Leon Böck

ORCID: 0000-0003-4758-590X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Malware Detection Techniques
  • Smart Grid Security and Resilience
  • Privacy, Security, and Data Protection
  • Peer-to-Peer Network Technologies
  • Cybercrime and Law Enforcement Studies
  • Opportunistic and Delay-Tolerant Networks
  • Access Control and Trust
  • Anomaly Detection Techniques and Applications
  • Blockchain Technology Applications and Security
  • Digital Mental Health Interventions
  • Terrorism, Counterterrorism, and Political Violence
  • Spam and Phishing Detection
  • Smart Grid Energy Management
  • Software-Defined Networks and 5G
  • Misinformation and Its Impacts
  • Transportation and Mobility Innovations
  • User Authentication and Security Systems
  • Complex Network Analysis Techniques
  • Privacy-Preserving Technologies in Data
  • Innovative Human-Technology Interaction
  • Advanced Optical Network Technologies
  • Ethics and Social Impacts of AI

Technical University of Darmstadt
2014-2023

Abstract Smart Home technologies have the potential to increase quality of life, home security and facilitate elderly care. Therefore, they require access a plethora data about users’ homes private lives. Resulting privacy concerns form relevant barrier adopting this promising technology. Aiming support end informed decision-making through addressing we first conducted semi-structured interviews with 42 little-experienced users. Their diverse were clustered into four themes that center...

10.1515/icom-2019-0015 article EN i-com 2019-11-18

We present an innovative protocol combining innetwork data aggregation and smart meter billing for a grid scenario. The former enables energy supplier to allocate balance resources. latter provides dynamic pricing schemes according fine-grained consumption profiles. Moreover, meters their can prove values. Since the knows amount of generated electricity consolidated in round measurements, detect loss fraud. To preserve customers' privacy, we use homomorphic commitment scheme with encryption...

10.1109/iscc.2014.6912612 article EN 2022 IEEE Symposium on Computers and Communications (ISCC) 2014-06-01

Botnet research is one of the many areas affected by coming into force General Data Protection Regulation (GDPR). This article aims to identify most appropriate legal bases that would legitimise data processing in context botnet tracking and give an overview practical implications for practitioners. First, we a technical introduction techniques types processed data. Afterward, argue qualifies as "processing personal data" falls under material scope GDPR. We then present three scenarios where...

10.1016/j.clsr.2021.105652 article EN cc-by Computer Law & Security Review 2022-03-01

Time and time again the security community has faced novel threats that were previously never analyzed, sometimes with catastrophic results. To avoid this, proactive analysis of envisioned is great importance. One such threat blockchain-based botnets. Bitcoin, decentralized cryptocurrencies in general, promise a fair more transparent financial system. They do so by implementing an open censorship-resistant atomic broadcast protocol enables maintenance global transaction ledger, known as...

10.1109/ecrime47957.2019.9037600 article EN 2019-11-01

Many cyber-crimes, such as Denial of Service (DoS) attacks and banking frauds, originate from botnets. To prevent botnets being taken down easily, botmasters have adopted peer-to-peer (P2P) mechanisms to any single point failure. However, sensor nodes that are often used for both, monitoring executing sinkholing attacks, threatening In this paper, we introduce a novel mechanism detect in P2P using the clustering coefficient metric. We evaluated our on real-world botnet Sality over course...

10.1109/cns.2015.7346908 article EN 2015-09-01

Privacy, in particular anonymity, is required to increase the acceptance of users for Internet Things (IoT). The IoT built upon sensors that encompass us each step we take. Hence, they can collect sensitive, privacy-invading data be used establish complete user profiles. For this reason, sensing needs provide means privacy-protection. In paper, discuss an approach sharing smartphone sensor and user-generated content a privacy-protecting manner via Micro-blogging platform (MbP) Twitter. that,...

10.1109/aiccsa.2014.7073285 article EN 2014-11-01

The “Smart Bear” is a hypothetical connected-smart toy for children. While the functionalities it presents are appealing to both children and their parents, privacy concerns that raised should be taken into serious consideration. A big amount of personal data child (and probably other uninformed minors adults in physical vicinity) processed analysed, an accurate profile created direct marketing practices would most take place. could suddenly turn surveillance device, while malicious third...

10.1049/cp.2018.0005 article EN 2018-01-01

Online social networks (OSNs) represent powerful digital tools to communicate and quickly disseminate information in a non-official way. As they are freely accessible easy use, criminals abuse of them for achieving their purposes, example, by spreading propaganda radicalising people. Unfortunately, due vast usage, it is not always trivial identify using unlawfully. Machine learning techniques have shown benefits problem solving belonging different application domains, when, the huge...

10.13052/jcsm2245-1439.922 article EN Journal of Cyber Security and Mobility 2020-01-29

The ever-growing number of cyber attacks originating from botnets has made them one the biggest threat to Internet ecosystem. Especially P2P-based like ZeroAccess and Sality require special attention as they have been proven be very resilient against takedown attempts. To identify weaknesses prepare takedowns more carefully it is thus a necessity monitor by crawling deploying sensor nodes. This in turn provokes botmasters come up with monitoring countermeasures protect their assets. Most...

10.1145/3098954.3098991 article EN Proceedings of the 17th International Conference on Availability, Reliability and Security 2017-08-10

Botnet attacks have devastating effects on public and private infrastructures. The botmasters controlling these networks aim to prevent takedown attempts by using highly resilient P2P overlays commandeer their botnets, even harden them with countermeasures against intelligence gathering attempts. In fact, recent research indicates that advanced can hamper the ability gather necessary for taking down botnets. this article, we take perspective of botmaster eventually anticipate behavior. That...

10.1016/j.cose.2019.01.004 article EN cc-by Computers & Security 2019-01-19

Modern energy grids introduce local producers into city networks. Whenever a network is disconnected from the distribution grid, blackout occurs and are disabled. Micro circumvent blackouts by leveraging these to power fixed subset of consumers. In this paper, we evolve micro Holons, which overcome need for subsets as much possible. We contribute formal model Holons investigate impact Holon concept in simulation with 10,000 randomly generated These networks based on parameters obtained...

10.5220/0005768801460153 article EN cc-by-nc-nd 2016-01-01

Estimating the size of a botnet is one most basic and important queries can make when trying to understand impact botnet.Surprisingly unfortunately, this seemingly simple task has confounded many measurement efforts.While it may seem tempting simply count number IP addresses observed be infected, well-known that doing so lead drastic overestimates, as ISPs commonly assign new hosts.As result, estimating infected hosts given longitudinal datasets remained an open problem.In paper, we present...

10.14722/ndss.2023.24002 article EN 2023-01-01

Defending against botnets has always been a cat and mouse game. Cyber-security researchers government agencies attempt to detect take down by playing the role of cat. In this context, lot work done towards reverse engineering certain variants malware families as well understanding network protocols identify their weaknesses (if any) exploit them. While is necessary, such an approach offers botmasters ability quickly counteract defenders simply performing small changes in arsenals. We...

10.48550/arxiv.1712.03713 preprint EN other-oa arXiv (Cornell University) 2017-01-01

Social media represent one of the most popular online tools to spread and exchange formal informal information based on specific human interests, habits purposes. As they are free, easy use widely adopted, criminals commonly exploit them quickly disseminate propaganda, recruit people so on. Due vast usage breadth topics discussed them, it is not trivial identify abusing social for their Machine learning techniques have already shown benefits in classification problems different application...

10.1145/3339252.3341483 article EN Proceedings of the 17th International Conference on Availability, Reliability and Security 2019-08-09

Machine learning based anomaly detection mechanisms are a promising tool to detect and protect networks from previously unknown attacks. The quality of those strongly depends on the availability large amounts data for their training evaluation. However, suitable datasets scarce, as they rarely shared by who possess them. This impedes progress in development deployment sophisticated machine mechanisms. paper aims accelerate this thwarted process introducing network simulation framework...

10.1145/3407023.3407036 article EN Proceedings of the 17th International Conference on Availability, Reliability and Security 2020-08-25

Since the burgeoning days of IoT, Mirai has been established as canonical IoT botnet. Not long after public release its code, researchers found many variants compete with one another for same vulnerable hosts. Over time, myriad evolved to incorporate unique vulnerabilities, defenses, and regional concentrations. In this paper, we ask: have point that they are fundamentally distinct? We answer question by measuring two most popular descendants: Hajime Mozi. To actively scan both botnets...

10.48550/arxiv.2309.01130 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Peer-to-peer (P2P) botnets are known to be highly resilient takedown attempts. Such attempts usually carried out by exploiting vulnerabilities in the bots communication protocol. However, a failed attempt may alert botmasters and allow them patch their thwart subsequent As promising solution, takedowns could evaluated simulation environments before attempting real world. To ensure such simulations as realistic possible, churn behavior of must understood measured accurately. This paper...

10.1145/3319535.3363281 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2019-11-06

Conducting research on botnets is oftentimes limited to the analysis of active botnets. This prevents researchers from testing detection and tracking mechanisms potential future threats. Specifically, in domain P2P botnets, protocol specifics, network churn anti-tracking greatly impact success or failure monitoring operations. Moreover, experiments real world commonly lack ground truth verify findings. As developing deploying sufficient size accompanied by large costs administration...

10.18464/cybin.v6i1.25 article EN 2020-12-06

Botnets frequently use DGA and fast-flux techniques to ensure the availability of their command control (CnC) infrastructure. However, CnC IP addresses are still exposed in plain-text publicly available DNS A records, which can be exploited by defenders disrupt botnet operations. This paper presents concept Generation Algorithm (IGA) as a novel method, usable botmasters, encrypt address records avoid exposure. raises bar for blacklisting malicious addresses, also combined with existing...

10.1109/cns53000.2021.9705029 article EN 2021-10-04
Coming Soon ...