- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Internet Traffic Analysis and Secure E-voting
- Software-Defined Networks and 5G
- Mobile Agent-Based Network Management
- Service-Oriented Architecture and Web Services
- Information and Cyber Security
- Caching and Content Delivery
- Distributed and Parallel Computing Systems
- Software System Performance and Reliability
- Mobile Ad Hoc Networks
- Cooperative Communication and Network Coding
- Smart Grid Security and Resilience
- Vehicular Ad Hoc Networks (VANETs)
- Multi-Agent Systems and Negotiation
- Advanced Manufacturing and Logistics Optimization
- Peer-to-Peer Network Technologies
- Network Traffic and Congestion Control
- Opportunistic and Delay-Tolerant Networks
- Digital Innovation in Industries
- User Authentication and Security Systems
- Adversarial Robustness in Machine Learning
- Cloud Computing and Resource Management
- Anomaly Detection Techniques and Applications
- Constraint Satisfaction and Optimization
Universität der Bundeswehr München
2016-2025
Interface (United Kingdom)
2013
Leibniz Supercomputing Centre
1997-2003
While the term future Internet has gained a lot of interest recently, there is little agreement on what this means or looks like. By taking viewpoint an user who interested in using services and not so much protocols that move data around, we first describe some possible services. In second step derive network service management requirements, discuss them more detail.
ABSTRACT The Border Gateway Protocol (BGP) is known to have serious security vulnerabilities. One of these vulnerabilities BGP route leaks. A leak describes the propagation announcements beyond their intended scope, violating Gao‐Rexford model. Route leaks may lead traffic misdirection, causing performance issues and potential risks, often due mistakes misconfiguration. Several solutions been published are currently greatly discussed within Internet Engineering Task Force (IETF) but yet be...
Abstract The increasing popularity of large language models has not only led to widespread use but also brought various risks, including the potential for systematically spreading fake news. Consequently, development classification systems such as DetectGPT become vital. These detectors are vulnerable evasion techniques, demonstrated in an experimental series: Systematic changes generative models’ temperature proofed shallow learning—detectors be least reliable (Experiment 1). Fine-tuning...
Port scans are a common preliminary step for variety of cyberattacks, from simple hackers, attempted automated exploitation, to professional groups and state actors. They serve as reconnaissance technique that facilitates the planning execution future attacks often conducted stealthily over extended periods evade monitoring systems, making them challenging identify analyse. Despite this, effective detection analysis port can yield valuable cyber threat intelligence (CTI), enabling defenders...
Wireless Sensor Networks (WSNs) have recently emerged as an important research topic. Due to the enormous number of sensor nodes and constrained resources, specific challenges can be identified with respect security. Almost all available commercial are equipped ZigBee transceiver chips, thus making de-facto standard in WSN communication. Since Joshua Wright's KillerBee Framework was released its focus on exploring exploiting security networks, non security-hardened WSNs increase risk being...
Modifying existing malicious software until malware scanners misclassify it as clean is an attractive technique for cybercriminals. In particular, fully automatizing the process can bring adversaries to generate faster effective threats. Recent studies suggest that injecting successful modifications could lead corrupt executable files despite of detection. Therefore, we propose ARMED - Automatic Random Malware Modifications Evade Detection bypass classifiers by valid generation based on...
Cyber Physical Systems (CPSs) are widely expected to be formed of networked resource constrained devices. To suit the constraints such networks, IETF developed RPL routing protocol for Low-power and Lossy Networks (LLNs). Security in CPSs is important maintaining integrity privacy data, while also improving network resiliency attacks. Even though provides support confidentiality messages, details regarding key management signatures not covered. Since complexity size a core concern LLNs,...
In recent years the Internet has evolved into a critical communication infrastructure that is omnipresent in almost all aspects of our daily life. This dependence modern societies on also resulted more criminals using for their purposes, causing steady increase attacks, both terms quantity as well quality. Although research detection attacks been performed several decades, today's systems are not able to cope with attack vectors. One reasons increasing use encrypted strongly limits malicious...
distributed denial-of-service (DDoS) attacks and network scans. 5However, for analyses like SSH web application compromise detection, the use of flow data is much harder.First, lower granularity (compared to packet-based alternatives) generally results in more false positives negatives.Second, artifacts data, such as inaccuracies packet loss, can be subject misinterpretation.It often underestimated how theory lab environments may differ from practice, rendering many flow-based unsuitable...
The "Single European Sky" air traffic management master plan foresees the introduction of several modern digital data links for aeronautical communications. candidate long-range continental communications is L-band Digital Aeronautical Communications System (LDACS). LDACS a cellular, ground-based system flight guidance and related to safety regularity flight. Hence, standards, imposed by International Civil Aviation Organization (ICAO), cybersecurity link network layer, apply. In previous...
In LWE-based KEMs, observed decryption errors leak information about the secret key in form of equations or inequalities. Several practical fault attacks have already exploited such leakage by either directly applying a enabling chosen-ciphertext attack using fault. When leaked is inequalities, recovery not trivial. Recent methods use statistical algebraic (but both), with some being able to handle incorrect information. Having mind that integration side-channel crucial part several classes...
Security related monitoring in high speed backbone networks is still a challenging task, since the amounts of data to process increases continuously. Thus, new approaches need be investigated detect and handle attacks high-speed environments protect underlying access lines. Therefore, we introduce approach for redirecting suspicious traffic taking advantage properties OpenFlow an SDN environment. Using this, are able redirect identified various IDSs further inspection dynamic adaptive way....
Attack traceability and attribution are two of the main tasks IT forensics. To support this, forensics is not limited to investigate data after attack has taken place. Already before attack, an optimal environment for a subsequent investigation be created. While this primarily focused on ordinary logging, we propose set both degree characteristics based geolocation. Thus, conspicuous locations, more knowledge gathered stored in advance (georeputation). Next due fact that distribution IP...
The recent emergence of cloud enabled applications raises security concerns increasingly, since more and personal company data is outsourced. single systems services was broadly treated in the past. Cloud require a detailed observation their requirements fulfillment, huge amount coexist on one virtualization layer without knowing other same layer. Only provider has rare idea these systems' behavior his own environment. Therefore this work proposes network approach which aware all existing...
The provisioning of remote and composed services in support various application areas has dramatically increased over recent times. Thus, the concept Grids evolved, sense a common platform for electronic service multi-domain environments. While, traditionally, have seen quite static existence, many new compositions to take place on-demand certain periods time only. To tackle those issues Virtual Organizations (VO) delivers highly suitable representation such dynamic Grids. However, one...
Quality of Service (QoS) metrics have been traditionally used to evaluate the perceived quality services delivered by network operators. However, these are not suitable for evaluating experience an end-user. The a user is quantified based upon activities such as speed web page loading, video streaming, or voice Internet-telephony. Due temporal and geographical nature mobile networks, may change on location time. Mobile operators prioritize certain over others, leading service type dependent...
A popular choice for anonymous Internet communication, the Tor network uses entry, relay, and exit nodes to hide traffic's origin. However, an investigation that involved running real applications website requests through revealed numerous agglomerations of exiting traffic attacker could exploit.
With the ever rising amount of security and alert information, decision process which incident to address first becomes increasingly important prioritizing incidents is a common approach towards this problem. Meanwhile, networks policies have dynamic complex nature. Machine learning techniques successfully been applied in area intrusion detection systems (IDS) cope with similar challenges. We therefore propose generic rule model for prioritization apply supervised induce priority calculation rules.
Machine learning has proved to be a promising technology determine whether piece of software is malicious or benign. However, the accuracy this approach comes sometimes at expense its robustness and probing these systems against adversarial examples not always priority. In work, we present gradient-based that can carefully generate valid executable files are classified as benign by state-of-the-art detectors. Initial results demonstrate our able automatically find optimal in more efficient...