Ausgewählte Themen in Verteile Systeme

Wintersemester 2016/2017

Titel:Ausgewählte Themen in Verteilten Systemen
Englischer Titel:Selected Topics in Distributed Systems
Typ:Seminar, Modul
Kürzel / Nr. / Modulnr.:ATVS / CS5900.113 / 72041
SWS / LP:2S / 4LP
Dozent:Prof. Dr. Frank Kargl, Prof. Dr.-Ing. Franz J. Hauck
Betreuer:Ala'a Al-Momani, Benjamin ErbEugen Frasch, Gerhard Habiger, Stephan Kleber, Henning Kopp, Dominik Lang, Thomas Lukaseder, Matthias Matousek, Rens van der Heijden
Termine:

20.10.2016 14.15-15.45 Uhr Einführungsveranstaltung (verpflichtend, H9)
24.10.2016 10.15-11.45 Uhr LaTeX-Einführung (freiwillig, O27-341)
27.10.2016 14.15-15.45 Uhr Wissenschaftliches Arbeiten (verpflichtend, H11)
12.01.2017 14.15-15.45 Uhr Präsentationstechniken (verpflichtend, H11)

27.01.2017: Vortragsblocktermin, Räume werden noch bekannt gegeben

Lernplattform:Kursmaterialien finden Sie im Moodle-Kurs. Sie werden dem Kurs automatisch hinzugefügt, sobald Sie eines unserer Seminare besuchen.
Themenvergabe:Die Themenvergabe erfolgt bis zum 10.08.2016 über die zentrale Seminarthemen-Vergabe-Plattform.
Sprache:Alle Themen können in deutscher oder englischer Sprache bearbeitet werden, sofern nicht anders angegeben.

Hinweis: Alle Seminarthemen sind vergeben worden.

Themen

frei            belegt

Vehicular Networks: Security Aspects – English only

Vehicular Networks have attracted a lot of attention in the recent years. Throughout this seminar, we are going to look at vehicular networks from security perspectives discussing how C2X communication could be secured. Approaches proposed in standards to authenticate nodes in vehicular networks will be investigated with their drawbacks. The seminar therefore will address the possible ways to improve the proposed authentication mechanisms based on the literature.

Ala'a Al-Momani

Vehicular Networks: Wireless Channel Aspects – English only

When moving towards the real-world implementation of vehicular networks, wireless channel becomes a critical issue. In this seminar we want to address the challenges in the vehicular wireless medium taking in mind the multiplexing and modulation schemes proposed in standards. We will look at channel capacity which may lead to packet collisions in dense traffic scenarios. 

Ala'a Al-Momani

IoT: Definition, Security and Privacy Aspects – English only

Internet of Things (widely known as IoT) has attracted a lot of attention in the recent years. Throughout this seminar we are going to get familiar with it by looking at the definition of IoT proposed in the literature. This seminar will basically address the question: When a “thing” can be called “smart”. This includes addressing the differences between the classical embedded systems and IoT (if there is any). Thereafter, we will investigate what aspects IoT brings to security and privacy.

Ala'a Al-Momani

Spatio-temporal Networks English only

Spatio-temporal networks (STNs) are networks whose topology and/or attributes change over time. This topic explores the theory of STNs, relevant characteristics, and applications.

Benjamin Erb

Google Spanner English only

Spanner is Google's globally distributed NewSQL database, the successor to BigTable. Google describes Spanner as a not pure relational database system because each table must have a primary key column. The lack of transactions in BigTable led to frequent complaints from users, so Google made distributed transactions central to the Spanner's design. During this seminar, current research about Google Spanner is to be surveyed and an overview of its functionality should be given.

Eugen Frasch

Cloud Rendering English only

Although there is plenty of well and easy usable 3D-Design Software the most time consuming part to produce a high-quality 3D image is still the rendering process. Since cloud computing has been arised it is possible to use more than one computer for the rendering process. Over the years more and more cloud rendering providers started to offer their services for rendering high-quality images to "normal" users. The goal of the seminar is to provide an overview of the most popular and effectiv cloud rendering providers. Also some of the basic comon concepts of diffrent providers should surveyed

Eugen Frasch

Owncloud English only

Clouds became very important the past years. Beside one of the most popular cloud storage providers "DropBox" the Open Source Software "Owncloud" is used by many users. During this seminar, current research about Owncloud is to be surveyed and an overview of its functionality should be given.

Eugen Frasch

Apache Mesos English only

Apache Mesos is an open-source cluster manager that was developed at the University of California, Berkeley. It provides efficient resource isolation and sharing across distributed applications, or frameworks. The software enables resource sharing in a fine-grained manner, improving cluster utilization. The goal of the seminar is to provide an overview of Apache Mesos, its functionality and architecture.

Eugen Frasch

Benchmarking Client-Server Applications English only

Client-server architectures are ubiquitous and the backbone of a wide array of applications around the globe. In order to compare different client-server applications and improve on them, a reasonable set of metrics to measure their performance, correctness and availability has to be devised. This work should give an overview over the most important benchmarking methods and metrics for client-server architectures.

Gerhard Habiger

Data mining for misbehavior detection in VANETs English only

Vehicular ad-hoc networks are networks created by equipping vehicles with communication equipment that allows them to communicate directly. These networks are designed to improve safety, provide better navigation, and various other applications based on data exchanged between vehicles. Misbehavior detection is the process of detecting invalid or incorrect data in this network traffic. One technique that is used in some application domains to detect such attacks is data mining. This includes techniques like rule mining, clustering, and other classification algorithms. In this seminar, the goal is to provide an overview of the different application types and their susceptibility to attacks.

Rens van der Heijden

Applications of subjective logic in VANETs English only

Vehicular ad-hoc networks are networks created by equipping vehicles with communication equipment that allows them to communicate directly. These networks are designed to improve safety, provide better navigation, and various other applications based on data exchanged between vehicles. Subjective logic is a logic that can be used to reason about uncertain or incomplete information. For example, it can be used to represent the trustworthiness of received messages, and the uncertainty of this evaluation. In this seminar, the idea is to investigate the application of so-called multinomial and continuous opinions, which express trustworthiness for multiple possible values of a message.

Rens van der Heijden

Protocol Identification English only

Network management and security require knowledge about the communication in transit to make meaningful decisions. An example for this is a network intrusion detection system that needs to decide about bengin and malicious network traffic based only on the observable protocol packets.
Proprietary encapsulation, encryption, missing protocol specification, and privacy concerns often do not allow for deep packet inspection and therefore prevent recognition of the full variance of observed protocols.
Protocol Identification (PI) is an approach to be able to identify the type of protocol in network communications based on alternative methods, such as statistical analyses.
The goal of this seminar topic is to determine and discuss common methods in PI and the quality of results they currently can provide.

Stephan Kleber

Inference of Formal Protocol Models English only

Modeling of network traffic allows to understand aspects of the communication of networked systems without knowing the protocol specification. Examples for use cases of this approach are the analysis of botnets and vulnerability detection in network protocol implementations.
Methods to accomplish the generation of such models are diverse. They are based on observing traffic and behaviour of the communicating nodes and infer the desired model from analysis of these observations.
The goal of this seminar topic is to identify commonalities and differences between multiple techniques to infer formal models of protocols and to discuss their respective strengths and weaknesses.

Stephan Kleber

Ethereum English only

Ethereum is a successor of digital cryptocurrencies like Bitcoin. Contrary to Bitcoin, Ethereum aims to be Turing-complete, thus representing a decentralized state machine. Ethereum is widely used as a platform to power smart contracts. These are contracts which are cryptographically enforced and are envisaged to provide a form of cryptographic law besides the centralized jurisdiction of the governments.
The goal of this seminar is to explain the basic mechanisms behind the Ethereum network.

Henning Kopp

Ring signatures English only

Ring signatures are a special form of a digital signature. A digital signature provides authenticity of a document, namely that a special person signed it. A ring signature hand only guarantees that a member of a group has signed a document. In some applications this should be preferred to increase privacy of the signer.
The student should describe a ring signature scheme and the necessary cryptographic basics.

Henning Kopp

Cryptography Engineering English only

Every day we rely on the security of applied cryptography (e.g. security protocols) to protect our data. This application of cryptography in real world solutions is difficult and prone to errors; one mistake can compromise the entire security.
The goal of this seminar paper is to give an overview of cryptography engineering, which entails dos and don'ts, and best practices for applying cryptography in real world scenarios.

Dominik Lang

Platforms for Network Data Analysis English only

It is essential for network operators to know both the workload and the composition of in-going and out-going network traffic, but also within the network. This information can help to dissect malfunctions or find bottlenecks in the network topology. It can also help to find intrusions and assess the extend of an attack. Several developer teams made it their goal to provide tools to analyse and visualize the network composition. This work should provide a list of requirements for network operators as well as a broad overview of software tools and a short analysis if these tools are up for the job.

Thomas Lukaseder

Analysis of Distributed Reflective DoS-Attacks English only

Denial-of-service attacks are a constant threat to every service provider. Distributed reflective DoS attacks are a special kind of mean. They do not attack the target directly but use spoofed requests sent to third party servers to amplify their attack and to obscure the attacker. The goal of this work is an extensive analysis of DRDoS attacks and a broad overview of countermeasures.

Thomas Lukaseder

Attacking the Tor Network English only

The Tor project promises protection of privacy within the Internet. It can be used to access Internet resources theoretically without the possibility of the request being tracked back to its source. However, this also makes it a target for attacks. For this seminar thesis, specific attacks and possible countermeasures on the Tor network should be reviewed. Further, an assessment of the security of Tor usage should be prepared that takes into account the earlier reviewed attacks.

Matthias Matousek

Applications for Secure Multiparty Computation English only

Distributed computation offers many opportunities for novel and advanced applications. However, significant privacy concerns arise when some of the computing parties cannot be trusted sufficiently. Secure multiparty computation (MPC) is an active research field that is attempting to solve the issue of several parties computing specific functions without disclosing their private input data. This seminar thesis should survey and asses applications for MPC.

Matthias Matousek

Beschreibung und allgemeine Angaben, Modulbeschreibung

Einordnung in die Studiengänge:
Informatik, B.Sc.: Seminar
Medieninformatik, B.Sc.: Seminar
Software-Engineering, B.Sc.: Seminar
(siehe auch unsere Hinweise zu Seminaren)
Lehr- und Lernformen:Ausgewählte Themen in Verteilten Systemen, 2S, 4LP
Verantwortlich:Prof. Dr. Frank Kargl
Unterrichtssprache:Deutsch
Turnus / Dauer:jedes Semester / ein volles Semester
Voraussetzungen (inhaltlich):Grundlagen der Rechnernetze, Proseminar
Voraussetzungen (formal):-
Grundlage für (inhaltlich): -
Lernergebnisse:Studierende vertiefen exemplarisch an einem Teilgebiet der Informatik ihre Kenntnisse im selbstständigen Arbeiten mit wissenschaftlicher Literatur sowie im mündlichen und schriftlichen Präsentieren von fachwissenschaftlichen Inhalten. In Diskussionen wird die Fähigkeit zur kritischen Reflektion geübt. Im fachlichen Teil des Seminars stehen aktuelle Themen der Verteilten Systeme im Fokus. Abhängig vom Thema lernen Studierende ein konkretes System oder ein Konzept Verteilter Systeme kennen. Sie können diese Systeme in einen größeren Kontext einordnen und deren Vor- und Nachteile selbständig ableiten.
Inhalt:Zu Beginn des Seminars werden Themen des wissenschaftlichen Arbeitens (z.B. Literaturrecherche, Schreiben einer Publikation, Präsentationstechniken) eingeführt, um den Studenten eine methodische Hilfestellung zu geben. Die Erstellung der eigentlichen Ausarbeitung und Präsentation erfolgt in individueller Betreuung. Die Ergebnisse werden in einer Abschlusspräsentation vorgestellt.
Literatur:Wird je nach Thema zu Beginn der Veranstaltung bekannt gegeben.
Bewertungsmethode:Leistungsnachweis über erfolgreiche Teilnahme. Diese umfasst Anwesenheit und enthält Ausarbeitung, Vortrag und Mitarbeit.
Notenbildung:unbenotet
Arbeitsaufwand:Präsenzzeit: 30 h
Vor- und Nachbereitung: 90 h
Summe: 120 h