|Titel:||Ausgewählte Themen in Verteilten Systemen|
|Englischer Titel:||Selected Topics in Distributed Systems|
|Kürzel / Nr. / Modulnr.:||ATVS / CS5900.113 / 72041|
|SWS / LP:||2S / 4LP|
|Dozent:||Prof. Dr. Frank Kargl, Prof. Dr.-Ing. Franz J. Hauck|
|Betreuer:||Ala'a Al-Momani, Benjamin Erb, Eugen Frasch, Gerhard Habiger, Stephan Kleber, Henning Kopp, Dominik Lang, Thomas Lukaseder, Matthias Matousek, Rens van der Heijden|
20.10.2016 14.15-15.45 Uhr Einführungsveranstaltung (verpflichtend, H9)
27.01.2017: Vortragsblocktermin, Räume werden noch bekannt gegeben
|Lernplattform:||Kursmaterialien finden Sie im Moodle-Kurs. Sie werden dem Kurs automatisch hinzugefügt, sobald Sie eines unserer Seminare besuchen.|
|Themenvergabe:||Die Themenvergabe erfolgt bis zum 10.08.2016 über die zentrale Seminarthemen-Vergabe-Plattform.|
|Sprache:||Alle Themen können in deutscher oder englischer Sprache bearbeitet werden, sofern nicht anders angegeben.|
Hinweis: Alle Seminarthemen sind vergeben worden.
⬤ frei ✘ belegt
✘ Vehicular Networks: Security Aspects – English onlyVehicular Networks have attracted a lot of attention in the recent years. Throughout this seminar, we are going to look at vehicular networks from security perspectives discussing how C2X communication could be secured. Approaches proposed in standards to authenticate nodes in vehicular networks will be investigated with their drawbacks. The seminar therefore will address the possible ways to improve the proposed authentication mechanisms based on the literature.
✘ Vehicular Networks: Wireless Channel Aspects – English onlyWhen moving towards the real-world implementation of vehicular networks, wireless channel becomes a critical issue. In this seminar we want to address the challenges in the vehicular wireless medium taking in mind the multiplexing and modulation schemes proposed in standards. We will look at channel capacity which may lead to packet collisions in dense traffic scenarios.
✘ IoT: Definition, Security and Privacy Aspects – English onlyInternet of Things (widely known as IoT) has attracted a lot of attention in the recent years. Throughout this seminar we are going to get familiar with it by looking at the definition of IoT proposed in the literature. This seminar will basically address the question: When a “thing” can be called “smart”. This includes addressing the differences between the classical embedded systems and IoT (if there is any). Thereafter, we will investigate what aspects IoT brings to security and privacy.
✘ Spatio-temporal Networks – English onlySpatio-temporal networks (STNs) are networks whose topology and/or attributes change over time. This topic explores the theory of STNs, relevant characteristics, and applications.
✘ Google Spanner – English onlySpanner is Google's globally distributed NewSQL database, the successor to BigTable. Google describes Spanner as a not pure relational database system because each table must have a primary key column. The lack of transactions in BigTable led to frequent complaints from users, so Google made distributed transactions central to the Spanner's design. During this seminar, current research about Google Spanner is to be surveyed and an overview of its functionality should be given.
✘ Cloud Rendering – English onlyAlthough there is plenty of well and easy usable 3D-Design Software the most time consuming part to produce a high-quality 3D image is still the rendering process. Since cloud computing has been arised it is possible to use more than one computer for the rendering process. Over the years more and more cloud rendering providers started to offer their services for rendering high-quality images to "normal" users. The goal of the seminar is to provide an overview of the most popular and effectiv cloud rendering providers. Also some of the basic comon concepts of diffrent providers should surveyed
✘ Owncloud – English onlyClouds became very important the past years. Beside one of the most popular cloud storage providers "DropBox" the Open Source Software "Owncloud" is used by many users. During this seminar, current research about Owncloud is to be surveyed and an overview of its functionality should be given.
✘ Apache Mesos – English onlyApache Mesos is an open-source cluster manager that was developed at the University of California, Berkeley. It provides efficient resource isolation and sharing across distributed applications, or frameworks. The software enables resource sharing in a fine-grained manner, improving cluster utilization. The goal of the seminar is to provide an overview of Apache Mesos, its functionality and architecture.
✘ Benchmarking Client-Server Applications – English onlyClient-server architectures are ubiquitous and the backbone of a wide array of applications around the globe. In order to compare different client-server applications and improve on them, a reasonable set of metrics to measure their performance, correctness and availability has to be devised. This work should give an overview over the most important benchmarking methods and metrics for client-server architectures.
✘ Data mining for misbehavior detection in VANETs – English onlyVehicular ad-hoc networks are networks created by equipping vehicles with communication equipment that allows them to communicate directly. These networks are designed to improve safety, provide better navigation, and various other applications based on data exchanged between vehicles. Misbehavior detection is the process of detecting invalid or incorrect data in this network traffic. One technique that is used in some application domains to detect such attacks is data mining. This includes techniques like rule mining, clustering, and other classification algorithms. In this seminar, the goal is to provide an overview of the different application types and their susceptibility to attacks.
Rens van der Heijden
✘ Applications of subjective logic in VANETs – English onlyVehicular ad-hoc networks are networks created by equipping vehicles with communication equipment that allows them to communicate directly. These networks are designed to improve safety, provide better navigation, and various other applications based on data exchanged between vehicles. Subjective logic is a logic that can be used to reason about uncertain or incomplete information. For example, it can be used to represent the trustworthiness of received messages, and the uncertainty of this evaluation. In this seminar, the idea is to investigate the application of so-called multinomial and continuous opinions, which express trustworthiness for multiple possible values of a message.
Rens van der Heijden
✘ Protocol Identification – English onlyNetwork management and security require knowledge about the communication in transit to make meaningful decisions. An example for this is a network intrusion detection system that needs to decide about bengin and malicious network traffic based only on the observable protocol packets.
Proprietary encapsulation, encryption, missing protocol specification, and privacy concerns often do not allow for deep packet inspection and therefore prevent recognition of the full variance of observed protocols.
Protocol Identification (PI) is an approach to be able to identify the type of protocol in network communications based on alternative methods, such as statistical analyses.
The goal of this seminar topic is to determine and discuss common methods in PI and the quality of results they currently can provide.
✘ Inference of Formal Protocol Models – English onlyModeling of network traffic allows to understand aspects of the communication of networked systems without knowing the protocol specification. Examples for use cases of this approach are the analysis of botnets and vulnerability detection in network protocol implementations.
Methods to accomplish the generation of such models are diverse. They are based on observing traffic and behaviour of the communicating nodes and infer the desired model from analysis of these observations.
The goal of this seminar topic is to identify commonalities and differences between multiple techniques to infer formal models of protocols and to discuss their respective strengths and weaknesses.
✘ Ethereum – English onlyEthereum is a successor of digital cryptocurrencies like Bitcoin. Contrary to Bitcoin, Ethereum aims to be Turing-complete, thus representing a decentralized state machine. Ethereum is widely used as a platform to power smart contracts. These are contracts which are cryptographically enforced and are envisaged to provide a form of cryptographic law besides the centralized jurisdiction of the governments.
The goal of this seminar is to explain the basic mechanisms behind the Ethereum network.
✘ Ring signatures – English onlyRing signatures are a special form of a digital signature. A digital signature provides authenticity of a document, namely that a special person signed it. A ring signature hand only guarantees that a member of a group has signed a document. In some applications this should be preferred to increase privacy of the signer.
The student should describe a ring signature scheme and the necessary cryptographic basics.
✘ Cryptography Engineering – English onlyEvery day we rely on the security of applied cryptography (e.g. security protocols) to protect our data. This application of cryptography in real world solutions is difficult and prone to errors; one mistake can compromise the entire security.
The goal of this seminar paper is to give an overview of cryptography engineering, which entails dos and don'ts, and best practices for applying cryptography in real world scenarios.
✘ Platforms for Network Data Analysis – English onlyIt is essential for network operators to know both the workload and the composition of in-going and out-going network traffic, but also within the network. This information can help to dissect malfunctions or find bottlenecks in the network topology. It can also help to find intrusions and assess the extend of an attack. Several developer teams made it their goal to provide tools to analyse and visualize the network composition. This work should provide a list of requirements for network operators as well as a broad overview of software tools and a short analysis if these tools are up for the job.
✘ Analysis of Distributed Reflective DoS-Attacks – English onlyDenial-of-service attacks are a constant threat to every service provider. Distributed reflective DoS attacks are a special kind of mean. They do not attack the target directly but use spoofed requests sent to third party servers to amplify their attack and to obscure the attacker. The goal of this work is an extensive analysis of DRDoS attacks and a broad overview of countermeasures.
✘ Attacking the Tor Network – English onlyThe Tor project promises protection of privacy within the Internet. It can be used to access Internet resources theoretically without the possibility of the request being tracked back to its source. However, this also makes it a target for attacks. For this seminar thesis, specific attacks and possible countermeasures on the Tor network should be reviewed. Further, an assessment of the security of Tor usage should be prepared that takes into account the earlier reviewed attacks.
✘ Applications for Secure Multiparty Computation – English onlyDistributed computation offers many opportunities for novel and advanced applications. However, significant privacy concerns arise when some of the computing parties cannot be trusted sufficiently. Secure multiparty computation (MPC) is an active research field that is attempting to solve the issue of several parties computing specific functions without disclosing their private input data. This seminar thesis should survey and asses applications for MPC.
Beschreibung und allgemeine Angaben, Modulbeschreibung
|Einordnung in die Studiengänge:||Informatik, B.Sc.: Seminar |
Medieninformatik, B.Sc.: Seminar
Software-Engineering, B.Sc.: Seminar
(siehe auch unsere Hinweise zu Seminaren)
|Lehr- und Lernformen:||Ausgewählte Themen in Verteilten Systemen, 2S, 4LP|
|Verantwortlich:||Prof. Dr. Frank Kargl|
|Turnus / Dauer:||jedes Semester / ein volles Semester|
|Voraussetzungen (inhaltlich):||Grundlagen der Rechnernetze, Proseminar|
|Grundlage für (inhaltlich):||-|
|Lernergebnisse:||Studierende vertiefen exemplarisch an einem Teilgebiet der Informatik ihre Kenntnisse im selbstständigen Arbeiten mit wissenschaftlicher Literatur sowie im mündlichen und schriftlichen Präsentieren von fachwissenschaftlichen Inhalten. In Diskussionen wird die Fähigkeit zur kritischen Reflektion geübt. Im fachlichen Teil des Seminars stehen aktuelle Themen der Verteilten Systeme im Fokus. Abhängig vom Thema lernen Studierende ein konkretes System oder ein Konzept Verteilter Systeme kennen. Sie können diese Systeme in einen größeren Kontext einordnen und deren Vor- und Nachteile selbständig ableiten.|
|Inhalt:||Zu Beginn des Seminars werden Themen des wissenschaftlichen Arbeitens (z.B. Literaturrecherche, Schreiben einer Publikation, Präsentationstechniken) eingeführt, um den Studenten eine methodische Hilfestellung zu geben. Die Erstellung der eigentlichen Ausarbeitung und Präsentation erfolgt in individueller Betreuung. Die Ergebnisse werden in einer Abschlusspräsentation vorgestellt.|
|Literatur:||Wird je nach Thema zu Beginn der Veranstaltung bekannt gegeben.|
|Bewertungsmethode:||Leistungsnachweis über erfolgreiche Teilnahme. Diese umfasst Anwesenheit und enthält Ausarbeitung, Vortrag und Mitarbeit.|
|Arbeitsaufwand:||Präsenzzeit: 30 h |
Vor- und Nachbereitung: 90 h
Summe: 120 h