Seminar on Internet Technologies (Summer 2016): Difference between revisions

Asridha (talk | contribs)
Xchen1 (talk | contribs)
 
(17 intermediate revisions by 3 users not shown)
Line 2: Line 2:


{{Announcement|Note:  
{{Announcement|Note:  
Please check the topic availability and register for the course with the topic supervisors directly via sending emails.}}
Please directly submit the report to your topic supervisor before 1st Oct. 2016!
 
For any general questions or grading issue, please contact Dr. Mayutan Arumaithurai.}}


{{CourseDetails
{{CourseDetails
|credits=5 ECTS (BSc/MSc AI); 5 (ITIS)
|credits=5 ECTS (BSc/MSc AI); 5 (ITIS)
|module= M.Inf.1124 ''-or-'' B.Inf.1207/1208; ITIS Module 3.16: Selected Topics in Internet Technologies
|module= M.Inf.1124 ''-or-'' B.Inf.1207/1208; ITIS Module 3.16: Selected Topics in Internet Technologies
|lecturer=[http://www.net.informatik.uni-goettingen.de/people/xu_chen Dr. Xu Chen]
|lecturer=[http://www.net.informatik.uni-goettingen.de/people/mayutan_arumaithurai Dr. Mayutan Arumaithurai] [http://www.net.informatik.uni-goettingen.de/people/xu_chen Dr. Xu Chen]
|ta=[None]
|ta=[None]
|time=April 14, 16:00ct: Introduction Meeting
|time=April 14, 16:00ct: Introduction Meeting
Line 32: Line 34:
* '''April 14, 16:00ct''': Introduction meeting  
* '''April 14, 16:00ct''': Introduction meeting  
* '''Aug. 04, 2016''' : Deadline for registration
* '''Aug. 04, 2016''' : Deadline for registration
* '''Aug. 11, 2016''' : Presentations
* '''Aug. 11&12, 2016''' : Presentations
* '''Sept. 30, 2016, 23:59''': Deadline for submission of report (should be sent to the topic adviser!)
* '''Sept. 30, 2016, 23:59''': Deadline for submission of report (should be sent to the topic adviser!)


==Final Presentation==
==Final Presentation==
To be determined
 
{| align="center" class="wikitable sortable" {{Prettytable}}
|-
|{{Hl2}} |'''Time Slot (August 11, 2016)'''
|{{Hl2}} |'''Student'''
|{{Hl2}} |'''Advisor'''
|-
| 2:00PM -- 2:30PM
| Md. Khalilur Rahman Khan
| Tao Zhao
|-
| 2:30PM -- 3:00PM
| Chencheng Liang
| Hong Huang
|-
| 3:00PM -- 3:30PM
| Alireza Amiri
| Osamah
|-
| 3:30PM -- 4:00PM
| Mohammad Sahihi Benis
| Osamah
|-
| 4:00PM -- 4:30PM
| Vidya Mohan Sathya
| Tao Zhao
|}
 
 
{| align="center" class="wikitable sortable" {{Prettytable}}
|-
|{{Hl2}} |'''Time Slot (August 12, 2016)'''
|{{Hl2}} |'''Student'''
|{{Hl2}} |'''Advisor'''
|-
| 10:00AM -- 10:30AM
| Rafail Ismayilov
| Sripriya
|-
| 10:30AM -- 11:00AM
| Tayyebe Emadinia
| Mayutan
|-
 
|}


== Topics ==
== Topics ==
Line 142: Line 188:
|-
|-


|'''Urban Sensing Using Mobile Phone Network Data -A survey '''
|'''Urban Sensing Using Mobile Phone Network Data -A survey (assigned to Khan, Md. Khalilur Rahman)'''


The recent development of telecommunication networks is producing an unprecedented wealth of information. Mobile phone datasets offer access to insights into urban dynamics
The recent development of telecommunication networks is producing an unprecedented wealth of information. Mobile phone datasets offer access to insights into urban dynamics
Line 160: Line 206:




|'''Application of Packet Sampling in Computer Security - A Survey''' (assigned to Sudhir Kumar Sah)
|'''Application of Packet Sampling in Computer Security - A Survey (assigned to Sudhir Kumar Sah)'''


Today we have lot of reactive solutions for detecting security attacks. Packet sampling is one of the way to monitor real time network traffic. The aim of this work is to find whether packet sampling techniques like sflow, netflow are matured enough to detect security attacks?  
Today we have lot of reactive solutions for detecting security attacks. Packet sampling is one of the way to monitor real time network traffic. The aim of this work is to find whether packet sampling techniques like sflow, netflow are matured enough to detect security attacks?  
Line 170: Line 216:
|-
|-


|'''Game theory based solutions in Computer Network Security - A Survey''' (assigned to  Florian Pätzold)
|'''Game theory based solutions in Computer Network Security - A Survey (assigned to  Florian Pätzold) '''


Game theory is the mathematical study of conflict and co-operation between rational agents. Game theory is widely used in the computer network security to detect and mitigate attacks. The aim of work is to perform survey on the recent advances in the field.   
Game theory is the mathematical study of conflict and co-operation between rational agents. Game theory is widely used in the computer network security to detect and mitigate attacks. The aim of work is to perform survey on the recent advances in the field.