Research
The Computer Networks Working Group at the University of Hamburg is dedicated to research in the design, analysis, and security of advanced communication networks. Their work is characterized by a multidisciplinary approach that addresses the technical challenges of modern and future networked systems, with a strong emphasis on resilience, security, and intelligent threat detection.
1. Resilient networks
The group is committed to developing resilient and high-performance communication infrastructures capable of supporting time-sensitive and critical applications. Their research spans innovative approaches in software-defined networks (SDN) and virtualized network functions (VNF), enabling flexible and programmable network management. Sustainability is a key aspect, with efforts directed toward optimizing datacenter networking to reduce energy consumption and environmental impact. Additionally, research extends into wireless networks, including ad hoc communication systems and the deployment of Unmanned Aerial Vehicles (UAVs), to facilitate reliable communication in dynamic and challenging environments.
2. Security and privacy for distributed systems
Recognizing the importance of security in distributed architectures, the group investigates protocols and security mechanisms through thorough analysis and reverse engineering to identify vulnerabilities and improve security measures. Their expertise includes web security and privacy, addressing the privacy-preserving aspects of modern online interactions. A focus is placed on securing modern transport layer protocols such as TLS and QUIC, which underpin secure internet communications. Furthermore, they explore secure middleware solutions and peer-to-peer (P2P) networks, ensuring confidentiality, integrity, and trustworthiness in decentralized systems.
3. Cyber Security Data Science and threat detection
Understanding that cyber threats continually evolve in complexity, the group develops advanced cyber security data science techniques to enable real-time monitoring, intrusion detection, and proactive cyber defense. Their research includes the creation of Digital Security Twins—virtual replicas of physical and digital assets—to simulate and analyze potential attack scenarios. Automated threat hunting methodologies are devised to identify and mitigate threats swiftly without manual intervention. Additionally, they work on the generation, sharing, and application of threat intelligence, fostering collaboration and information exchange to stay ahead of emerging cyber threats.