Vorlesung Peer-to-Peer-Systeme und Sicherheit

Module

Peer-to-Peer-Systeme und Sicherheit (IN2194)

Lecture

Peer-to-Peer-Systeme und Sicherheit

Language

Englisch

Lecturers

Prof. Dr.-Ing. Georg Carle, Christian Grothoff Ph.D., Heiko Niedermayer, Ralph Holz, Nathan Evans

SWS

3V + 1Ü

ECTS Credits

5.0

Dates

Mondays 10-12 and Thursdays 14-16 in the room MI 00.13.009A

Contents

The lecture covers:

Chapter 1: Peer-to-Peer Systems (40 %)

Chapter 2: Security (30 %)

Chapter 3: Anonymity (30 %)

Peer-to-Peer Systems and Overlay Networks cause a major part of the traffic on the Internet. The lecture presents the mechanisms and protocols of such networks and explains a set of selected systems. BitTorrent allows an efficient and cooperative transfer of large files. Structured Peer-to-Peer Systems like Distributed Hash Tables allow an efficient lookup for index pointers or nodes in a scalable, efficient, and robust way. The security chapter focuses on advanced non-standard issues of network security. The primary focus is on security issues that are related to Peer-to-Peer Systems. The last chapter is about anonymity on the Internet and it discusses mixes and re-routers as well as systems like Tor and Gnunet.

Dates

No.

Chapter / Section Name

Version

PDF
1up

PDF
4up

19.04.

0

Introduction

21.04.

PDF

n/a

22.04.,
26.04.

1.1

P2P Basics

21.04.

PDF

PDF

26.04.,
03.05.

1.2a

P2P Unstructured Systems - Basics

23.04.

PDF

PDF

06.05.,
10.05.,
17.05.

1.3

P2P Structured Systems - part 1

05.05.

PDF

PDF

17.05., 27.05

1.3

P2P Structured Systems - part 2

10.05.

PDF

PDF

27.05.

1.2b

P2P Unstructured Systems - Systems

17.05.

PDF

PDF

27.05., 31.05.

1.4

P2P Other Issues

17.05.

PDF

PDF

07.06., 10.06.

2.1

Security - Basics and Fundamental Issues

10.06.

PDF

PDF

14.06., 17.06.

2.2

Security - P2P-specific

20.05.

PDF

PDF

21.06.

3

Anonymity 1

PDF

24.06.

3

Anonymity 2

PDF

28.06.

3

Anonymity 3

PDF

01.07.

3

Anonymity 4

PDF

05.07., 12.07.

2 / 3

Talk on Freenet Routing and Tor

 

PDF

PDF

12.07.

2.3

Security - Resistance

20.05.

PDF

PDF

Registration

Please register (closed) for the course if you want to participate.
If you want to do the exam for the course you also have to register at TUMonline.

Please register (closed) for the practical exercises if you want to participate in them.

Exercises

There will be theoretical excerses as well as a practical project exercise. The theoretical exercises are bi-weekly and prepare for the oral exam at the end. The practical exercises contribute to the exam.

Hand-in on paper in lecture or per mail to niedermayer -at- net.in.tum.de (please send as PDF or pure txt). Please note that the given solutions are often brief and only present the idea. Please also note that in some cases they sketch a variety of possible ideas that could have been taken. It would not have been required to find all of them.

Exercise 1 (hand-in on monday 10.05.) . Exercise course: Thursday 22.05.

Exercise 2 (hand-in on thursday 27.05., due to monday being holiday) Exercise course: Thursday 10.06.

Exercise 3 (hand-in on monday 14.06.)  Exercise course: Thursday 17.06.

Exercise 4 (hand-in on monday 28.06.) Solution. Exercise course: 08.07.

Exercise 5 (hand-in on monday 12.07.)  Exercise course: 15.07.
(Hint: Anonymity set = set of nodes that could be sender (or receiver) of a message)