Id

Project

Description

Link

Students

1

P4 load-balancing

Demonstrate the implementation of P4 load-balancing in a configuration with 5 nodes and 3 links per node

https://github.com/p4lang/tutorials/tree/master/exercises/load_balance

 

ALIOUCHE Sulayman

MARECAR Rasul

MOHAMED SHAMOON Safthar

SAINT-AIME Enrik

2

P4 in-network computing

Implement an in-network computing system based on the BMv2 software switch. Demonstrate the execution of at least 2 instructions.

Paper: Ganesh C. Sankaran, Krishna M. Sivalingam, Harsh Gondaliya, "P4 and NetFPGA based secure in-network computing architecture for AI-enabled Industrial Internet of Things"

Link:
https://github.com/harshgondaliya/PSasCP/tree/master

 

VERGNAULT Louis-Marie

VERITE Thomas

KIRCHGESSNER Guillaume

KINSIONA Dédé

 

3

P4 heavy-hitter detection

Demonstrate the implementation of a heavy hitter detection using P4, showing how the detection performance decreases as the traffic increases

https://github.com/nsg-ethz/p4-learning/tree/master/exercises/06-Heavy_Hitter_Detector

MAURICE Arjun

LEFORT Josselin

MBAREK Meriam

JOUANE Paul

 

4

P4 fast-reroute

Demonstrate the implementation of fast rerouting with loop free alternative with P4, in a configuration with 6 nodes and 4 links per node.

https://github.com/nsg-ethz/p4-learning/tree/master/exercises/12-Fast-Reroute


Al Ayoubi Samar

Atwi Ahmad

Chaita Maissa

Yaker Nourhane

 

5

Container auto scaling-1

Implementation of vertical autoscaling of docker containers/pods (prepare a lab excercise)

https://www.giantswarm.io/blog/vertical-autoscaling-in-kubernetes

OMAR MISSOUM

NOUR EDDINE  BENCHAREF 

IMANE ROUANE 

HAMZA HAJJOU

6

Container auto scaling-2

 

Implementation of horizontal autoscaling of docker containers/pods (prepare a lab excercise)

https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/

BRAHMI Abdenour Yasser  

BRAIK Azouaou 

HAMDINI Cherif 
LERARI Mehdi 

7

Real-world Dataset de-anonymization

Exploit the analysis of crafted malicious packets in a real-world dataset (2022) to de-anonymize it. Apply it to at least one trace per week for the year 2022 (e.g., every Monday)

Paper: will be provided by email (in French)


Dataset link: https://mawi.wide.ad.jp/mawi/samplepoint-F/2022/

 

Elif Ohri

Sara Soltanmohammadi

Ufuk Bombar

 

8

Anomaly detection with ISF algorithm

Determine the performance of Isolation forest to detect anomalie/outliers in time-series data

https://neptune.ai/blog/anomaly-detection-in-time-series

 

RATHORE Vikram Singh   

RASHIDNEJAD Vahid

KAYANI Moheed Ali

KAYANI Maham Fatima 

 

9

Anomaly detection with transformers

Determine the performance of transformers to detect anomalie/outliers in time-series data

https://neptune.ai/blog/anomaly-detection-in-time-series

ADJIOUA Melissa  

BOUROU Nesrine

CHERFAOUI Melissa 

GALLET Camille

 

10

Anomaly detection with GRU

Determine the performance of Gated recurrent unit (GRU) to detect anomalie/outliers in time-series data

https://neptune.ai/blog/anomaly-detection-in-time-series

NANA Adrien

Imounga Kalvin
BENDADA Brahim

 

11

P4-Runtime based controller for fast failure recovery

Demonstrate the application of a novel control plane from recent scientific literature to achieve network failure detection and recovery

Paper:

https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10036033

github:

https://github.com/commlab513/P4-Inband-Network/

BAH Namory

BA Sokhna Khadijatou

Diop Seba

EL MAMOUNI Salah Eddine

12

OVS vs bmv2 software switches

Compare the performance of the two software switches in terms of switching latency and packets per second with different bitrates

OVS: https://docs.openvswitch.org/en/latest/

bmv2:
https://github.com/p4lang/behavioral-model

GOZE Louis

AIRES Alexy

DALIBOT Alan

 

 

13

Container scaling for IoT video traffic

Assess the accuracy and the throughput of an AI model and the network utilization under varying arrival rate of networked IoT video streams. Consider for a single AI model (yolov8) 3 cases: (1) AI model deployed in a single container of medium size; (2) AI model replicated in 5 containers of small size; (3) AI model deployed in a single container of size equals 5 times the small size.

 

https://docs.docker.com/

 

https://docs.ultralytics.com/modes/

 

https://docs.ultralytics.com/modes/track/

ABDELLATIF Abderaouf

MESSAOUDI Mouslim

RAMDANI Abderrahmane 

OMARI Souhil

 

14

 

Container Migration

Implement and demonstrate migration of a container between 2 servers

https://ieeexplore.ieee.org/document/9407315

KHCHOUM Abdelhamid 

EL AFI Mohamed-Amine

BELHOUCHET Mohamed Samy 

BAÏT Alexander

15

Universal Packet Scheduling

Demonstrate the capability of Least Slack Time First (LSTF) scheduling algorithm to minimize Mean Flow Completion Time and Tail Packet Delay, as well as assuring fairness.

Paper:

https://dl.acm.org/doi/pdf/10.1145/2834050.2834085?casa_token=EzMsEjNipUwAAAAA:W5MsyydbbADTJtvcyksLKg28sPZd6GWxS_h4IVVHZvrIq20-0ZFPofcb07urcAjJeLI73EelBWv8NSE

 

github:
https://github.com/NetSys/ups

BENKHELOUF Meriem 

MALAH Nesrine

LEE Eunbi

Assoul Lydia

 

 

 

16

Mirai Botnet DDoS Attack

Deploy a Mirai Botnet testbed using containers, consisting of one CnC (Command and Control), one receiver, two bots, and one target host. The objective is to showcase at least one of Mirai's fundamental functions, including scanning, infection, and DDoS attacks.

https://github.com/jgamblin/Mirai-Source-Code

N’kouka Thierry Isaac

Kar Biswajeet

SEEBARUTH Lawve  

Yves Tulikubwimana

17

Service Function Chain (SFC) traffic scheduling simulator

Demonstrate the use of the SFC TSS discrete event simulator

https://github.com/mblo/sfctss

ERJIL Hichem

EL FAHDI Ismael

 

18

eBPF

Demonstrate at least three eBPF applications

https://ebpf.io

 

GUEMDANI Moussa

LOPEZ CASTELAN Daniel 

SROUR Ali 

STEFANOVA Uliana

19

Deep Learning for LDPC decoding in wireless connections

Compare a Deep Learning based solution for Low-Density Parity-Check decoding with the conventional Min-Sum decoder in terms of Bit Error Rate under different Signal-to-Noise ratio

Paper:
https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9445813

 

Github:

https://github.com/Leo-Chu/Deep-learning-for-LDPC-decoding

BEN SALEM Sara  

TIGHILT Massinissa 

MOTAI Wiame
Yufei ZHONG
Hugo Mendes 

20

SniffnDetect

Demonstrate the use of the Scapy-based DDoS detector SniffnDetect 2.0 to detect at least 3 kinds of attacks and evaluate its resource usage in terms of RAM and CPU under different conditions (idle, during attacks, during attacker identification)

https://github.com/priyamharsh14/SniffnDetect

N’DIAYE Kalifa

CHANDON Francis

ROGNON—BECHTOLD Nathanaël

SIMON Rebecca

 

21

Network attacks with Scapy

Demonstrate the use of Scapy to perform Wifi deauthentication, ARP cache poisoning and DHCP Starvation attacks. Use the code from the suggested github repos (or more) to create a single platform to launch several attacks.

https://github.com/veerendra2/wifi-deauth-attack

https://github.com/rusec/scapy-arpspoof-demo

https://github.com/peppelinux/pyDHCPStarvator

SAID Sayafdine

BERKANE Aris

BENAISSA Mohammed 

NDIAYE Serigne Saliou

22

Snort Intrusion Detection

Demonstrate the use of Snort3 as Intrusion Detection System analysing PCAP files including TCP SYS scans and DoS attacks

https://github.com/snort3/snort3_demo/tree/master

https://www.snort.org/

HAMDAOUI Mohamed Akram 

KRAIM Abdellah

RHAROUABY Oumaima 

23

Labelled data vs unlabelled data

Use ISF ML algorithm and compare the ML performance metrics

https://github.com/mhdadizadeh/CICDDoS2019/blob/master/CICDDoS2019.ipynb

TODOSKOVA Darya

24

Binary neural networks

Compare the performance of BNNs to other non BNN models (choose another DL model)

https://github.com/mhdadizadeh/CICDDoS2019/blob/master/CICDDoS2019.ipynb

 

https://arxiv.org/abs/2110.06804

 

SALMANISEYEDMAHALLE fatemeh 

LAHOUD jean-paul

BASILE GONZALO JONE BASILE john-kennady 

RADJOU kiruthika

25

Rancher demo

Demo Rancher by deploying and managing a microservices-based application. The project will demonstrate how Rancher simplifies the deployment and orchestration of containerized applications.

https://ranchermanager.docs.rancher.com/pages-for-subheaders/quick-start-guides

ZHANG Haoxuan 

SHAO Yitu 

LIU Dingyang 

LUO Kaifeng 

26

KubeVirt

Illustrate the capacity of KubeVirt by demonstrating how it can create and manage virtual machines (VMs) within a Kubernetes environment.

https://kubevirt.io/quickstart_minikube/

BENBELABBES Abdelmalik 

AIT YAHIA Kamelia

BENSARI Fathi

BERHOUN Aghiles

 

27

Firewall  BPF/XDP

Simulate a denial of service attack and demonstrate the performance of BPF/XDP in handling and mitigating the attack by efficiently filtering and processing network traffic.

http://arthurchiao.art/blog/firewalling-with-bpf-xdp/

https://dev.to/xenbytes/simple-xdp-firewall-with-golang-1da3

MANAR Keltoum

EL BEKKAI Boutaina

 

28

eBPF exploitation

Demonstrate some security vulnerabilities in eBPF and effective mitigations to enhance the security of eBPF-enabled environments.

https://sysdig.com/blog/ebpf-offensive-capabilities/

BELKHIRI Khir Eddine

OUADAH Youcef

RECHACHE Aziz

BENTEGAR Sid Ahmed