Module | | Peer-to-Peer-Systeme und Sicherheit (IN2194) | |
---|
Lecture | | Peer-to-Peer-Systems and Security
| |
---|
Language | | English | |
---|
Lecturers | | Prof. Dr.-Ing. Georg Carle, Christian Grothoff Ph.D., Dr. Heiko Niedermayer | |
---|
SWS | | 3V + 1Ü | |
---|
ECTS Credits | | 5.0 | |
---|
Dates | | Mondays 10-12 and Thursdays 14-16 in the room MI 00.13.009A | | |
---|
Contents | | The lecture covers:
Chapter 1: Peer-to-Peer Systems (40 %)
Chapter 2: Security (30 %)
Chapter 3: Anonymity (30 %)
Peer-to-Peer Systems and Overlay Networks cause a major part of the traffic on the Internet. The lecture presents the mechanisms and protocols of such networks and explains a set of selected systems. BitTorrent allows an efficient and cooperative transfer of large files. Structured Peer-to-Peer Systems like Distributed Hash Tables allow an efficient lookup for index pointers or nodes in a scalable, efficient, and robust way. The security chapter focuses on advanced non-standard issues of network security. The primary focus is on security issues that are related to Peer-to-Peer Systems. The last chapter is about anonymity on the Internet and it discusses mixes and re-routers as well as systems like Tor and Gnunet.
Dates | No. | Chapter / Section Name | Version | PDF 1up | |
---|
16.4. | 0 | Introduction | 16.4. | PDF | | 16.4. | 1.1 | P2P Basics | 16.4. | PDF | | 26.4. - 3.5. | 1.2 | P2P Unstructured Networks | 16.4. | PDF | | 3.5. - 21.5. | 1.3 | P2P Structured Networks | 2.5. | PDF | | | | | | | | 31.5. | 1.4 | P2P Other Issues | 1.6. | PDF | | 31.5. | 1.5 | P2P General Aspects | 1.6 | PDF | | 4.6., 18.6. | 2.1 | Security Basics | 1.6. | PDF | | 21.6., 25.6. | 2.2 | P2P-specific Security | 27.6. | PDF | | 28.6. | 2.3 | Resistance | 27.6. | PDF | | 2.7. - 19.7. | 3 | Anonymity (see page) | | | | | | | | | |
Slides on Electronic Money / BitCoin (not official part of lecture)
| |
---|
Practical assigment | | Information on and registration for the practical assignment: see http://www.grothoff.org/christian/teaching/2012/2194/
Lectures and Hands-on Session for practical assignment on 19.4. and 23.4.
| |
---|
Exercises | | Exercise 1 (3.5., deadline 10.5., course 14.5.) Graph for assignment 1.5 (maybe helpful to simulate operations in graph) Solution 1
Exercise 2 (21.5. deadline 31.5., course 4.6.) Solution 2
Exercise 3 (21.6., deadline extended to 5.7.! , course 9.7.) Solution 3
Exercise 4 (28.6., deadline extended to 9.7. 10 h before course! Please try to hand in on 5.7. if possible , course 9.7.) Solution 4
|
|
---|
| | | |
---|
|
|