Seminar Algorithms of the Internet



Similar documents
Peer-to-Peer Networks Organization and Introduction 1st Week

Distributed Denial of Service Attack Tools

Network Security TCP/IP Refresher

CSE 123b Communications Software

Definition. A Historical Example

Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol

EXPLORER. TFT Filter CONFIGURATION

How To Pass The Information And Network Security Certificate

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Multicast vs. P2P for content distribution

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Denial of Service. Tom Chen SMU

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

CSE 3214: Computer Network Protocols and Applications

Network Security - ISA 656 Review

Security Topics in Networking and Distributed Systems CS 590D

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Kick starting science...

Review: Lecture 1 - Internet History

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Design and Modeling of Internet Protocols. Dmitri Loguinov March 1, 2005

Secure Networking Using Mobile IP

Denial of Service (DoS) Technical Primer

The IP Transmission Process. V1.4: Geoff Bennett

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Modern snoop lab lite version

Firewalls, Tunnels, and Network Intrusion Detection

In what follows, we discuss the course overview, grading, books, weekly schedule, laboratory assignments and group projects.

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks

ΕΠΛ 674: Εργαστήριο 5 Firewalls

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Advanced Security and Mobile Networks

Network Security and Firewall 1

Own your LAN with Arp Poison Routing

Security vulnerabilities in the Internet and possible solutions

Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012

This Lecture. The Internet and Sockets. The Start If everyone just sends a small packet of data, they can all use the line at the same.

Protecting and controlling Virtual LANs by Linux router-firewall

Using LISP for Secure Hybrid Cloud Extension

Building Secure Network Infrastructure For LANs

Vantage Report. User s Guide. Version /2006 Edition 1

Firewall. User Manual

Linux MDS Firewall Supplement

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

COSC 472 Network Security

Ubuntu Sever Administration

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Internet2 NetFlow Weekly Reports

CSE 3461 / 5461: Computer Networking & Internet Technologies


Introduction to Network Security Lab 1 - Wireshark

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks

Computer Networks and the Internet

Flow Analysis Versus Packet Analysis. What Should You Choose?

Datasheet. Cover. Datasheet. (Enterprise Edition) Copyright 2015 Colasoft LLC. All rights reserved. 0

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Users and Vendors Speak Out: Intrusion Detection and Prevention

Introduction TELE 301. Routers. Firewalls

Network Security Fundamentals

The Internet of Things

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Denial of Service Attacks

Strategies to Protect Against Distributed Denial of Service (DD

Introduction: Why do we need computer networks?

Background (

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

CONFIGURING TCP/IP ADDRESSING AND SECURITY

From Network Security To Content Filtering

Communication Networks MAP-TELE 2012/13

#42 D A N T E I N P R I N T. Tackling Network DoS on Transit Networks. David Harmelin

GregSowell.com. Mikrotik Security

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

Description: Course Details:

PEER-TO-PEER NETWORK

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Challenges in NetFlow based Event Logging

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Meeting Worldwide Demand for your Content

Detecting peer-to-peer botnets

Build Your Own Security Lab

Internet Security Firewalls

Yahoo Attack. Is DDoS a Real Problem?

Unit 3 - Advanced Internet Architectures

Description: Objective: Attending students will learn:

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

CISC 1600 Introduction to Multi-media Computing

SCP - Strategic Infrastructure Security

Transcription:

HEINZ NIXDORF INSTITUT Seminar Algorithms of the Internet 2004-04-19 1

Motivation The Internet is the public global wide-area interconnection network for computers grows exponentially evolves The evolution of the Internet Crises and catastrophes Computer hackers since the 70s The traffic breakdown in the 80s Denial of service attacks in the 90s SPAM forever Clever algorithmic solutions Secure protocols TCP bandwidth control DoS-detection SPAM-filters 2

Goals of the Seminar Algorithms of the Internet Literature recherche in a hot topic Write an survey on the state of the art Give a presentation on this field Interact with others on scientific research Provide material for the community future lectures and seminars a book 3

Organization See the Web-page http://wwwcs.upb.de/cs/ag-madh/www/teaching/2004ss/alginternet/ Today: Next two meetings: Registration Assignment of topics Kickoff and feedback May 10th/17th: 2pm-6pm 1st presentation From May to July July 19th/26th: 1pm-7pm 2nd presentation August 1st (11:59 pm): August 30th (2pm): weekly (voluntary) meetings for consultation Deadline for written assignment Evaluation, grades and comments (voluntary participation) 4

The Deliverables 1st presentation Duration 15 min. Presents main issue strategy to get the work done 2nd presentation Duration 45 min. Survey of the research area Written assignment 5-10 pages (pure text without title, references, and figures) Survey of the most relevant and interesting work in the assigned area 5

How it Counts for the Grade 1st presentation 0% 2nd presentation 25 % Written assignment 75 % 6

The Topics 1. The mobile Internet 2. P2P-networks 3. Web caching 4. Algorithms for Web search engines 5. The structure of the Web 6. Security mechanisms of the Internet 7. Denial of service attacks 8. Worms, viruses and spam 9. Epidemic algorithms 10. The Domain Name System (DNS) 11. Bandwidth allocation of TCP 12. Routing algorithms of IP 13. Broadcasting and Multicasting in IP 14. The self-organization of the Internet 15. Wild card 7

Contents of Written Assignment Scientific survey on the assigned topic For broad audience interested in algorithms and Internet Table of contents for Tachyonic Networking 1. What is Tachyonic Network Transmissions (TNT) 2. Applications of TNT 3. How TNT began 4. The main streams of TNT 5. Recent developments in Tachyonic Networking and Computing 6. Focus: The TachyNet - A clever solution of TNT 7. Open problems and upcoming developments References 8

Format and Layout of Written Assignment American English Neutral style 5-10 pages (pure text without title, references, and figures) Accurate and correct citations and references LATeX, BibTeX Deliverables LATeX source file BibTeX file Compiled PDF-output As many referred text documents as possible Electronically if possible On paper if necessary 9

1. The Mobile Internet IP Tunneling Mobile Ad-hoc Networks Handhelds, PDA UMTS, WAP 10

2. P2P-Networks 1st generation Napster, Kazaa, Gnutella Modern P2P-Networks CAN, CHORD, Tapestry, Visit the lecture Algorithmen für Peer-to-Peer-Netzwerke But do not copy (all) 11

3. Web Caching Relieving hot spots in the Internet Akamai Distributed Hash Tables Take a look into the script Algorithmische Grundlagen des Internets, Summer 2003 12

4. Web Search Engines Commercial systems Google, Alltheweb, Altavista, etc look at websearchengineshowdown.com Algorithmic solutions PageRank by Brin and Page (Google) Kleinberg s HITS-algorithm Take a look into the script Algorithmische Grundlagen des Internets, Summer 2003 and 2004 Contact Peter Mahlmann! 13

5. The Structure of the Web The WWW is made by individuals Yet the structure can be described by Pareto-distribution number of links, size of connected components The graph structure of the WWW Take a look into the script Algorithmische Grundlagen des Internets, Summer 2002 Link to Web search machines 14

6. Security mechanisms of the Internet Are there any? Is it all trust-based? Start your investigations for the search of the missing crypto-layer of TCP/IP at the secure shell protocol 15

7. Denial of Service Attacks A new problem from the 90s Solutions Ingress filtering Link testing Logging ICMP Trace back Marking (!!!) Take a look into the script Algorithmische Grundlagen des Internets, Summer 2003 16

8. Worms, Viruses, and SPAM Definition How they spread How they work The perfect Antivirus-Software An Immune-System for Computers 17

9. Epidemic Algorithms Demers et al. Epidemic algorithms for mirroring data bases Idea: Spread information like a virus Some analyses and new ideas by Karp et al. 2001, Randomized Rumor Spreading Take a look into the script Algorithmische Grundlagen des Internets, Summer 2002 18

10. The Domain Name System What is it? How does it work? Why is it so stable? Alternatives? 19

11. Bandwidth Allocation of TCP Very classical problem of TCP/IP Strangely enough network congestion in the Internet is healed in the transport layer and not in the network layer Start with the scripts Algorithmische Grundlagen des Internets, Summer 2002 and 2003 Random early deletion (RED) New TCP-allocation for Tera-Baud-connections 20

12. Routing Algorithms of IP Start with the standard algorithms There are lots of theoretical work of routing algorithms Concentrate on such algorithms related to IP 21

13. Broadcasting and Multicasting in IP IPv4 and IPv6 foresee multicasting How does it work? How can it be improved? Is it possible to have TV on IP? 22

14. The self-organization of the Internet Official organizations of the Internet (IETF, ) The Internet and its self-regulation socially and technology based 23

15. Wild Card Did we miss something? Take a hot topic of your choice within this area. If everything fails, I ll help. 24

HEINZ NIXDORF INSTITUT Thanks and let s go! Verteilte Algorithmen in Netzwerken 25