Resilient Networks

The lecture resilient networks provides an overview on the basics of secure networks as well as on current threats and respective countermeasures. The current state-of-the-art in the research towards resilient networks is introduced. Resilience-enhancing techniques can be generally classified in proactive and reactive methods. Proactive techniques are redundancy and compartmentalization. Redundancy allows to tolerate attacks to a certain extent, while compartmentalization attempts to restrict the attack locally and preventing its expansion across the whole system. Reactive techniques follow a three step approach by comprising the phases of detecting an attack, mitigate its impacts, and finally restore a system's usual operation.

Based upon this categorisation of resilience strategies the lecture will give an excursus to graph theorie and will introduce generic strategies to increase the resilience of networks, e.g., proactively establishing backup routes and fast restoration strategies. Furthermore, the lecture will provide an overview on BGP routing and the Domain Name Service, as two essential Internet services. Both services are presented and current attacks as well as corresponding countermeasures are described. Moreover, Denial of Service attacks and their mitigation are observed in detail as well as mechanism for increasing the resilience of P2P networks. Finally, Intrusion Detection systems are covered as mechanisms to mitigate the impacts of successful attacks.

Schedule

Type    Day    TimeRoomStartCPs    Lv.Nr.Info
V2Tue   11:40-13:10    S2|02/C110    15.04.2014    6,020-00-0710-iv    Lecture
Ü2 - Group 1Thu    11:40-13:10    

S1|03/125

24.04.201420-00-0710-iv    

Exercise

Ü2 - Group 2Thu13:30-15:00S2|02/A31324.04.201420-00-0710-ivExcercise

17.07.2014: Reading Group 1 in S1|03|125 from 11:40-13:10 and Reading Group 2 in S2|02|A313 from 13:30-15:00

Exercise: Reading Group

The reading group will deal with the following selection of research papers at the respective dates:

24.04.2014     magoni2003tearing
   No reading group on this date!
   Instead review requested by mail.
08.05.2014schneider2013nature, gruber2002pcycles
15.05.2014han2005topology , lee2007multipath
22.05.2014evans2007routing, albert2000errors
05.06.2014nordstroem2004bgp, schuchard2010control
12.06.2014jackson2009rebinding
26.06.2014bilge2011exposure
03.07.2014rossow2014amplification, walfish2006offense
10.07.2014kuzmanovic2006low-rate
17.07.2014zhou2010survey

 

 

 

Literature

[Sch03a]G. Schäfer. Netzsicherheit - Algorithmische Grundlagen und Protokolle, dpunkt.verlag, 435 pages, February 2003
[Pio04]Michal Pioro and Deepankar Medhi - Routing, Flow, and Capacity Design in Communication and Computer Networks, The Morgan Kaufmann Series in Networking, 800 pages, 2004
[BraErl05]  Network Analysis: Methodological Foundations, Springer: Lecture Notes in Computer Science / Theoretical Computer Science and General Issues, 484 pages,2005

Further reading will be provided in the course.

Exam Schedule

The exams take place in S2|02 A313

 

Time\Date4.85.813.8 14.8
09:00BergmannBoeckHarrie   Ankalgi
09:45Gonzalez-Nothnagel    Brandt                Ilyas               Bhulok Bheemarasetty
10:30KlaaßenGensRitterBhatia
11:15MaaßPlumhoffVöstMusa
13:00RajWegemer    Oueslati
13:45ReineckeHaas
14:30SyedSinn
15:15MustafaTasch
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang