Department 3: Internet Architecture

The Internet is a hugely successful human made artifact that has changed the society fundamentally. In becoming such a hugely successful infrastructure the usage of the Internet and, thus, the Internet has and continues to change as my research has highlighted. Thus, we have to

  • continuously analyze the usage as well as the underlying infrastructure,
  • understand the current performance bottlenecks,
  • explore how novel applications interact and should interact with the infrastructure,
  • design appropriate network management mechanisms and security mechanisms,
  • explore how to incentivize efficient network usage and network upgrades.

One important understudied aspect are the effects of Internet outages with can be dramatic for manufacturing, financial markets, critical infrastructures, and entertainment. Among the future challenges in this context are understanding the interdependencies of the infrastructures,

  • predicting the impact of (partial) outages,
  • ensuring sufficient redundancy within the infrastructure.

Nowadays, the Internet is about communication, computation, and storage. IT-cloud providers provide “on demand” connectivity for user to the cloud. Internet Service Providers (ISPs) are in the process of deploying fog networks, microdatacenters co-located with network aggregation points. With this infrastructure we can realize future services via service specific CloudNets: virtual networks that combine clouds with networking. CloudNets - much like cloud resources - can grow, shrink, and/or be moved dynamically. Among the future challenges in this context are

  • algorithms to scale, shrink, and place CloudNets,
  • what tailored protocol to use for what application,
  • how to design and utilize mechanism for interactions between the infrastructure and the application.

In a few years staggering volumes of data will be continuously generated almost everywhere. Moreover, this data will grow exponentially. At the same time our analytic and processing capabilities will have further advanced and, e.g., offer intelligent machine learning mechanisms. In addition, everyone wants to be able to have ubiquitous access to information from everywhere at any time.

Thus, data streams will have to be processed and distributed in a coordinated manner in real-time. This requires a distributed processing platform where processing and data can move around freely and securely in an optimal fashion enabling fast reaction time and minimal resource consumption. In the process data provenance, quality criteria, and time constraints, both varying per  customer, will have to be taken into account. This requires the integration of information processing and networking into a single paradigm. We envision that data will flow along various Collaborative Data Processing Pipelines (CDPP). Among the future challenges in this context are:

  • the control as well as data plane of such CDPPs which can be build on top of CloudNets and can take advantage of concepts from software defined networking (SDN) and network function virtualization (NFV) and
  • How to ensure consistency of the global control plane with the actual network configuration across multiple levels of virtualization.

Our Researchers

Our Research Areas

  • Analysis of the Covid-19 pandemic

    In January 2020 the COVID-19 pandemic, a coronavirus variant spreading across the entire globe, reached central Europe. In the beginning, many people underestimated the impact the virus would have on our entire life in the coming months. Once the first lockdown was imposed in March it quickly became clear that things would drastically change. The Internet was a vital component to maintain as much normality as possible. With this increased demand the question arose whether the Internet can serve that demand or if it was near a collapse. To investigate this issue we started the COVID measurement project.

    More information
  • Benchmarking congestion-control algorithms

    Network congestion, the state where nodes receive more data than they can handle, leads to packet losses, increased network delay and reduced throughput for all data flows passing through a congested node. Despite four decades of research on congestion-control algorithms or schemes, there is yet no “one-size fits-all" solution.

    More information
  • Care, People, Gender, Culture

    In January 2020 the COVID-19 pandemic, a coronavirus variant spreading across the entire globe, reached central Europe. In the beginning, many people underestimated the impact the virus would have on our entire life in the coming months. Once the first lockdown was imposed in March it quickly became clear that things would drastically change. The Internet was a vital component to maintain as much normality as possible. With this increased demand the question arose whether the Internet can serve that demand or if it was near a collapse. To investigate this issue we started the COVID measurement project.

    More information
  • Digital Infrastructure

    In the modern era, the backbone of our interconnected world is built upon a complex network of digital infrastructure. Digital infrastructure encompasses the underlying framework of technologies, systems, and networks that facilitate the flow of information, services, and data across the digital landscape. From the cables and hardware that form the physical infrastructure to the software and protocols that govern communication, digital infrastructure is the invisible yet indispensable foundation upon which our digital society thrives. This includes telecommunications networks, data centers, cloud computing services, internet exchanges, and much more. As technology continues to evolve at a rapid pace, the importance of robust and resilient digital infrastructure becomes increasingly apparent, serving as the conduit for innovation, economic growth, and societal advancement. Understanding and nurturing this infrastructure is essential for ensuring a prosperous and interconnected future.

    More information
  • Emerging Platforms and Communities on the Web

    The Web consists of numerous Web communities, news sources, and services, which are often used by various actors for potentially nefarious purposes.

    More information
  • Flow queries

    Many network operations, ranging from attack investigation and mitigation to traffic management, require answering network-wide flow queries in seconds. In this project, we investigate how to improve the response time for apriori unknown network-widequeries.

    More information
  • Future-proof the Internet

    In an ever-evolving digital landscape, the concept of future-proofing the internet has become paramount. As society becomes increasingly reliant on digital connectivity for communication, commerce, and collaboration, ensuring the resilience, scalability, and security of the internet infrastructure has emerged as a critical concern. Future-proofing the internet involves implementing strategies and technologies to anticipate and adapt to the evolving demands and challenges of the digital age.

    More information
  • Internet of Things

    The number of IoT devices deployed within homes is increasing rapidly. It is estimated that the IoT population will increase to 20 billion by 2025. While users deploy some IoT devices explicitly, they are often unaware of the security threats and privacy consequences of using such devices.

    More information
  • Internet Security

    In today's digital age, where virtually every aspect of our lives is interconnected through the internet, ensuring robust internet security has become a paramount concern. Internet security refers to the measures and protocols put in place to protect the integrity, confidentiality, and availability of data transmitted over the internet. With the proliferation of cyber threats such as malware, phishing attacks, ransomware, and data breaches, individuals, businesses, and governments alike must prioritize safeguarding their online activities and information.

    More information
  • Online content moderation

    Online content moderation is an important aspect of online social networks as it ensures that content posted by users abides by the platform’s guidelines and is appropriate for other users.

    More information
  • Online hate speech & conspiracy theories

    The spread of offensive language and hate speech online is an important and timely issue that exists on social networks.

    More information
  • Routing & Network Management

    The Internet is an essential part of most people’s daily life. Its popularity is largely driven by the diverse services it offers. To interact with services, user devices needs to identify and reach the infrastructure they are hosted on.

    More information
  • Understanding, Detecting, and Mitigating Weaponized Information

    Weaponized information refers to carefully crafted information that aims to deceive people or information that is presented in such a way to manipulate or attack users.

    More information
  • Port 0

    In this project, we perform active and passive measurements to investigate the origins and causes of port 0 traffic on the Internet.

    More information
  • Verification of Programmable Networks

    The underlying networks serving the online services and applications of a business must be reliable, secure, and highly available. Outages caused by defective network devices, misconfigurations, or security breaches can lead to expensive losses. Consequently, network verification is a crucial task in the network management and control process.

    More information
  • Video streaming

    Video streaming is omnipresent and, due to recent global events, the number of people being at home watching streamed video only increased further.

    More information
  • VPN

    Virtual Private Networks (VPNs) provide secure communication mechanisms, such as encryption and tunneling, enabling users to circumvent censorship, to access geo-blocked services, or to securely access an organization’s resources remotely. However, VPN services come with different vulnerabilities or security issues, including weak security protocols, privacy issues, and reliability. First, this project aims at detecting different VPN servers worldwide, then, at measuring how vulnerable these detected VPN service are to different kinds of attacks such as version downgrade attack.

    More information