Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Thomas Zink is active.

Publication


Featured researches published by Thomas Zink.


international conference on peer-to-peer computing | 2012

BitTorrent traffic obfuscation: A chase towards semantic traffic identification

Thomas Zink; Marcel Waldvogel

With the beginning of the 21st century emerging peer-to-peer networks ushered in a new era of large scale media exchange. Faced with ever increasing volumes of traffic, legal threats by copyright holders, and QoS demands of customers, network service providers are urged to apply traffic classification and shaping techniques. These systems usually are highly integrated to satisfy the harsh restrictions present in network infrastructure. They require constant maintenance and updates. Additionally, they have legal issues and violate both the net neutrality and end-to-end principles. On the other hand, clients see their freedom and privacy attacked. As a result, users, application programmers, and even commercial service providers laboriously strive to hide their interests and circumvent classification techniques. In this user vs. ISP war, the user side has a clear edge. While changing the network infrastructure is by nature very complex, and only slowly reacts to new conditions, updating and distributing software between users is easy and practically instantaneous. In this paper we discuss how state-of-the-art traffic classification systems can be circumvented with little effort. We present a new obfuscation extension to the BitTorrent protocol that allows signature free handshaking. The extension requires no changes to the infrastructure and is fully backwards compatible. With only little change to client software, contemporary classification techniques are rendered ineffective. We argue, that future traffic classification must not rely on restricted local syntax information but instead must exploit global communication patterns and protocol semantics in order to be able to keep pace with rapid application and protocol changes.


SpringerPlus | 2015

Efficient hash tables for network applications

Thomas Zink; Marcel Waldvogel

Hashing has yet to be widely accepted as a component of hard real-time systems and hardware implementations, due to still existing prejudices concerning the unpredictability of space and time requirements resulting from collisions. While in theory perfect hashing can provide optimal mapping, in practice, finding a perfect hash function is too expensive, especially in the context of high-speed applications.The introduction of hashing with multiple choices, d-left hashing and probabilistic table summaries, has caused a shift towards deterministic DRAM access. However, high amounts of rare and expensive high-speed SRAM need to be traded off for predictability, which is infeasible for many applications.In this paper we show that previous suggestions suffer from the false precondition of full generality. Our approach exploits four individual degrees of freedom available in many practical applications, especially hardware and high-speed lookups. This reduces the requirement of on-chip memory up to an order of magnitude and guarantees constant lookup and update time at the cost of only minute amounts of additional hardware. Our design makes efficient hash table implementations cheaper, more predictable, and more practical.


Proceedings of the First Workshop on P2P and Dependability | 2012

Efficient BitTorrent handshake obfuscation

Thomas Zink; Marcel Waldvogel

During the last decade, large scale media distribution populated peer-to-peer applications. Faced with ever increasing volumes of traffic, legal threats by copyright holders, and QoS demands of customers, network service providers are urged to apply traffic classification and shaping techniques. These highly integrated systems require constant maintenance, introduce legal issues, and violate both the net neutrality and end-to-end principles. Clients see their freedom and privacy attacked. Users, application programmers, and even commercial service providers laboriously strive to hide their interests and circumvent classification techniques. While changing the network infrastructure is by nature very complex, and it reacts only slowly to new conditions, updating and distributing software between users is easy and practically instantaneous. We present a new obfuscation extension to the BitTorrent protocol, which allows signature free handshaking. The extension requires no changes to the infrastructure and is fully backwards compatible. With only little change to client software, contemporary classification techniques can be rendered ineffective.


Archive | 2009

Packet forwarding using improved Bloom filters

Thomas Zink


Archive | 2010

Analysis and efficient classification of P2P file sharing traffic

Thomas Zink; Marcel Waldvogel


dfn-forum kommunikationstechnologien | 2017

X.509 User Certificate-based Two-Factor Authentication for Web Applications

Marcel Waldvogel; Thomas Zink


NetSys 2015 : International Conference on Networked Systems | 2015

Boost DNS Privacy, Reliability, and Efficiency with opDNS Safe Query Elimination

Marcel Waldvogel; Thomas Zink


Archive | 2014

Webharvesting von Publikationsdaten

Thomas Zink; Oliver Haase; Marcel Waldvogel


Informatiktage | 2013

Universelle Traversierung von NAT-Ger¨ aten

Alexander Diener; Thomas Zink; Oliver Haase


International Journal of Computer Networks & Communications | 2012

P2P-RMI : Transparent Distribution of Remote Java Objects

Thomas Zink; Oliver Haase; Jürgen Wäsch; Marcel Waldvogel

Collaboration


Dive into the Thomas Zink's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Oliver Haase

Konstanz University of Applied Sciences

View shared research outputs
Top Co-Authors

Avatar

Jürgen Wäsch

Konstanz University of Applied Sciences

View shared research outputs
Researchain Logo
Decentralizing Knowledge