucht für Emmy-Noether Nachwuchsgruppe (PDF)
  • Hiwis für Webseiten- und Netzwerkadministration gesucht (PDF)

Alle aktuellen Hiwi-Auschreibungen gibt es unter "Angebote".

Gastvortrag von Prof. Dr. Jörn Altmann am 20.07. um 13:00

Es spricht:       Prof. Dr. Jörn Altmann Seoul National University, South Korea http://www.my-groups.de/altmann/?page_id=19 Termin: Montag, den 20.07.09, 13 Uhr Ort:    Raum MI Seminarraum 03.07.023 (MI-Gebäude, Campus Garching, 3. OG, Finger 7) Thema:  Capacity Planning for Cloud Computing Resources Due to the few options of computing resources currently available in the existing market, capacity planning is simple to perform. However, envisioning a market for commercial computing resources as part of a Cloud computing environment, capacity planning will become more complex due to the availability of many different resource types at variable prices. In this situation, the user will require support for handling the capacity planning process and for making use of Cloud computing in a cost-effective manner. The support could come from an online, stand-alone Capacity Planning Service, enabling companies to outsource their capacity planning task. This talk describes the Cloud Capacity Planning Service and demonstrates the workings of the service. This work on capacity planning has been partly performed within the EC-funded project GridEcon, Grid Economics and Business Models. GridEcon introduced the design and implementation of the GridEcon Marketplace, which not only provides the market mechanism for trading computing resources on a pay-per-use basis but also provides an environment for value-added support services for using the Cloud computing market more efficiently. The Marketplace and market mechanism were validated by using the GridEcon Platform, which is a service-oriented platform for composing market scenarios. The talk will also give an overview about the GridEcon Project and its Marketplace. Bio: Jörn Altmann is Associate Professor for Technology Management, Economics, and Policy at Seoul National University, where he heads the group on Computer Network Economics. Prior to this, he taught computer networks at UC Berkeley, worked as a Senior Scientist at Hewlett-Packard Labs, and has been a postdoc at EECS and ICSI of UC Berkeley. Dr. Altmann received his B.Sc. degree, his M.Sc. degree, and his Ph.D. from the University of Erlangen-Nuremberg. Dr. Altmann's current research centres on economics of Internet services and Internet infrastructures, integrating economic models into distributed systems. On these topics, he has major publications, serves on editorial bodies of journals and program committees, chaired international workshops, and has given several invited talks. He also served on review panels for next generation Internet research in Europe and USA.

Anmeldeformulare zum Proseminar Network Hacking und zum Internet-Praktikum sind freigeschaltet.

Die Anmeldeformulare für das Internet-Praktikum und das Proseminar "Network Hacking" sind jetzt freigeschaltet.

Nähere Informationenen, auch zu Infoveranstaltungen am Ende des Sommersemesters, gibt es auf den entsprechenden Seiten:

Anmeldung zu den Hauptseminaren Future Internet und IITM im WS09/10 freigeschaltet

Im kommenden Wintersemester 09/10 werden von unserem Lehrstuhl u.a. die Haupteminare Future Internet (max. 12 Plätze, Blockveranstaltung) und Innovative Internettechnologien & Mobilkommunikation (semesterbegleitend) angeboten. Die Anmeldungen sind ab sofort freigeschaltet. Die Vorbesprechungen sind verschoben worden auf Montag, den 20.7.09, 16-18 Uhr in Raum 03.07.023. 

TUM Informatik-Sonderkolloquium mit Prof. Jörg Liebeherr am 12.06. um 11:15 in Raum 00.13.009a

Proceedings Seminar Future Internet (SS09) und IITM (WS08/09) können abgeholt werden

WS 2008/2009 Seminar „Innovative Internettechnologien und Mobilkommunikation“ (pdf)

SS 2009 Seminar „Future Internet“ (pdf)

Freie Plätze im Seminar IITM und Seminar Sensorknoten

In unseren Seminaren

sind noch freie Plätze. Die Vorbesprechung und Themenvergabe findet am 20.4.09 statt. Uhrzeit und Ort bitte den Seminarseiten entnehmen.

Promotionsvortrag von Michael Kleis

Im Rahmen seines Promotionsverfahrens hält Herr Dipl.-Math. Michael Kleis am Montag, 30.03.2009, 11.00 Uhr, im Raum 01.07.023, MI-Gebäude, Boltzmannstr. 3 in Garching einen Vortrag zum Thema "CSP, Cooperative Service Provisioning using Peer-to-Peer Principles" Betreuer: Prof. Georg Carle

Zusammenfassung

Current challenges for Internet service provisioning include incorporating an increasing number of wireless and wired network technologies, a variety of heterogeneous end user terminals and the requirements of delay and bandwidth sensitive multimedia services. There are two main obstacles for flexible media provisioning on top of today's Internet. First the end-to-end networking paradigm which is based on a service and data unaware transport, and secondly a lack of high level communication abstractions. To address the first point this thesis proposes a methodology to integrate the Network Provider into the process of service provisioning. The proposed cooperative service provisioning (CSP) demands an interaction between Service Provider, Network Provider and Client. CSP can be applied to Provider as well as Peer-to-Peer scenarios. To address the second point, the thesis adopts a Service Overlay approach. It is studied how the principle of Distributed Hash Tables (DHTs) can be extended to realise a distributed control plane for a decentral and reactive creation of Service Overlays. As a prerequisite, a methodology to reduce Service Overlay related routing problems to search problems is developed. With regard to the required Quality of Service (QoS) measurements, the thesis focuses on scalable and time efficient estimation techniques. As a result, two new delay prediction schemes have been developed which improve estimation accuracy when compared to the state of the art. Furthermore, a novel approach to bandwidth estimation is investigated. It combines methods from landmark based delay estimation with a transformation step and has favourable estimation accuracy.

Gastvorträge von Hakima Chaouchi und Apostolia Papapostolou am 13.02. um 10:00

Es sprechen:    Hakima Chaouchi http://www-public.int-evry.fr/~chaouchi/ Telecom Sud Paris

Apostolia Papapostolou Telecom Sud Paris Termin: Freitag, den 13.02.09, 10:00 Uhr Ort:    Seminarraum 03.07.023

Talk 1: On Security in Ad Hoc Networks Abstract: Access control concerns in MANETs are very serious and considered as a crucial challenge for operators who prospects to employ unrivaled capabilities of such networks for different applications. We propose a novel hierarchical distributed AAA architecture for proactive link state routing protocols notably OLSR . This proposal contains a lightweight and secure design of an overlay authentication and authorization paradigm for mobile nodes as well as a reliable accounting system to enable operators to charge nodes based on their connection duration time. We also suggest a hierarchical distributed AAA (Authentication, Authorization, and Accounting) server architecture with resource and location aware election mechanism. Moreover, this proposal mitigates the OLSR security issues  noticeably and eventually defines a node priority-based quality of service. Dr. Hakima CHAOUCHI is associate professor at the Telecommunication Institute in France. She received her PhD in 2004 in telecommunications and networking. Previously, she was a research fellow at Paris VI University, and also joined the Centre for Telecommunication Research of London (CTR) as a research associate. Her research work is related to wireless and mobile networks and Security. She was involved in European and French research projects. She is currently coordinating one of the first French projects on Internet of Things SUN (Situated and Ubiquitous Networks). She is the co-editor of the “Security in Wireless and mobile networks” book (ISTE 2009) and the “emerging wireless technologies, IEEE standard” book (Hermes 2008) and the last one coming end of 2009 on “Internet of Things”. She recently co-organized the first and the second workshop in mobile and wireless network security (MWNS 2008, MWNS 2009) and is a member of several technical program committees. Talk 2: Wife: Wireless Indoor Positioning Fingerprint based Evaluation Abstract: Location awareness of a user or device has always been considered as a key element for enhancing network performance and improving user experience by enabling innovative location-based services. In this paper, we present WIFE (Wireless Indoor positioning based on Finger- print Evaluation), a user-based location determination system which is based on the received Signal Strength (SS) received from the surrounding Access Points (APs) inside a building. We focus on a WiFi environment for its low cost and ease of deployment and study Fingerprint-based deterministic techniques for their simplicity and reduced processing time and resource requirements. We first address the inherent impairments of an indoor environment and then describe our proposed methodology for mitigating them. Apostolia Papapostolou is a second year Ph.D. candidate at the Telecom Institute in South of Paris in France. She obtained her bachelor degree from the department of Computer and Communications Engineering at the University of Thessaly (Greece) in 2006 and her Master of Science degree from the department of Mobile and Personal Communications at King's College, University of London in 2007. Her research interests include wireless and mobile networks. Her current focus is on positioning, mobility management techniques and location based services.

Anmeldung Internetpraktikum SS2009 läuft. Infoveranstaltung 28.1.2009 - 14:15 - 01.06.011.

Sie können sich ab sofort über das Webformular für das Internetpraktikum anmelden. Die Praktikumswebsite finden Sie hier. Weitere Information zur Anmeldung finden Sie hier.

Weihnachtsfeier 2008, 18.12.2008

TUM Informatik-Sonderkolloquium mit Stephan Heckmüller am 10.12.08 um 13 Uhr in MI 01.06.011

Gastvortrag von Herrn Dipl-Inf. Stephan Heckmüller (TKRN, Universitiät Hamburg) zum Thema "Lasttransformation in Rechnernetzen und ihre Invertierung".

Zeit: Mittwoch, 10.12.08, 13:00 Uhr Ort: Raum MI 01.06.011

Heutige Rechnernetze werden von einer Vielzahl von netzbasierten Anwendungen genutzt, die Verkehr mit teilweise stark unterschiedlichen Eigenschaften induzieren. Diese Eigenschaften werden darüber hinaus innerhalb des Netzes durch eine Vielzahl von Verarbeitungsvorgängen modifiziert. Um trotz der Komplexität des resultierenden, heterogenen Verkehrs-Mixes realistische Leistungsbewertungen vornehmen zu können, ist eine valide Charakterisierung und Modellierung des Verkehrs unverzichtbar. Im Rahmen des Vortrags werden insbesondere die Einflüsse der Verarbeitungsvorgänge innerhalb des typischen Protokollstapels heutiger Rechnernetze betrachtet. Die hier erfolgenden Modifikationen der Lasteigenschaften bezeichnen wir als Lasttransformationen. Die Berücksichtigung dieser Transformationen erlaubt die Modellierung von Lasten an tieferen Schnittstellen aufbauend auf der ursprünglichen Lastcharakterisierung und den Eigenschaften des spezifischen Transformationsvorgangs. Der Vortrag befasst sich zunächst mit der Modellierung solcher Lasttransformationen als Abbildungen auf Batch Markovian Arrival Processes (BMAPs). Neben der Vorstellung des grundsätzlichen Konzeptes wird auf die bisher betrachteten Lasttransformationen eingegangen. Insbesondere wird hierbei eine Transformation, welche den Einfluss eines Token-Bucket-Moduls modelliert, näher betrachtet. Mit Hilfe einer Fallstudie wird die erfreulich hohe Genauigkeit der entwickelten Transformationen aufgezeigt. Neben der Vorhersage von Lasteigenschaften nach der Transformation ist die Invertierung von Lasttransformationen ebenfalls von Interesse. Dies gilt insbesondere dann, wenn Lasten nur an tieferliegenden Schnittstellen innerhalb des Protokollstapels beobachtbar sind und Eigenschaften an höheren Schnittstellen rekonstruiert werden sollen. Potentielle Anwendungsgebiete umfassen Anwendungsklassifikation, Angriffserkennung und Lastmodellierung für nicht beobachtbare Schnittstellen. Es werden erste Ergebnisse bezüglich der Rekonstruktion von Längeneigenschaften und von zeitlichem Verhalten präsentiert.

TUM Informatik-Sonderkolloquium mit Herrn Prof. Dr. Ernst Biersack findet am 12.11.08 um 10 Uhr in Raum MI 00.08.038 statt

Es spricht: Prof. Dr. Ernst Biersack

EURECOM Sophia Antipolis zu Gast bei I8, Raum  MI 03.05.043 Termin: Mittwoch, den 12.11.08, 10:00 Uhr Ort: Raum MI 00.08.038 (MI-Gebude, Campus Garching) Thema: Funktionsweise und Leistungsfähigkeit in Peer-to-Peer Systemen am Beispiel von KAD Peer-to-Peer Systeme haben in den letzten Jahren einen großen Aufschwung erlebt. Die populärsten P2P Anwendung wie File-sharing oder Video streaming sind sehr weit verbreitet und werden täglich millionenfach benutzt um Inhalte aller Art auszutauschen. Ein ganz wesentlicher Vorzug von P2P Systemen ist ihre ausgezeichnete Skalierbarkeit. Wir werden zunächst eine kurze Zusammenfassung der Forschungsarbeiten unserer Gruppe im Bereich P2P und Netz-Tomographie geben. Anschließend werden wir dann das P2P System KAD näher betrachten hinsichtlich seiner Funktionsweise, Leistungsfähigkeit sowie Sicherheitslücken.

Einsicht in die Nachholklausur GRNVS am 10.11.08 von 16-17 Uhr in Raum 03.05.058

Die Nachholklausur zur Vorlesung "Grundlagen: Rechnernetze und Verteilte Systeme" wurde korrigiert. Einsicht kann am 10.11.08 von 16-17 Uhr in Raum 03.05.058 genommen werden.

Anmeldung für die Vorlesung/Übung "Netzsicherheit"

Die Anmeldung für die Vorlesung bzw. Übung in "Netzsicherheit" läuft noch.

Raumänderung für die Vorbesprechung zum Seminar "Innovative Internettechnologien und Mobilkommunikation": Raum 03.07.023

Die Vorbesprechung findet am 16.10.2008 ausnahmsweise in Raum 03.07.023 von 16:00-18:00 Uhr statt.