Nils Rodday

ORCID: 0000-0002-1093-8364
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Software-Defined Networks and 5G
  • Network Packet Processing and Optimization
  • Vehicular Ad Hoc Networks (VANETs)
  • Network Traffic and Congestion Control
  • Mobile Ad Hoc Networks
  • Adversarial Robustness in Machine Learning
  • Wireless Networks and Protocols
  • Security and Verification in Computing
  • Industrial Automation and Control Systems
  • Software System Performance and Reliability
  • European Union Policy and Governance
  • Cryptographic Implementations and Security
  • Advanced Algorithms and Applications
  • Advanced Data Storage Technologies
  • Distributed systems and fault tolerance
  • Military Defense Systems Analysis
  • Cybersecurity and Cyber Warfare Studies
  • Indoor and Outdoor Localization Technologies
  • Terrorism, Counterterrorism, and Political Violence
  • Access Control and Trust
  • Opportunistic and Delay-Tolerant Networks
  • IPv6, Mobility, Handover, Networks, Security
  • Cooperative Communication and Network Coding

Universität der Bundeswehr München
2018-2025

University of Twente
2016-2023

We are currently observing a significant increase in the popularity of Unmanned Aerial Vehicles (UAVs), popularly also known by their generic term drones. This is not only case for recreational UAVs, that one can acquire few hundred dollars, but more sophisticated ones, namely professional whereby cost reach several thousands dollars. These UAVs to be largely employed sensitive missions such as monitoring critical infrastructures and operations police force. Given these applications,...

10.1109/noms.2016.7502939 article EN NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium 2016-04-01

ABSTRACT The Border Gateway Protocol (BGP) is known to have serious security vulnerabilities. One of these vulnerabilities BGP route leaks. A leak describes the propagation announcements beyond their intended scope, violating Gao‐Rexford model. Route leaks may lead traffic misdirection, causing performance issues and potential risks, often due mistakes misconfiguration. Several solutions been published are currently greatly discussed within Internet Engineering Task Force (IETF) but yet be...

10.1002/nem.70002 article EN cc-by International Journal of Network Management 2025-01-30

Nearly all scenarios in the networking domain require reliable radio communication. However, for some use-cases such as military operations or disaster recovery realm of catastrophic events it is even more crucial successful completion. In practice, MANETs are commonly used these they expose features that suit well civil requirements very well, e.g. strict QoS limitations and specific data type support. Since new applications not only transmission static content, but instead continuous...

10.1109/wimob.2019.8923172 article EN 2019-10-01

The adoption of the Resource Public Key Infrastructure (RPKI) is increasing. To better understand and improve RPKI deployment, measuring route origin authorization (ROA) objects, validation (ROV), resilience essential. In this paper, we survey RPKI-related research that aims to deployment. Additionally, enrich our with many industry IETF-related contributions. Our work provides an in-depth analysis ideas challenges discussed in studies ecosystem includes lessons from mistakes made past,...

10.1109/tnsm.2023.3327455 article EN cc-by-nc-nd IEEE Transactions on Network and Service Management 2023-10-25

BGP has been known to be vulnerable hijacking and path manipulation attacks for many years. Several solutions have proposed secure either the origin, path, or both. A issue new ideas is their evaluation. Simulation environments are easy use but can only mimic real-world deployments a certain extent. In this work, we propose BGPEval. framework that capable of creating large-scale testbeds based on KVM hypervisor Docker container technology mimics interconnection ASes according provided AS...

10.23919/cnsm59352.2023.10327905 article EN 2023-10-30

In this paper, we argue that the design of a responsible Internet requires clear understanding current state deployment. This work sheds light on default routing in Internet, strategy reduces control but may help to increase availability when forwarding packets. We revisit and extend two common methodologies based active measurements coverage accuracy. Our results show larger differences between methodologies. confirm route deployment strongly correlates with customer cone size autonomous...

10.1145/3472951.3473505 article EN 2021-07-31

Moving Target Defense (MTD) represents a way of defending networked systems on different levels. It mainly focuses shifting the surfaces protected environment. Existing approaches studied network-level are Port Hopping (PH), which shifts ports, and Network Address Shuffling (NAS), steadily alters network addresses hosts. As result, formerly static attack surface now behaves dynamically whilst relationship ports to services hosts can be changed. Most MTD have only been evaluated theoretically...

10.1145/3411496.3421223 article EN 2020-11-02

In this work we compare seven currently available Resource Public Key Infrastructure (RPKI) validators regarding their ease of installation, performance, consistency in results, code quality, applicability, and feature-richness. We weigh the different characteristics rank each validator based on scores it received during our tests. find Routinator to perform best recommend using RPKI a production environment. Additionally, uncover inconsistencies validation results between investigate...

10.1109/icufn55119.2022.9829712 article EN 2022 Thirteenth International Conference on Ubiquitous and Future Networks (ICUFN) 2022-07-05

BGP is known to be inherently insecure. Many solutions have been proposed, with the RPKI becoming operational in 2011. The only provides origin validation. This leaves path manipulation attacks and route leaks unsolved. In this demo session, we present our integration of two plausibility algorithms, namely ASPA AS-Cones, into GoBGP routing daemon. We advantages drawbacks both approaches extend NIST BGP-SRx software suite first implementation AS-Cones.

10.23919/cnsm59352.2023.10327846 article EN 2023-10-30

The deployment of the Resource Public Key Infrastructure (RPKI) is currently gaining traction within operator community and so are measurement methodologies trying to measure current status. These methodologies, which attempting infer Autonomous Systems (ASs) performing Route Origin Validation (ROV), applied onto real world data but validation results usually hard as no ground-truth dataset exists. We propose build such a with help Mininet in way that ROV can be evaluated testbed filtering...

10.1145/3386367.3431669 article EN 2020-11-23

The demand on faster wireless data rates for mobile devices is a known issue since multimedia traffic has been the rise. This affects Multi-hop D2D communications as well MANETs architectures, especially time critical transmissions such video calls. On other hand, QoS in combination with have extensively studied last decades. Hence, It that these networks difficulties delivering high because there no central instance place. Even by introducing controller, it brings up question how to keep...

10.1109/massw.2019.00051 article EN 2019-11-01

Dealing with video streams, transmitting various pictures or even exchanging files a mobile device is common practice in today's world. Such services produce large amount of data which has to be transferred over network. For the current Internet infrastructure, these amounts do not pose problem. MANETs contrast struggle high network load due their specific features, namely mobility and decentralized infrastructure. However, some use cases those features are advantageous for civil as well...

10.1109/rtuwo.2018.8587885 article EN 2018-11-01

TCP/IP has been around for decades and even though it is a connection-oriented protocol, an important number of connections get interrupted or lost compromising the information transferred. We propose approach to measure quality connection by using finite-state machines (FSMs) based on protocol definition. Our method can parse any traffic-dump file report success ratio both client server comparing packets sent received with transitions defined FSM. This implementation have multiple...

10.1109/itnac46935.2019.9078021 article EN 2019-11-01
Coming Soon ...