Research Topics
Current research areas and possible thesis topics in the MMNet Research Group.
The following research areas form the core of work in the MMNet Research Group. Specific thesis topics are developed in an initial meeting — your own ideas within these areas are explicitly welcome.
Network Security & Privacy
Internet Telemetry and Privacy
Analysis of privacy and security issues in modern network devices and services. Investigation of telemetry data, data-sharing practices, and privacy implications in home networks and enterprise infrastructures.
IoT Device Security Analysis
Reverse engineering, protocol analysis, and security assessment of networked devices (smart home, industrial control). Focus on communication protocols and update mechanisms.
Future Internet Architectures
BGP Security and Routing Problems
The Border Gateway Protocol (BGP) is a critical but vulnerable foundation of the internet. Topics include route hijacking detection, RPKI deployment, and anomaly detection in routing tables.
IPv6 Transition and Co-Existence
Analysis of IPv6 adoption barriers, dual-stack issues, tunneling mechanisms, and security aspects of IPv6 migration.
Software-Defined Networking (SDN) & NFV
Network architectures based on SDN controllers (OpenDaylight, ONOS), Network Function Virtualization, and their application in data centers and campus networks.
AI Applications in Networks
Machine Learning for Network Analysis
Application of ML methods for traffic classification, anomaly detection, intrusion detection, and capacity planning. Datasets from real network environments.
Impact of AI Services on Network Infrastructure
Analysis of bandwidth requirements, latency profiles, and infrastructure load caused by generative AI services (LLMs, image generation, video AI) — a current and growing research field.
Edge Computing & AI Inference
Offloading AI inference to the network edge: latency, energy efficiency, model compression, and coordination between edge and cloud.
Containerization & DevOps
Container Security and Isolation
Security analyses of Docker and Kubernetes deployments: breakout scenarios, network isolation, supply-chain security in container images.
Network Monitoring and Observability
Building monitoring infrastructures with modern stack components (Prometheus, Grafana, ELK), distributed tracing, and SLO definitions.
Note: This is not an exhaustive list. Feel free to reach out with your own ideas that fit into one of the areas above.