|
Id |
Project |
Description |
Link |
Students |
|
1 |
P4 load-balancing |
Demonstrate the implementation of
P4 load-balancing in a configuration with 5 nodes and 3 links per node |
https://github.com/p4lang/tutorials/tree/master/exercises/load_balance |
ALIOUCHE Sulayman MARECAR Rasul MOHAMED SHAMOON Safthar SAINT-AIME Enrik |
|
2 |
P4 in-network computing |
Implement an in-network computing
system based on the BMv2 software switch. Demonstrate the execution of at
least 2 instructions. |
Paper: Ganesh C. Sankaran, Krishna M. Sivalingam, Harsh
Gondaliya, "P4 and NetFPGA based secure in-network computing
architecture for AI-enabled Industrial Internet of Things" |
VERGNAULT Louis-Marie VERITE
Thomas KIRCHGESSNER
Guillaume KINSIONA
Dédé |
|
3 |
P4 heavy-hitter detection |
Demonstrate the implementation of
a heavy hitter detection using P4, showing how the detection performance
decreases as the traffic increases |
https://github.com/nsg-ethz/p4-learning/tree/master/exercises/06-Heavy_Hitter_Detector |
MAURICE
Arjun LEFORT
Josselin MBAREK
Meriam JOUANE
Paul |
|
4 |
P4 fast-reroute |
Demonstrate the implementation of
fast rerouting with loop free alternative with P4, in a configuration with 6
nodes and 4 links per node. |
https://github.com/nsg-ethz/p4-learning/tree/master/exercises/12-Fast-Reroute |
Atwi Ahmad Chaita Maissa Yaker Nourhane |
|
5 |
Container auto scaling-1 |
Implementation of vertical autoscaling of
docker containers/pods (prepare a lab excercise) |
https://www.giantswarm.io/blog/vertical-autoscaling-in-kubernetes |
OMAR MISSOUM NOUR EDDINE BENCHAREF IMANE ROUANE HAMZA HAJJOU |
|
6 |
Container auto scaling-2 |
Implementation of horizontal autoscaling of
docker containers/pods (prepare a lab excercise) |
https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/ |
BRAHMI Abdenour Yasser BRAIK Azouaou HAMDINI Cherif |
|
7 |
Real-world Dataset
de-anonymization |
Exploit the analysis of crafted
malicious packets in a real-world dataset (2022) to de-anonymize it. Apply it
to at least one trace per week for the year 2022 (e.g., every Monday) |
Paper: will be provided by email
(in French)
|
Elif Ohri Sara
Soltanmohammadi Ufuk
Bombar |
|
8 |
Anomaly detection with ISF algorithm |
Determine the performance of
Isolation forest to detect anomalie/outliers in time-series data |
RATHORE Vikram Singh RASHIDNEJAD Vahid KAYANI Moheed Ali KAYANI Maham Fatima |
|
|
9 |
Anomaly detection with
transformers |
Determine the performance of
transformers to detect anomalie/outliers in time-series data |
ADJIOUA
Melissa BOUROU Nesrine CHERFAOUI Melissa GALLET Camille |
|
|
10 |
Anomaly detection with GRU |
Determine the performance of Gated
recurrent unit (GRU) to detect anomalie/outliers in time-series data |
NANA Adrien Imounga Kalvin |
|
|
11 |
P4-Runtime based controller for
fast failure recovery |
Demonstrate the application of a
novel control plane from recent scientific literature to achieve network
failure detection and recovery |
Paper: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10036033 |
BAH Namory BA Sokhna Khadijatou Diop Seba EL MAMOUNI Salah Eddine |
|
12 |
OVS vs bmv2 software switches |
Compare the performance of the two
software switches in terms of switching latency and packets per second with
different bitrates |
OVS: https://docs.openvswitch.org/en/latest/ |
GOZE Louis AIRES Alexy DALIBOT Alan |
|
13 |
Container scaling for IoT video
traffic |
Assess the accuracy and the throughput
of an AI model and the network utilization under varying arrival rate of
networked IoT video streams. Consider for a single AI model (yolov8) 3 cases:
(1) AI model deployed in a single container of medium size; (2) AI model
replicated in 5 containers of small size; (3) AI model deployed in a single
container of size equals 5 times the small size. |
https://docs.ultralytics.com/modes/ |
ABDELLATIF Abderaouf MESSAOUDI Mouslim RAMDANI Abderrahmane OMARI Souhil |
|
14 |
Container Migration |
Implement and demonstrate migration
of a container between 2 servers |
KHCHOUM Abdelhamid EL AFI Mohamed-Amine BELHOUCHET Mohamed Samy BAÏT Alexander |
|
|
15 |
Universal Packet Scheduling |
Demonstrate the capability of
Least Slack Time First (LSTF) scheduling algorithm to minimize Mean Flow
Completion Time and Tail Packet Delay, as well as assuring fairness. |
Paper: github: |
BENKHELOUF Meriem MALAH Nesrine LEE Eunbi Assoul Lydia |
|
16 |
Mirai Botnet DDoS Attack |
Deploy a Mirai Botnet testbed using containers, consisting of one CnC
(Command and Control), one receiver, two bots, and one target host. The
objective is to showcase at least one of Mirai's fundamental functions,
including scanning, infection, and DDoS attacks. |
N’kouka Thierry Isaac Kar Biswajeet SEEBARUTH Lawve Yves Tulikubwimana |
|
|
17 |
Service Function Chain (SFC)
traffic scheduling simulator |
Demonstrate the use of the SFC TSS
discrete event simulator |
ERJIL Hichem EL
FAHDI Ismael |
|
|
18 |
eBPF |
Demonstrate at least three eBPF
applications |
|
GUEMDANI Moussa LOPEZ CASTELAN Daniel SROUR Ali STEFANOVA Uliana |
|
19 |
Deep Learning for LDPC decoding in
wireless connections |
Compare a Deep Learning based
solution for Low-Density Parity-Check decoding with the conventional Min-Sum
decoder in terms of Bit Error Rate under different Signal-to-Noise ratio |
Paper: Github: |
BEN SALEM Sara TIGHILT Massinissa MOTAI Wiame |
|
20 |
SniffnDetect |
Demonstrate the use of the
Scapy-based DDoS detector SniffnDetect 2.0 to detect at least 3 kinds of
attacks and evaluate its resource usage in terms of RAM and CPU under
different conditions (idle, during attacks, during attacker identification) |
N’DIAYE Kalifa CHANDON Francis ROGNON—BECHTOLD Nathanaël SIMON Rebecca |
|
|
21 |
Network attacks with Scapy |
Demonstrate the use of Scapy to
perform Wifi deauthentication, ARP cache poisoning and DHCP Starvation
attacks. Use the code from the suggested github repos (or more) to create a
single platform to launch several attacks. |
https://github.com/veerendra2/wifi-deauth-attack |
SAID Sayafdine BERKANE Aris BENAISSA Mohammed NDIAYE Serigne Saliou |
|
22 |
Snort Intrusion Detection |
Demonstrate the use of Snort3 as Intrusion
Detection System analysing PCAP files including TCP SYS scans and DoS attacks |
https://github.com/snort3/snort3_demo/tree/master |
HAMDAOUI Mohamed Akram KRAIM Abdellah RHAROUABY Oumaima |
|
23 |
Labelled data vs unlabelled data |
Use ISF ML algorithm and compare
the ML performance metrics |
https://github.com/mhdadizadeh/CICDDoS2019/blob/master/CICDDoS2019.ipynb |
TODOSKOVA Darya |
|
24 |
Binary neural networks |
Compare the performance of BNNs to
other non BNN models (choose another DL model) |
https://github.com/mhdadizadeh/CICDDoS2019/blob/master/CICDDoS2019.ipynb https://arxiv.org/abs/2110.06804 |
SALMANISEYEDMAHALLE fatemeh LAHOUD jean-paul BASILE GONZALO JONE BASILE
john-kennady RADJOU kiruthika |
|
25 |
Rancher demo |
Demo Rancher by deploying and
managing a microservices-based application. The project will demonstrate how
Rancher simplifies the deployment and orchestration of containerized applications. |
https://ranchermanager.docs.rancher.com/pages-for-subheaders/quick-start-guides |
ZHANG Haoxuan SHAO Yitu LIU Dingyang LUO Kaifeng |
|
26 |
KubeVirt |
Illustrate the capacity of
KubeVirt by demonstrating how it can create and manage virtual machines (VMs)
within a Kubernetes environment. |
BENBELABBES Abdelmalik AIT YAHIA Kamelia BENSARI Fathi BERHOUN Aghiles |
|
|
27 |
Firewall BPF/XDP |
Simulate a denial of service
attack and demonstrate the performance of BPF/XDP in handling and mitigating
the attack by efficiently filtering and processing network traffic. |
http://arthurchiao.art/blog/firewalling-with-bpf-xdp/ https://dev.to/xenbytes/simple-xdp-firewall-with-golang-1da3 |
MANAR Keltoum EL BEKKAI Boutaina |
|
28 |
eBPF exploitation |
Demonstrate some security
vulnerabilities in eBPF and effective mitigations to enhance the security of
eBPF-enabled environments. |
BELKHIRI Khir Eddine OUADAH
Youcef RECHACHE
Aziz BENTEGAR
Sid Ahmed |
|
|
29 |
SR-SDN |
demonstrate MPLS-based segment routing using ONOS and openvswitch switches |
|
Fethi AIT DIB |