TUM computer scientists present tools to protect against cyber attacks at CeBIT (D40, Hall 9)
Peeroskop takes a close look at the Internet
Data packets are sent through the network every time we call up a website or send an e-mail. Routing makes sure that the packets reach their destination. This process is administered by so-called routing protocols. "Hackers can selectively change this routing information," explains Johann Schlamp from the TUM Department of Informatics. But an unintentional error can also lead to an unwanted diversion of the Internet traffic even without manipulation.
The Peeroskop project examines and safeguards Internet connections. At the German Federal Ministry of Education and Research – BMBF (stand D40, Hall 9) joint exhibition stand at CeBIT in Hannover from March 16 to 20, the TUM researchers and their colleagues are showing an example attack on the Internet and demonstrating how Internet providers can effectively protect against such attacks. The topics include an interactive, forensic analysis of so-called prefix hijacking, in which Internet addresses are captured, as well as how to secure Internet paths by means of new standards such as the Resource Public Key Infrastructure (RPKI). In addition, the scientists are looking into the complex issue of whether and how the German part of the Internet can be defined and ruled.
At this year's CeBIT the researchers are presenting the results of three years of joint work with Freie Universität Berlin, the HAW Hamburg and the leading German Internet nodes in the Peeroskop project. The BMBF is funding the project with more than 1.5 million euro.
Trade fair stand: BMBF joint exhibition stand D40, Hall 9
Contact:
Johann Schlamp
Technische Universität München
Department of Informatics
E-Mail: schlamp @in.tum.de
Phone: +49 89 289 18003
Matthias Wählisch
Freie Universität Berlin
Department of Informatics
E-Mail: m.waehlisch @fu-berlin.de
Phone: +49 30 838 75 209