Resilient Networks

The lecture resilient networks provides an overview on the basics of secure networks as well as on current threats and respective countermeasures. The current state-of-the-art in the research towards resilient networks is introduced. Resilience-enhancing techniques can be generally classified in proactive and reactive methods. Proactive techniques are redundancy and compartmentalization. Redundancy allows to tolerate attacks to a certain extent, while compartmentalization attempts to restrict the attack locally and preventing its expansion across the whole system. Reactive techniques follow a three step approach by comprising the phases of detecting an attack, mitigate its impacts, and finally restore a system's usual operation.

Based upon this categorisation of resilience strategies the lecture will give an excursus to graph theorie and will introduce generic strategies to increase the resilience of networks, e.g., proactively establishing backup routes and fast restoration strategies. Furthermore, the lecture will provide an overview on BGP routing and the Domain Name Service, as two essential Internet services. Both services are presented and current attacks as well as corresponding countermeasures are described. Moreover, Denial of Service attacks and their mitigation are observed in detail as well as mechanism for increasing the resilience of P2P networks. Finally, Intrusion Detection systems are covered as mechanisms to mitigate the impacts of successful attacks.


Type    Day    TimeRoomStartCPs    Lv.Nr.Info
V2Tue   11:40-13:10    S2|02/C110    15.04.2014    6,020-00-0710-iv    Lecture
Ü2 - Group 1Thu    11:40-13:10    




Ü2 - Group 2Thu13:30-15:00S2|02/A31324.04.201420-00-0710-ivExcercise

17.07.2014: Reading Group 1 in S1|03|125 from 11:40-13:10 and Reading Group 2 in S2|02|A313 from 13:30-15:00

Exercise: Reading Group

The reading group will deal with the following selection of research papers at the respective dates:

24.04.2014     magoni2003tearing
   No reading group on this date!
   Instead review requested by mail.
08.05.2014schneider2013nature, gruber2002pcycles
15.05.2014han2005topology , lee2007multipath
22.05.2014evans2007routing, albert2000errors
05.06.2014nordstroem2004bgp, schuchard2010control
03.07.2014rossow2014amplification, walfish2006offense





[Sch03a]G. Schäfer. Netzsicherheit - Algorithmische Grundlagen und Protokolle, dpunkt.verlag, 435 pages, February 2003
[Pio04]Michal Pioro and Deepankar Medhi - Routing, Flow, and Capacity Design in Communication and Computer Networks, The Morgan Kaufmann Series in Networking, 800 pages, 2004
[BraErl05]  Network Analysis: Methodological Foundations, Springer: Lecture Notes in Computer Science / Theoretical Computer Science and General Issues, 484 pages,2005

Further reading will be provided in the course.

Exam Schedule

The exams take place in S2|02 A313


Time\Date4.85.813.8 14.8
09:00BergmannBoeckHarrie   Ankalgi
09:45Gonzalez-Nothnagel    Brandt                Ilyas               Bhulok Bheemarasetty
13:00RajWegemer    Oueslati
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang