Bernhard Plattner: Catalogue data in Autumn Semester 2014

Name Prof. em. Dr. Bernhard Plattner
FieldTechnische Informatik
Address
Inst. f. Techn. Informatik u. K.
ETH Zürich, ETZ G 83
Gloriastrasse 35
8092 Zürich
SWITZERLAND
Telephone+41 44 632 70 00
E-mailplattneb@ethz.ch
DepartmentInformation Technology and Electrical Engineering
RelationshipProfessor emeritus

NumberTitleECTSHoursLecturers
227-0575-00LAdvanced Topics in Communication Networks: Software-Defined Networking6 credits4GB. Plattner, B. L. H. Ager, P. Georgopoulos, M. Happe, K. A. Hummel
AbstractThis lecture discusses a range of important advanced topics in communication networks. It covers state-of-the-art topics both related to wired and wireless networks and draws on current research. Lectures are presented by senior people of this group as well as external invited lecturers that are prominent researchers in some of the topics discussed.
ObjectiveThis lecture fills a gap between the introductory networking course offered in the bachelor study program (Communication Networks) and the doctoral level, and to prepare students to read and evaluate peer research work, as well as to produce their own. There is no similar course offered elsewhere at ETH (also considering the course offerings of D-INFK), therefore we anticipate that this course may also be chosen as an elective course by D-INFK students. The character of the course is research-oriented and thus should also be of interest to doctoral students.
ContentSoftware-defined networking (SDN) it an emerging hot topic in communication networks. In all networks, there is a distinction between the control plane, where configuration (and especially routing) decisions are communicated, and the data plane, where user data is transported.

The control and data planes are at present closely intertwined; interfaces between the control and data planes are presently closed, located within the internals of proprietary routers and switches. SDN separates the control from the data plane and introduces an open interface between them. The control plane is moved to a remote server and operates on top of a Network Operating System (NOS).

Opening up the interface between the control and data planes enables experimentation with new mechanisms that control how packets are routed. Innovative packet routing schemes, e.g., tailored for data center networks, are deployed as applications that run on top of the NOS without requiring changes to routers and switches. Networks therefore become much more programmable than today.

The SDN architecture has emerged in the last 2-3 years and it has attracted significant interest from the industry. It is already supported by a number of vendors, including Cisco and Juniper, and it is presently used in the data center network of Google.

This course will cover an introduction to SDN, including OpenFlow; network operating systems; virtualisation; software-defined hardware; SDN applications; SDN security; SDN use cases and much more. For details, see http://www.csg.ethz.ch/education/lectures/ATCN/hs2014.

We will have a few lectures by distinguished guest speakers.

We provide hands-on experience with programming SDN networks through some of our exercises.
Lecture notesThe reading material for this course will be based on class notes, as well as research papers assigned as recommended reading material for each topic.
LiteratureResearch papers will be recommended as reading material for each topic.
Prerequisites / NoticePrerequisite: Communication Networks or equivalent.
Intended audience: master and doctoral students.
227-0577-00LNetwork Security6 credits2V + 1U + 1PB. Plattner, T. P. Dübendorfer, S. Frei, A. Perrig
AbstractThis lecture discusses fundamental concepts and technologies in the area of network security. Several case studies illustrate the dark side of the Internet and explain how to protect against such threats. A hands-on computer lab that accompanies the lecture gives a deep dive on firewalls, penetration testing and intrusion detection.
Objective•Students are aware of current threats that Internet services and networked devices face and can explain appropriate countermeasures.
•Students can identify and assess known vulnerabilities in a software system that is connected to the Internet.
•Students know fundamental network security concepts.
•Students have an in-depth understanding of important security technologies.
•Students know how to configure a real firewall and know some penetration testing tools from their own experience.
ContentRisk management and the vulnerability lifecycle of software and networked services are discussed. Threats like denial of service, spam, worms, and viruses are studied in-depth. Fundamental security related concepts like identity, availability, authentication and secure channels are introduced. State of the art technologies like secure shell, network and transport layer security, intrusion detection and prevention systems, cross-site scripting, secure implementation techniques and more for securing the Internet and web applications are presented. Several case studies illustrate the dark side of the Internet and explain how to protect against current threats. A hands-on computer lab that accompanies the lecture gives a deep dive on firewalls, penetration testing and intrusion detection.
This lecture is intended for students with an interest in securing Internet services and networked devices. Students are assumed to have knowledge in networking as taught in the Communication Networks lecture. This lecture and the exam are held in English.
Prerequisites / NoticeKnowldedge in computer networking and Internet protocols (e.g. course Communication Networks (D-ITET) or Operating Systems and Networks (D-INFK).

Due to recent changes in the Swiss law, ETH requires each student of this course to sign a written declaration that he/she will not use the information given in this for illegal purposes. This declaration will have to be signed and submitted no later than at the begining of the second lesson.
252-4601-00LCurrent Topics in Information Security Information 2 credits2SD. Basin, S. Capkun, B. Plattner
AbstractThe seminar covers various topics in information security: security protocols (models, specification & verification), trust management, access control, non-interference, side-channel attacks, identity-based cryptography, host-based attack detection, anomaly detection in backbone networks, key-management for sensor networks.
ObjectiveThe main goals of the seminar are the independent study of scientific literature and assessment of its contributions as well as learning and practicing presentation techniques.
ContentThe seminar covers various topics in information security, including network security, cryptography and security protocols. The participants are expected to read a scientific paper and present it in a 35-40 min talk. At the beginning of the semester a short introduction to presentation techniques will be given.

Selected Topics

- security protocols: models, specification & verification
- trust management, access control and non-interference
- side-channel attacks
- identity-based cryptography
- host-based attack detection
- anomaly detection in backbone networks
- key-management for sensor networks
LiteratureThe reading list will be published on the course web site.