Research approach
To tackle the challenges the current development of the Internet poses, our research approach is to collect data from operational networks, analyze them using big-data analytics to identify invariants, revisit assumptions, and detect where current performance bottlenecks in the Internet architecture are. Hereby, we use simulation environments to validate our analysis results and to enable “what-if” studies. These insights are then the foundation for shaping the future Internet via optimizations and alternative designs. Hereby, we consider protocol enhancements, novel network management tools, and how to take advantage of concepts from software-defined networking.
The research group will tackle the following topics:
Internet Measurement: Based on continuous observations of the Internet the goal of this group is to understand how the Internet evolves. But it also involves understanding the interdependencies between the network elements and the applications as well as the impact of failures.
Future Internet: Here the focus is on how to evolve the Internet to overcome its current limitations, e.g., by adding better network management capabilities and enhancing the capabilities of CloudNets.
Wide area data analytics: The challenge here is to enable wide area data analytics via collaborative data processing pipelines.
Development of Defence Methodologies for High-Speed Networks: High-speed networks are inherently fragile constructs but also the backbone of many decision-making processes in economy and politics. Finding ways to stabilize the network performance even under duress without impeding speed and bandwidth therefore is a precondition of further development of network-using applications.
Online social networks: In this research area, we aim to analyze activity on online social networks to understand emerging socio-technical issues, develop tools/techniques to detect potentially harmful information (e. g. hatespeech, fake news etc.) and develop and assess the effectiveness of various mitigation strategies.
Analysis of the Covid-19 pandemic
Coordinator:Oliver Gasser
In January 2020 the COVID-19 pandemic, a coronavirus variant spreading across the entire globe, reached central Europe. It became quickly apparent that this development would have an immense impact on our every day life, including the use of the internet. In our research, we took a closer look at how the pandemic changed our use of the internet.
Benchmarking congestion-control algorithms
Coordinator: Emilia Weyulu
Despite four decades of research on congestion-control algorithms, there is yet no “one-size fits-all” solution. There are at least thirty different congestion-control algorithms or schemes as of today, and new ones are still being proposed every so often. Determining how any one scheme falls short in comparison to the rest, and, most importantly, and along what dimensions are quite difficult to answer.
Emerging Platforms/Communities on the Web
Coordinator: Dr. Savvas Zannettou
The Web consists of numerous Web communities, news sources, and services, which are often used by various actors for potentially nefarious purposes. At the same time, it has become increasingly easier to create new platforms and communities, making the Web become a bigger and more complex ecosystem. We aim to study emerging platforms and Web communities that can have a large impact and influence both on the online and offline world and contribute to the research community by making publicly available datasets from social networks.
Flow queries
Coordinator: Said Jawad Saidi
Many network operations, ranging from attack investigation and mitigation to traffic management, require answering network-wide flow queries in seconds. Although flow records are collected at each router, using available traffic capture utilities, querying the resulting datasets from hundreds of routers across sites and over time remains a significant challenge due to the sheer traffic volume and distributed nature of flow records. In this project, we investigate how to improve the response time for apriori unknown network-widequeries.
Internet of Things
Coordinator: Said Jawad Saidi
The number of IoT devices deployed within homes is increasing rapidly. It is estimated that the IoT population will increase to 20 billion by 2025. Such devices include virtual assistants, cameras, TVs, and smart home control devices. While users deploy some IoT devices explicitly, they are often unaware of the security threats and privacy consequences of using such devices.
Routing & Network management
Coordinator: Lars Prehn
Availability, accessibility, and reactivity are the cornerstones of modern web applications. Those characteristics require the underlying network infrastructure to operate not only extremely efficient but also highly robust and flexible. We intensively study the internal and external (routing-related) techniques that networks use to achieve those goals and use our insights to shape the traffic delivery of the future.
Online Content Moderation
Coordinator: Dr. Savvas Zannettou
Online content moderation is an important aspect of online social networks as it ensures that content posted by users abides by the platform’s guidelines and is appropriate for other users. due to the complexity and black-box nature of content moderation there are several open research avenues, such as the effectiveness of specific moderation strategies or how to maximize the output of content moderation and minimize the mental toll on human moderators from continuous exposure to harmful content.
Online Hate Speech
Coordinator: Dr. Savvas Zannettou
The spread of offensive language and hate speech online is an important and timely issue that exists on social networks. The continuous exposure to hateful content can have catastrophic consequences as it can lead to user radicalization and real-world violence (e.g., hate attacks against specific demographic groups). Despite the problem’s importance and societal implications, there are several research gaps in understanding, detecting, and mitigating the spread of hate speech. In this line of work, we aim to study and understand specific forms of hate speech (e.g., Anti Semitism, anti-chinese sentiments, etc.) and develop techniques to automatically detect instances of hate speech.
Port 0
Coordinators: Aniss Maghsoudlou, Oliver Gasser
In this project, we perform active and passive measurements to investigate the origins and causes of port 0 traffic on the Internet.
Understanding, Detecting, and Mitigating Weaponized Information
Coordinator: Dr. Savvas Zannettou
Weaponized information refers to carefully crafted information that aims to deceive people or information that is presented in such a way to manipulate or attack users. The dissemination of weaponized information at large scale can have devastating effects on the online and offline world. Motivated by the importance and impact that weaponized information can have to society, in this line of research, we aim to understand, design techniques to automatically detect instances of weaponized information, and investigate possible mitigation strategies.
Verification of Programmable Networks
Coordinators: Said Jawad Saidi, Seifeddine Fathalli
The underlying networks serving the online services and applications of a business must be reliable, secure, and highly available. Outages caused by defective network devices, misconfigurations, or security breaches can lead to expensive losses. Consequently, network verification is a crucial task in the network management and control process.
Video streaming
Coordinator: Mirko Palmer
Video streaming is next to omnipresent today and an essential part of our everyday life. Nevertheless, the conditions under which user stream videos is not always ideal. The result is poor visual quality, as the underlying algorithms try to select a quality of video that is small enough (meaning reduced amount of data that has to be transferred to the user) to be streamed under all current network conditions or the video does not download at all. Our research found a way to mitigate this problem.
-> Read more.
VPN
Coordinators: Aniss Maghsoudlou, Oliver Gasser
Virtual Private Networks (VPNs) provide secure communication mechanisms. However, VPN services come with different vulnerabilities or security issues at which we take a closer look in our research project.