Future Internet (FI) and Innovative Internet Technologies and Mobile Communication (IITM)

Future Internet (FI) and Innovative Internet Technologies and Mobile Communication (IITM)

Chair of Network Architectures and Services Department of Informatics Technical University of Munich Proceedings of the Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communication (IITM) Summer Semester 2018 26. 2. 2017 – 19. 8. 2018 Munich, Germany Editors Georg Carle, Daniel Raumer, Stephan Gunther,¨ Benedikt Jaeger Publisher Chair of Network Architectures and Services Network Architectures and Services NET 2018-11-1 Lehrstuhl für Netzarchitekturen und Netzdienste Fakultät für Informatik Technische Universität München Proceedings zu den Seminaren Future Internet (FI) und Innovative Internet-Technologien und Mobilkommunikation (IITM) Sommersemester 2018 München, 26. 2. 2017 – 19. 8. 2018 Editoren: Georg Carle, Daniel Raumer, Stephan Günther, Benedikt Jaeger Network Architectures and Services NET 2018-11-1 Proceedings of the Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communication (IITM) Summer Semester 2018 Editors: Georg Carle Lehrstuhl für Netzarchitekturen und Netzdienste (I8) Technische Universität München 85748 Garching b. München, Germany E-mail: [email protected] Internet: https://net.in.tum.de/~carle/ Daniel Raumer Lehrstuhl für Netzarchitekturen und Netzdienste (I8) E-mail: [email protected] Internet: https://net.in.tum.de/~raumer/ Stephan Günther Lehrstuhl für Netzarchitekturen und Netzdienste (I8) E-mail: [email protected] Internet: https://net.in.tum.de/~guenther/ Benedikt Jaeger Lehrstuhl für Netzarchitekturen und Netzdienste (I8) E-mail: [email protected] Internet: https://net.in.tum.de/~jaeger/ Cataloging-in-Publication Data Seminars FI & IITM SS 18 Proceedings zu den Seminaren „Future Internet“ (FI) und „Innovative Internet-Technologien und Mobilkom- munikation“ (IITM) München, Germany, 26. 2. 2017 – 19. 8. 2018 ISBN: 978-3-937201-63-4 ISSN: 1868-2634 (print) ISSN: 1868-2642 (electronic) DOI: 10.2313/NET-2018-11-1 Lehrstuhl für Netzarchitekturen und Netzdienste (I8) NET 2018-11-1 Series Editor: Georg Carle, Technische Universität München, Germany c 2018, Technische Universität München, Germany II Vorwort Vor Ihnen liegen die Proceedings der beiden Seminare „Future Internet“ (FI) und „Innovative Internet- Technologien und Mobilkommunikation“ (IITM), welche die finalen Ausarbeitungen unserer Studierenden enthalten. Die beiden Seminare wurden am Lehrstuhl für Netzarchitekturen und Netzdienste an der Fa- kultät für Informatik der Technischen Universität München im Sommersemester 2018 durchgeführt. Allen Teilnehmerinnen und Teilnehmern stand es wie in der Vergangenheit frei, die Ausarbeitung und den Vortrag in englischer oder in deutscher Sprache zu verfassen. Dementsprechend finden sich sowohl englische als auch deutsche Beiträge in diesen Proceedings. Einige der Vorträge wurden aufgezeichnet und sind auf unserem Medienportal unter https://media.net. in.tum.de abrufbar. Wir hoffen, dass Sie den Beiträgen dieser Seminare wertvolle Anregungen entnehmen können. Falls Sie weiteres Interesse an unseren Arbeiten haben, so finden Sie weitere Informationen auf unserer Homepage https://net.in.tum.de. München, September 2018 Georg Carle Daniel Raumer Stephan Günther Benedikt Jaeger III Preface We are pleased to present you the proceedings of our seminars on “Future Internet” (FI) and “Innovative Internet Technologies and Mobile Communication” (IITM) which took place in the Summer Semester 2018. In all seminar courses organized by our research group, the authors were free to write their paper and give their talk in English or German. Some of the talks were recorded and published on our media portal https://media.net.in.tum.de. We hope that you appreciate the contributions of these seminars. If you are interested in further information about our work, please visit our homepage https://net.in.tum.de. Munich, September 2018 IV V Seminarveranstalter Lehrstuhlinhaber Georg Carle, Technische Universität München, Germany Seminarleitung Daniel Raumer, Technische Universität München, Germany Stephan Günther, Technische Universität München, Germany Benedikt Jaeger, Technische Universität München, Germany Betreuer Paul Emmerich ([email protected]) Quirin Scheitle ([email protected]) Technische Universität München Technische Universität München Stefan Liebald ([email protected]) Dominik Scholz ([email protected]) Technische Universität München Technische Universität München Holger Kinkelin ([email protected]) Jan Seeger ([email protected]) Technische Universität München Technische Universität München Marcel von Maltitz ([email protected]) Fabien Geyer ([email protected]) Technische Universität München Technische Universität München Kajó Márton ([email protected]) Simon Bauer ([email protected]) Technische Universität München Technische Universität München Heiko Niedermayer ([email protected]) Technische Universität München Seminarhomepage https://net.in.tum.de/teaching/ss18/seminars/ VI Inhaltsverzeichnis Future Internet Key Performance Indicators of TCP Flows................................1 Patryk Brzoza (Betreuer: Simon Bauer) Use case study on machine learning for network anomaly detection..................9 Edin Citaku (Betreuer: Simon Bauer) Spieltheoretische Analyse von Blockchains................................ 17 Schahed Hadawal (Betreuer: Heiko Niedermayer) Performance of Message Authentication Codes for Secure Ethernet.................. 27 Philipp Hagenlocher (Betreuer: Dominik Scholz, Fabien Geyer) Fog Computing for Smart Environments................................. 35 Ulrich Huber (Betreuer: Jan Seeger) Self-Driven Computer Networks...................................... 43 Simon Klimaschka (Betreuer: Fabien Geyer) Longitudinal study of user-space packet processing frameworks in academia............. 51 Maik Luu Bach (Betreuer: Paul Emmerich) GDPR - Required Changes By Website Operators And Technical Ways To Check For Compliance 57 Maximilian Muth (Betreuer: Quirin Scheitle) Was ist Privatsphäre?........................................... 67 Benedikt Müller (Betreuer: Marcel von Maltitz) Analyse der Ende-zu-Ende-Verschlüsselung von Nextcloud....................... 73 Emmanuel Syrmoudis (Betreuer: Holger Kinkelin) Evaluation of Distributed Semantic Databases.............................. 81 Philipp Trucksäß (Betreuer: Jan Seeger) Innovative Internet-Technologien und Mobilkommunikation An overview over Capsule Networks................................... 89 Luca Alessandro Dombetzki (Betreuer: Marton Kajo) Attack-Defense-Trees and other Security Modeling Tools........................ 97 Benjamin Löhner (Betreuer: Heiko Niedermayer) Identity Management on the Blockchain................................. 105 Julian Roos (Betreuer: Heiko Niedermayer) Data Management in Distributed Systems................................ 113 Simon Schäffner (Betreuer: Stefan Liebald) Observing TCP Round Trip Times with FlowScope........................... 121 Christian Wahl (Betreuer: Simon Bauer) VII VIII Key Performance Indicators of TCP Flows Patryk Brzoza Advisor: M.Sc. Simon Bauer Seminar Future Internet SS2018 Chair of Network Architectures and Services Departments of Informatics, Technical University of Munich Email: [email protected] ABSTRACT reduce it to a necessary amount of information and to ex- As most of today’s Internet traffic is provided by TCP, this tract various KPIs from it. A range of different approaches also means that the overall performance is heavily depen- from various tools is evaluated in Section 6. Finally, Section dent on the quality of these TCP flows. To make it possible 7 shows which assumptions and conclusions about different to evaluate the state of connections or networks for further network states and events can be made by inspecting the potential problem assessment, it is necessary to introduce priorly collected information. metrics that act as key performance indicators. This paper introduces multiple of these performance metrics and clas- 2. RELATED WORK sifies them into latency, packet loss, throughput and other While this paper’s focus is set on defining and evaluating indicators. As a next step, various methods to conduct mea- KPIs of TCP flows, the performance of TCP has long been surements and data processing approaches to extract valu- subject of previous research. A thorough analysis of the able information are presented and discussed. Finally, this role of TCP/IP in high performance networks has been con- allows to draw conclusions about a flow’s or network’s qual- cluded by Hassan and Jain in [3]. Based on the fundamen- ity and state. tals of the protocol, it defines how to measure the efficiency and create simulations and suitable models for wired and Keywords wireless networks. TCP Flows, Performance Metrics, KPIs, Network Monitor- ing, Intrusion Detection Additionally, the passive extraction of valuable information like the round trip time has been thematized by Shakkottai 1. INTRODUCTION et al. in [4] and forms a base for parts of this paper. Due to its broad range of features and its numerous advan- Finally, there is a broad range of tools that rely on moni- tages, such as providing reliable and ordered communica- toring network performance to conclude events like intrusion tion, TCP has become one of the most important backbones attacks. Examples for this research topic are the tool FlowS- of today’s Internet. As most commonly used protocols (in- can by Plonka in [5] and FIRE by Dickerson in [6]. cluding HTTP, SMTP or FTP) are relying on it, even up to 95% of the total traffic volume is

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    138 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us