- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Advanced Malware Detection Techniques
- Smart Grid Security and Resilience
- Privacy, Security, and Data Protection
- Peer-to-Peer Network Technologies
- Cybercrime and Law Enforcement Studies
- Opportunistic and Delay-Tolerant Networks
- Access Control and Trust
- Anomaly Detection Techniques and Applications
- Blockchain Technology Applications and Security
- Digital Mental Health Interventions
- Terrorism, Counterterrorism, and Political Violence
- Spam and Phishing Detection
- Smart Grid Energy Management
- Software-Defined Networks and 5G
- Misinformation and Its Impacts
- Transportation and Mobility Innovations
- User Authentication and Security Systems
- Complex Network Analysis Techniques
- Privacy-Preserving Technologies in Data
- Innovative Human-Technology Interaction
- Advanced Optical Network Technologies
- Ethics and Social Impacts of AI
Technical University of Darmstadt
2014-2023
Abstract Smart Home technologies have the potential to increase quality of life, home security and facilitate elderly care. Therefore, they require access a plethora data about users’ homes private lives. Resulting privacy concerns form relevant barrier adopting this promising technology. Aiming support end informed decision-making through addressing we first conducted semi-structured interviews with 42 little-experienced users. Their diverse were clustered into four themes that center...
We present an innovative protocol combining innetwork data aggregation and smart meter billing for a grid scenario. The former enables energy supplier to allocate balance resources. latter provides dynamic pricing schemes according fine-grained consumption profiles. Moreover, meters their can prove values. Since the knows amount of generated electricity consolidated in round measurements, detect loss fraud. To preserve customers' privacy, we use homomorphic commitment scheme with encryption...
Botnet research is one of the many areas affected by coming into force General Data Protection Regulation (GDPR). This article aims to identify most appropriate legal bases that would legitimise data processing in context botnet tracking and give an overview practical implications for practitioners. First, we a technical introduction techniques types processed data. Afterward, argue qualifies as "processing personal data" falls under material scope GDPR. We then present three scenarios where...
Time and time again the security community has faced novel threats that were previously never analyzed, sometimes with catastrophic results. To avoid this, proactive analysis of envisioned is great importance. One such threat blockchain-based botnets. Bitcoin, decentralized cryptocurrencies in general, promise a fair more transparent financial system. They do so by implementing an open censorship-resistant atomic broadcast protocol enables maintenance global transaction ledger, known as...
Many cyber-crimes, such as Denial of Service (DoS) attacks and banking frauds, originate from botnets. To prevent botnets being taken down easily, botmasters have adopted peer-to-peer (P2P) mechanisms to any single point failure. However, sensor nodes that are often used for both, monitoring executing sinkholing attacks, threatening In this paper, we introduce a novel mechanism detect in P2P using the clustering coefficient metric. We evaluated our on real-world botnet Sality over course...
Privacy, in particular anonymity, is required to increase the acceptance of users for Internet Things (IoT). The IoT built upon sensors that encompass us each step we take. Hence, they can collect sensitive, privacy-invading data be used establish complete user profiles. For this reason, sensing needs provide means privacy-protection. In paper, discuss an approach sharing smartphone sensor and user-generated content a privacy-protecting manner via Micro-blogging platform (MbP) Twitter. that,...
The “Smart Bear” is a hypothetical connected-smart toy for children. While the functionalities it presents are appealing to both children and their parents, privacy concerns that raised should be taken into serious consideration. A big amount of personal data child (and probably other uninformed minors adults in physical vicinity) processed analysed, an accurate profile created direct marketing practices would most take place. could suddenly turn surveillance device, while malicious third...
Online social networks (OSNs) represent powerful digital tools to communicate and quickly disseminate information in a non-official way. As they are freely accessible easy use, criminals abuse of them for achieving their purposes, example, by spreading propaganda radicalising people. Unfortunately, due vast usage, it is not always trivial identify using unlawfully. Machine learning techniques have shown benefits problem solving belonging different application domains, when, the huge...
The ever-growing number of cyber attacks originating from botnets has made them one the biggest threat to Internet ecosystem. Especially P2P-based like ZeroAccess and Sality require special attention as they have been proven be very resilient against takedown attempts. To identify weaknesses prepare takedowns more carefully it is thus a necessity monitor by crawling deploying sensor nodes. This in turn provokes botmasters come up with monitoring countermeasures protect their assets. Most...
Botnet attacks have devastating effects on public and private infrastructures. The botmasters controlling these networks aim to prevent takedown attempts by using highly resilient P2P overlays commandeer their botnets, even harden them with countermeasures against intelligence gathering attempts. In fact, recent research indicates that advanced can hamper the ability gather necessary for taking down botnets. this article, we take perspective of botmaster eventually anticipate behavior. That...
Modern energy grids introduce local producers into city networks. Whenever a network is disconnected from the distribution grid, blackout occurs and are disabled. Micro circumvent blackouts by leveraging these to power fixed subset of consumers. In this paper, we evolve micro Holons, which overcome need for subsets as much possible. We contribute formal model Holons investigate impact Holon concept in simulation with 10,000 randomly generated These networks based on parameters obtained...
Estimating the size of a botnet is one most basic and important queries can make when trying to understand impact botnet.Surprisingly unfortunately, this seemingly simple task has confounded many measurement efforts.While it may seem tempting simply count number IP addresses observed be infected, well-known that doing so lead drastic overestimates, as ISPs commonly assign new hosts.As result, estimating infected hosts given longitudinal datasets remained an open problem.In paper, we present...
Defending against botnets has always been a cat and mouse game. Cyber-security researchers government agencies attempt to detect take down by playing the role of cat. In this context, lot work done towards reverse engineering certain variants malware families as well understanding network protocols identify their weaknesses (if any) exploit them. While is necessary, such an approach offers botmasters ability quickly counteract defenders simply performing small changes in arsenals. We...
Social media represent one of the most popular online tools to spread and exchange formal informal information based on specific human interests, habits purposes. As they are free, easy use widely adopted, criminals commonly exploit them quickly disseminate propaganda, recruit people so on. Due vast usage breadth topics discussed them, it is not trivial identify abusing social for their Machine learning techniques have already shown benefits in classification problems different application...
Machine learning based anomaly detection mechanisms are a promising tool to detect and protect networks from previously unknown attacks. The quality of those strongly depends on the availability large amounts data for their training evaluation. However, suitable datasets scarce, as they rarely shared by who possess them. This impedes progress in development deployment sophisticated machine mechanisms. paper aims accelerate this thwarted process introducing network simulation framework...
Since the burgeoning days of IoT, Mirai has been established as canonical IoT botnet. Not long after public release its code, researchers found many variants compete with one another for same vulnerable hosts. Over time, myriad evolved to incorporate unique vulnerabilities, defenses, and regional concentrations. In this paper, we ask: have point that they are fundamentally distinct? We answer question by measuring two most popular descendants: Hajime Mozi. To actively scan both botnets...
Peer-to-peer (P2P) botnets are known to be highly resilient takedown attempts. Such attempts usually carried out by exploiting vulnerabilities in the bots communication protocol. However, a failed attempt may alert botmasters and allow them patch their thwart subsequent As promising solution, takedowns could evaluated simulation environments before attempting real world. To ensure such simulations as realistic possible, churn behavior of must understood measured accurately. This paper...
Conducting research on botnets is oftentimes limited to the analysis of active botnets. This prevents researchers from testing detection and tracking mechanisms potential future threats. Specifically, in domain P2P botnets, protocol specifics, network churn anti-tracking greatly impact success or failure monitoring operations. Moreover, experiments real world commonly lack ground truth verify findings. As developing deploying sufficient size accompanied by large costs administration...
Botnets frequently use DGA and fast-flux techniques to ensure the availability of their command control (CnC) infrastructure. However, CnC IP addresses are still exposed in plain-text publicly available DNS A records, which can be exploited by defenders disrupt botnet operations. This paper presents concept Generation Algorithm (IGA) as a novel method, usable botmasters, encrypt address records avoid exposure. raises bar for blacklisting malicious addresses, also combined with existing...