Competence Center Security
|
|
- Barrie Wade
- 8 years ago
- Views:
Transcription
1 Competence Center Security DAI-Labor The Laboratory for Distributed Artificial Intelligence (DAI-Labor) is an institute of the Technische Universität Berlin; it currently is employing about 100 researchers, graduate students, postdocs and support staff. The research focus lies on agent technologies and its fast and safe deployment in diverse application areas of business and telecommunications. In particular, an open and scalable agent framework for the design, test and deployment of sophisticated services, the Java Intelligent Agent Componentware (JIAC) is developed at DAI-Labor. Additional fields of research at DAI- Labor are wireless technologies in heterogeneous networks and security issues concerning network operators and end users. Competence Center Security (CC SEC) The main focus of the Competence Center Security is the design and implementation of intelligent security solutions that operate autonomously. In our opinion, the ubiquity and pervasiveness of contemporary networked systems poses new challenges which can not be met with conventional monolithic approaches. Autonomous Security deals with the design and implementation of a security framework which is aware of its environment, detects changes in this environment indicating a threat to the system and makes decisions reacting to these threats in an intelligent and autonomous fashion.
2 The framework-inherent security mechanisms will assist end users and administrators in dealing with different threats and their rapid rate of propagation and allow them to master the complexity of contemporary IT infrastructures. Hence, the research directions in CC Security prominently include: Application of AI approaches for detecting unknown attack patterns Design of cooperative models for joint attack detection Combination of various different mathematical approaches to network analysis Design and implementation of secure software solutions Main Research Areas Autonomous Security Framework This cluster deals with the conceptual development and the implementation of Autonomous Security components, with the exception of the separately clustered Detection Units. This includes the abovementioned cooperation mechanisms as well as mathematical models for network analysis and tools for the simulation and evaluation of security functionality. Secure Services This cluster handles the development of autonomous security solutions as well as secure services on top of the JIAC IV agent framework. In this respect, the main focus is the realization of security mechanisms and the design of secure development processes for the JIAC IV Service Development methodology. Malware Detection The cluster Malware Detection deals with the various approaches originating from multiple domains for detecting malware. This ranges from bio-inspired techniques, supervised and unsupervised learning strategies to statistical analysis. Another goal is to intelligently combine different algorithms to achieve better detection results. Reference Projects JIAC Intelligent and autonomous agents are the key technology for realising flexible and distributed systems. In the JIAC project [Fricke 2001] a scalable serviceware framework for agents was developed, which allowed adaptive configuration relating to changing users, groups, security policies and interoperability.
3 The core of the JIAC serviceware framework is a component oriented architecture, which allows creating software agent from different software components [Sesseler 2002]. Each needed ability like understanding different communication protocols, knowledge processing and action managing as well as scheduling can be found in a special component. Further more, additional collections of services, possible tasks and ontologies can be found, e.g. billing and accounting services. Unlike JIAC components, services, actions and ontologies are not written in Java, they use a special logical and declarative programming language called JIAC Agent Description Language (JIAC), which allows fast creation and configuration of agents. Application specific, additional functions can be created by extending already existing components, services, actions or ontologies using Java or JADL. JIAC Agents base on the Belief, Desire, Intention (BDI-) Model, which means that they follow goals to achieve certain desired states. This is done more efficiently by having the ability to choose between different Actions. Communication between components of an agent is realized by asynchronous messages. For data exchange between agents and services, which base on FIPA conform messages. JIAC supports HTTP, TCP, and SSL for exchange of FIPA conform messages, where only HTTP is described in the FIPA standard, but using TCP and SSL increases security and reliability. An additional characteristic of JIAC is that security played an important role in design phase [Bsufka 1999]. Different security mechanisms are implemented in JIAC [Schmidt 2002], e.g. the protection of the transport layer with SSL, as well as the protection of the application layer. Further more, mechanisms like authorization and authentication of agents, agents owners and users are included. All these mentioned mechanisms base on the Public Key Infrastructure (PKI) mechanisms in JIAC [Bsufka 2006]. JIAC supports the PKI standards x.509 and SPKI. The migration of mobile agents basing on trusting systems for mobile agents [Albayrak 2001] is included, too. Further more, JIAC version is evaluated and certified for Common Criteria EAL 3 [DAILabor2004, Geissler 2004, BSI 2005]. Beside the ability of reading private keys from filesystem, in version agents are able to use private keys from chip cards with a special enhancement [Scheunemann2002]. With JIAC, development is not only supported by collections of components, services, actions and ontologies, several additional tools [Hirsch 2006] that help to create agents and to define their roles and communication protocols, are provided Other Projects We have also other reference projects in the security area. However, because of contract and IPR agreements we are not allowed to publish details about them officially. NetShield DDos Detection The objective of the project NetShield DDos Detection is to develop a smartphone security framework capable of detecting malicious code on mobile device and to initiate the appropriate counter measures.
4 NetShield Malware Filtering The project Malware Filtering focuses on the net centric approach of Malware Detection. Therefore the network security simulator (NeSSi) is developed capable of evaluating detection algorithms. The development of new algorithms in the area of network security is the second foundation of the project. Selected Publications [Albayrak 2001] Sahin Albayrak and Karsten Bsufka. Integration von Public-Key- Infrastruktur-Funktionalitäten in Agenten-Toolkits. In S. Jablonski, S. Kirn, M. Plaha, E.J. Sinz, A. Ulbrich vom Ende, and G. Weiß, editors, Verteile Informationssysteme auf der Grundlage von Objekten, Komponenten und Agenten. PROCEEDINGS der Verbundtagung VertIS 2001, pages , October [Albayrak 2005] Sahin Albayrak, Achim Müller, Christian Scheel, and Dragan Milosevic. Combining Self-Organizing Map Algorithms for Robust and Scalable Intrusion Detection. In M. Mohammadian, editor, Proceedings of International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), Vienna, Austria, [Bsufka 1999] Karsten Bsufka, Stefan Holst, and Torge Schmidt. Realization of an Agent- Based Certificate Authority and Key Distribution Center. In Sahin Albayrak, editor, Intelligent Agents for Telecommunication Applications, number 1699 in Lecture Notes in Artifical Intelligence, pages , Third International Workshop, IATA 99, Stockholm, Sweden, August [Bsufka 2006] Karsten Bsufka. Public Key Infrastrukturen in Agentenarchitekturen zur Realisierung dienstbasierter Anwendungen. Dissertation, Technische Universität Berlin, [Bsufka 2006b] Karsten Bsufka, Olaf Kroll-Peters Sahin Albayrak. Intelligent Network- Based Early Warning Systems. Proceedings of 1st International Workshop on Critical Information Infrastructures Security, Samos Greece Lecture Notes in Computer Science LNCS Vol Editor Javier Lopez. Springer-Verlag Berlin Heidelberg, [BSI 2005] Bundesamt für Sicherheit in der Informationstechnik. Certification Report BSI- DSZCC for Java Intelligent Agent Componentware IV Version from DAI- Labor Technische Universität Berlin [DAI-Labor 2004] DAI-Labor. Security Target Java Intelligent Agent Componentware IV [Fricke 2001] Stefan Fricke, Karsten Bsufka, Jan Keiser, Torge Schmidt, Ralf Sesseler, and Sahin Albayrak. Agent-based telematic services and telecom applications. Communications of the ACM, 44(4):43 48, April 2001.
5 [Geissler 2004] Tim Geissler and Olaf Kroll-Peters. Applying Security Standards to Multi Agent Systems. In The First International Workshop on Safety and Security in Multiagent Systems (SASEMAS) Part of AAMAS held at Columbia University New York City, 20 July 2004, July [Hirsch 2006] B. Hirsch, T. Konnerth, A. Hessler, and S. Albayrak. A serviceware framework for designing ambient services. In A. Mana and V. Lotz, editors, Proceedings of the First International Conference on Ambient Intelligence Developments (AmID 06), pages Springer France, [Luther 2007] Katja Luther, Rainer Bye, Tansu Alpcan, Sahin Albayrak, Achim Müller. A cooperative AIS framework for Intrusion Detection. (accepted) IEEE International Conference on Communications 2007 ( [Luther 2006] Katja Luther. Entwurf eines Künstlichen Immunsystems zur Netzwerküberwachung auf Basis eines Multi-Agenten-Systems. Diplomarbeit, Technische Universität Berlin, [Scheel 2005] Christian Scheel. Managing Strategies for a Self-Organising Map based Filtering Agent Community. Diplomarbeit, Technische Universität Berlin, [Scheunemann 2002] Heiko Scheunemann. Einbindung der TCOS-Chipkarten- Funktionalitäten In der Agentenarchitektur JIAC IV. Diplomarbeit, Technische Universität Berlin, 2002 [Schmidt 2002] Torge Schmidt. ASITA: Advanced Security Infrastructure for Multi-Agent Applications in the Telematic Area. Dissertation, Technische Universität Berlin, [Schmidt 2006] Aubrey-Derrick Schmidt. Monitoring of Mobile Devices for Anomaly Detection on Agent Framework JIAC. Diplomarbeit, Technische Universität Berlin, [Schmidt 2007] Stephan Schmidt, Tansu Alpcan, Tamer Basar, Achim Müller, Sahin Albayrak. A Malware Detector Placement Game for Intrusion Detection. Eingereicht für IEEE International Conference on Communications [Sesseler 2002] Ralf Sesseler. Eine modulare Architektur für dienstbasierte Interaktionen zwischen Agenten. Dissertation, Technische Universität Berlin, [Wetzker 2005] Robert Wetzker. Beherrschbarkeit zukünftiger Bedrohungen durch ein Künstliches Immunsystem (AIS) auf Basis von Agententechnologien. Diplomarbeit, Technische Universität Berlin, 2005.
6 Persons Dr.-Ing- Karsten Bsufka finished his doctoral studies at Technische Universität Berlin with the topic Public Key Infrastrukturen in Agentenarchitekturen zur Realisierung dienstbasierter Anwendungen /(engl.: Public Key Infrastructures in Agent Architectures for Realising Service-Oriented Applications ) in He is employed at DAI-Labor for nine years, starting as student assistant and afterwards working as academic staff, where he developed together with others the Serviceware Framework JIAC. Most on his work on JIAC was designing and implementing security and communication mechanisms, where the security mechanisms where certified for Common Criteria by German Bundesanstalt fuer Sicherheit in der Informationstechnologie (BSI). In 2005 he got project leader of the research project DDoS Detection and in 2006 leader of the whole Competence Center Security. His scientific/research interests lie on development of secure distributed systems. Dipl.-Inform. Rainer Bye got the grade Diplom Informatiker, comparable with int. master degree, in 2005 at Technische Universität Carolo-Wilhelmina zu Braunschweig. His research focus lies on distributed systems, which lead him to DAI-Labor Berlin, where he got project leader of the Malware Filtering projects in In this project he develops a network simulator which includes routing and TCP/IP components for traffic analysis. In addition, he is supervisor for diploma thesis s regarding security, databases and distributed systems and is active in acquiring new projects. His scientific/research interests lie on distributed systems and their deployment for cooperative detection of attacks in networks.
7 Dr. Seyit Ahmet Çamtepe received the Ph.D. degree in Computer Science from Rensselaer Polytechnic Institute, Troy, NY, in He received the B.S. and M.S. degrees in Computer Engineering from Boğaziçi University, Istanbul, Turkey, in 1996 and 2001 respectively. He worked as a Network and Security Engineer in Pamukbank (currently Halkbank), Istanbul, Turkey, from 1996 to During his Ph.D. study, he worked on variety of security research projects including key management in wireless sensor networks, attack modelling and detection and social network analysis. He is currently working as a senior researcher in DAI-Labor at Technische Universität Berlin. His research interests include autonomous security, economy of information security, malicious cryptography, key management, distributed system security, attack modelling-detection-prevention, social network analysis and VoIP security. Dipl.-Inform. Olaf Kroll-Peters got the degree Diplom Informatiker in 1999 and worked in different companies in the section of quality assurance. As leader of the support and quality assurance of the company Fresenius Netcare he had intensive contact to the customers, where got to know the special problems concerning user interfaces, which in turn lead to his research field of usability. Besides, first he was project leader of the Common Criteria certification of Agent Framework JIAC IV and then started teaching at Technische Universität Berlin courses relating to security and usability. Olaf Kroll-Peters is supervisor for several diploma thesis s, where the main topics relate to usability, quality assurance and security in distributed systems and cryptologic methods. His scientific/research interests lies on the connection of usability and security, which means realising easy to use systems that nevertheless are secure.
8 Dipl.-Inform., Dipl.-Bio. Katja Luther finished studying computer science at Technischel Universität Berlin in Before, she already worked as student assistant at DAI-Labor, where now she is an academic employee. Besides security in networks and machine learning, she is interested in bio-inspired algorithms like Artificial Immune Systems (AIS) or swarm algorithms. In 2005, she works in Malware Filtering project on the Network Security Simulator NeSSi, where she designed and realized the implementation of the TCP protocol as well as the sockets. Since 2006 she develops and implements a Detection Unit in the project DDoS Detection. Her scientific/research interests lie on machine learning (anomaly detection) in network security and cooperative security solutions. Dipl.-Inform. Arik Messerman finished his Diploma (M.S.) in Computer Science department at Technische Universität Berlin in His research interests include operating systems, cryptology and network security. During the years , he worked as a teaching assistant in DAI-Labor. He is currently employed as a scientific researcher in DAI-Labor and working in the project Malware Filtering).
9 Dipl.-Inform. Aubrey-Derrick Schmidt finished his studies at Technische Universität Berlin in While writing his diploma thesis Monitoring of Mobile Devices for Anomaly Detection on Agent Framework JIAC he worked in DDoS Detection project, where he realized the client side monitoring of Symbian devices. His scientific/research interests lie on mobile devices and related security topics. Dipl-Inform. Stephan Schmidt received his diploma degree in computer science in 2005 at the Technische Universität Berlin specializing in operating and communication systems. Additionally, he received a minor degree in mathematics. He is working as a scientific researcher at the DAI laboratories in the Malware Filtering project. His main areas of interest are network algorithms, game theory, optimization techniques and their application to the network security domain. He is furthermore assisting Rainer Bye in the project management and student mentoring
An Agent-Based Serviceware Framework for Ubiquitous Context-Aware Services
An Agent-Based Serviceware Framework for Ubiquitous Context-Aware Services Jens Wohltorf, Richard Cissée, Andreas Rieger, and Heiko Scheunemann DAI-Labor Technische Universität Berlin GOR 1-1, Franklinstraße
More informationAgents do it for Money - Accounting features in Agents
Agents do it for Money - Accounting features in Agents Jan Keiser, Benjamin Hirsch, Sahin Albayrak {Jan.Keiser,Benjamin.Hirsch,Sahin.Albayrak}@dai-labor.de DAI-Labor, Technische Universität Berlin, Germany
More informationFrom Simulation to Emulation- An Integrated Approach for Network Security Evaluation
From Simulation to Emulation- An Integrated Approach for Network Security Evaluation Martin Möller, Rainer Bye, Karsten Bsufka, Ahmet Camtepe, Sahin Albayrak DAI-Labor, Technische Universität Berlin martinsemails@googlemail.com,
More informationPersonalized Fall Risk Assessment Tool by using the Data Treasure contained in Mobile Electronic Patient Records
Personalized Fall Risk Assessment Tool by using the Data Treasure contained in Mobile Electronic Patient Records Elif ERYILMAZ a,1, Sebastian AHRNDT a, Johannes FÄHNDRICH a and Sahin ALBAYRAK a a DAI Lab,
More informationOn Ubiquitous Network Security and Anomaly Detection *
On Ubiquitous Network Security and Anomaly Detection * Colin Van Dyke Çetin K. Koç Electrical & Computer Engineering Oregon State University {vandyke,koc}@ece.orst.edu Abstract As networking trends move
More informationA Multi-Agent Framework for Personalized Information Filtering
2007 German e-science Available online at http://www.ges2007.de This document is under the terms of the CC-BY-NC-ND Creative Commons Attribution A Multi-Agent Framework for Personalized Information Filtering
More informationHow To Create A Network Security Simulator
Application-level simulation for network security Rainer Bye, Stephan Schmidt Katja Luther and Sahin Albayrak 1 DAI-Labor, Technische Universität Berlin {rainer.bye, stephan.schmidt, katja.luther, sahin.albayrak}@dai-labor.de
More informationSoftware Agent Technology in Mobile Service Environments 1
Software Agent Technology in Mobile Service Environments 1 Ralf Sesseler, Alexander Keiblinger, Nicolas Varone DAI-Lab at Technische Universität Berlin Sekretariat FR 6-7, Franklinstraße 28/29, 10587 Berlin,
More informationMonitoring Smartphones for Anomaly Detection
Monitoring Smartphones for Anomaly Detection Aubrey-Derrick Schmidt aubrey.schmidt@dailabor.de Frank Peters frank.peters@dailabor.de Sahin Albayrak sahin.albayrak@dailabor.de Florian Lamour florian.lamour@dailabor.de
More informationMEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
More informationAdvanced Grid Management Software for. Seamless Services
Advanced Grid Management Software for Seamless Services Sahin Albayrak 1, Silvan Kaiser 1, Jan Stender 1 1 DAI-Labor, Technische Universität Berlin, Secretary GOR 1-1, Franklinstrasse 28/29, D-10587 Berlin,
More informationAdvanced Grid Management Software for Seamless Services
Advanced Grid Management Software for Seamless Services Sahin Albayrak¹, Silvan Kaiser¹, Jan Stender¹ ¹DAI-Labor, Technische Universität Berlin, Secretary GOR 1-1, Franklinstrasse 28/29, D-10587 Berlin,
More informationK 066/921. Master Curriculum. Computer Science. (in English)
K 066/921 Master Curriculum Computer Science (in English) 1_MS_ComputerScience_Curr Seite 1 von 11 Inkrafttreten: 1. 10. 2013 Table of Contents 1 Qualification Profile...3 2 Admissions...5 3 Structure
More informationNetwork Security A Decision and Game-Theoretic Approach
Network Security A Decision and Game-Theoretic Approach Tansu Alpcan Deutsche Telekom Laboratories, Technical University of Berlin, Germany and Tamer Ba ar University of Illinois at Urbana-Champaign, USA
More informationNetwork Security Using Job Oriented Architecture (SUJOA)
www.ijcsi.org 222 Network Security Using Job Oriented Architecture (SUJOA) Tariq Ahamad 1, Abdullah Aljumah 2 College Of Computer Engineering & Sciences Salman Bin Abdulaziz University, KSA ABSTRACT In
More informationIndustrie 4.0. Towards a Holistic Approach for Cyber Safety and Security
Industrie 4.0 Towards a Holistic Approach for Cyber Safety and Security Prof. Dr.-Ing. Reiner Anderl Marco Grimm, M.Sc. Datenverarbeitung in der Konstruktion (DiK) Fachbereich Maschinenbau Technische Universität
More informationAPPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION
18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK
More informationMEng, BSc Computer Science with Artificial Intelligence
School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give
More informationIntelligent Worms: Searching for Preys
Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School
More informationLoad Balancing Management by Efficient Controlling Mobiles Agents
International Journal of Soft Computing and Engineering (IJSCE) Load Balancing Management by Efficient Controlling Mobiles Agents Mohamed Bahaj, Abdellatif Soklabi, Ilias Cherti Abstract- Load balancing
More informationAgent-based dam monitoring
Agent-based dam monitoring V. BETTZIECHE, Ruhrverband (Ruhr River Association), Essen, GER SYNOPSIS. The monitoring of security relevant structures is a task of growing importance in civil engineering.
More informationAnomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil
More informationADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS
ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS
More informationArneKesting. Publication List. Journal Articles as First Author { A. Kesting, M. Treiber, D. Helbing: Enhanced Intelligent Driver Model to Access the
ArneKesting Publication List Journal Articles as First Author { A. Kesting, M. Treiber, D. Helbing: Enhanced Intelligent Driver Model to Access the Impact of Driving Strategies on Traffic Capacity Philosophical
More informationMemo: August 27, 2015. To: new or prospective students entering our PhD or MS program who are interested in computer networking.
Memo: August 27, 2015 To: new or prospective students entering our PhD or MS program who are interested in computer networking. So you want to study networking.congratulations!! In this memo, I identify
More informationApplication-level simulation for network security
Application-level simulation for network security Stephan Schmidt, Rainer Bye, Joël Chinnow Karsten Bsufka, Ahmet Camtepe and Sahin Albayrak nessi@dai-labor.de DAI-Labor, Berlin Institute of Technology,
More informationMasters in Human Computer Interaction
Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from
More informationMasters in Advanced Computer Science
Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate
More informationMasters in Artificial Intelligence
Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits
More informationMasters in Computing and Information Technology
Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits
More informationMasters in Networks and Distributed Systems
Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to
More informationAn Extensible Simulation Framework for Critical Infrastructure Security
An Extensible Simulation Framework for Critical Infrastructure Security Technical Report: TUB-DAI 09/09-1 Joël Chinnow, Rainer Bye, Stephan Schmidt Karsten Bsufka, Seyit Ahmet Çamtepe, Şahin Albayrak E-Mail:
More informationVortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex
More informationTUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
More informationAgreement on. Dual Degree Master Program in Computer Science KAIST. Technische Universität Berlin
Agreement on Dual Degree Master Program in Computer Science between KAIST Department of Computer Science and Technische Universität Berlin Fakultät für Elektrotechnik und Informatik (Fakultät IV) 1 1 Subject
More informationMonitoring Android for Collaborative Anomaly Detection: A First Architectural Draft
Monitoring Android for Collaborative Anomaly Detection: A First Architectural Draft Technical Report: TUB-DAI 08/08-02 Aubrey-Derrick Schmidt, Rainer Bye, Hans-Gunther Schmidt, Kamer Ali Yüksel, Osman
More informationA Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
More informationSANE: A Protection Architecture For Enterprise Networks
Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS
More informationOntology based Recruitment Process
Ontology based Recruitment Process Malgorzata Mochol Radoslaw Oldakowski Institut für Informatik AG Netzbasierte Informationssysteme Freie Universität Berlin Takustr. 9, 14195 Berlin, Germany mochol@inf.fu-berlin.de
More information3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,
More informationAutonomy for SOHO Ground Operations
From: FLAIRS-01 Proceedings. Copyright 2001, AAAI (www.aaai.org). All rights reserved. Autonomy for SOHO Ground Operations Walt Truszkowski, NASA Goddard Space Flight Center (GSFC) Walt.Truszkowski@gsfc.nasa.gov
More informationOutline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses
Outline IT Security: General Trends and Research Directions Sherif El-Kassas Department of Computer Science The American University in Cairo Practical considerations Academic and research perspective National
More informationManagement and optimization of multiple supply chains
Management and optimization of multiple supply chains J. Dorn Technische Universität Wien, Institut für Informationssysteme Paniglgasse 16, A-1040 Wien, Austria Phone ++43-1-58801-18426, Fax ++43-1-58801-18494
More informationASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange
ASMONIA Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange Overview on Activities Related to Academic Utilization Contributors: Cassidian
More informationNetwork Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
More informationA Review of Agent-Oriented Development Methodologies and Programming Languages/Frameworks
A Review of Agent-Oriented Development Methodologies and Programming Languages/Frameworks Khalil Salah Advanced Informatics School Universiti Teknologi Malaysia Kuala Lumpur, 54100, Malaysia Ardavan Ashabi
More informationfor High Performance Computing
Technische Universität München Institut für Informatik Lehrstuhl für Rechnertechnik und Rechnerorganisation Automatic Performance Engineering Workflows for High Performance Computing Ventsislav Petkov
More informationNetwork Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
More informationDoctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
More informationSoftware Construction
Software Construction Staff Faculty: Univ.-Prof. Dr. rer. nat. Horst Lichter lichter@informatik.rwth-aachen.de Secretary: Bärbel Kronewetter Phone: +49 241 80 21 330 Fax: +49 241 80 22 352 Research Assistants:
More informationSTANDARDS FOR AGENTS AND AGENT BASED SYSTEMS (FIPA)
Course Number: SENG 609.22 Session: Fall, 2003 Course Name: Agent-based Software Engineering Department: Electrical and Computer Engineering Document Type: Tutorial Report STANDARDS FOR AGENTS AND AGENT
More informationBio-inspired mechanisms for efficient and adaptive network security
Bio-inspired mechanisms for efficient and adaptive network security Falko Dressler Computer Networks and Communication Systems University of Erlangen-Nuremberg, Germany dressler@informatik.uni-erlangen.de
More informationInformation Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center
Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Department of Computer Science Introduction Our society is undergoing a
More informationSecuring VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn Andreas.Schmidt@bsi.bund.de Abstract
More informationResume. Dr. Vedat COSKUN. Organisational E-mail Personal E-mail Personal Web Site Research Lab Web Site
Resume Dr. Vedat COSKUN Organisational E-mail Personal E-mail Personal Web Site Research Lab Web Site vedatcoskun@isikun.edu.tr vedatcoskun@me.com www.vedatcoskun.com www.nfclab.com Dr. Vedat Coskun is
More informationMasters in Information Technology
Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101
More informationNetwork Security. Chapter 1 Introduction. Network Security IN2101. Georg Carle. Course organization
Chair for Network Architectures and Services Institute for Informatics TU München Prof. Carle Network Security IN101 Prof. Dr.-Ing. Georg Carle Dipl.-Inform. Ali Fessi Institut für Informatik Technische
More informationSeminar TK: Ubiquitous Computing
Seminar TK: Ubiquitous Computing Seminar 4 CP, Summer Term 2014 Immanuel Schweizer schweizer@tk.informatik.tu-darmstadt.de Based on slides by Dr. Leonardo Martucci, Florian Volk General Information What?
More informationOn the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016
On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT
More information1 Business Modeling. 1.1 Event-driven Process Chain (EPC) Seite 2
Business Process Modeling with EPC and UML Transformation or Integration? Dr. Markus Nüttgens, Dipl.-Inform. Thomas Feld, Dipl.-Kfm. Volker Zimmermann Institut für Wirtschaftsinformatik (IWi), Universität
More informationIntelligent Agents Serving Based On The Society Information
Intelligent Agents Serving Based On The Society Information Sanem SARIEL Istanbul Technical University, Computer Engineering Department, Istanbul, TURKEY sariel@cs.itu.edu.tr B. Tevfik AKGUN Yildiz Technical
More informationAttack Taxonomies and Ontologies
Lehrstuhl Netzarchitekturen und Netzdienste Institut für Informatik Technische Universität München Attack Taxonomies and Ontologies Seminar Future Internet Supervisor: Nadine Herold Natascha Abrek 02.10.2014
More informationA Survey on Security Threats and Security Technology Analysis for Secured Cloud Services
, pp.21-30 http://dx.doi.org/10.14257/ijsia.2013.7.6.03 A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services Changsoo Lee 1, Daewon Jung 2 and Keunwang Lee 3 1 Dept.
More informationService-Oriented Security Architecture for CII based on Sensor Networks
Service-Oriented Security Architecture for CII based on Sensor Networks Javier Lopez, Jose Antonio Montenegro, Rodrigo Roman Computer Science Department, E.T.S. Ingenieria Informatica University of Malaga,
More informationPreface. Book Origin and Overview
Preface The field of wireless sensor networks continues to evolve and grow in both practical and research domains. More and more wireless sensor networks are being used to gather information in real life
More informationThe Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
More informationAn Artificial Immune Model for Network Intrusion Detection
An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,
More informationSecure Semantic Web Service Using SAML
Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA
More informationCTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
More informationMULTIDIMENSIONAL META-MODELLING FOR AIR TRAFFIC MANAGEMENT SERVICE PROCESSES
Computer Modelling and New Technologies, 2010, Vol.14, No.2, 50 57 Transport and Telecommunication Institute, Lomonosov 1, LV-1019, Riga, Latvia MULTIDIMENSIONAL META-MODELLING FOR AIR TRAFFIC MANAGEMENT
More informationMaking Simulation Work for the Organizational Design of Communication Centers: Challenges and Practical Experience
UNIVERSITY OF BAYREUTH Lehrstuhl für Betriebswirtschaftslehre VII Wirtschaftsinformatik Making Simulation Work for the Organizational Design of Communication Centers: Challenges and Practical Experience
More informationA New MSc Curriculum in Computer Science and Mathematics at the University of Zagreb
A New MSc Curriculum in Computer Science and Mathematics at the University of Zagreb Robert Manger, Goranka Nogo, Mladen Vuković Department of Mathematics, University of Zagreb Bijenička cesta 30, 10000
More informationPROFESSIONAL INTERESTS WORK EXPERIENCE GINÉS DÓLERA TORMO CURRICULUM VITAE OCTOBER 2014
Ginés Dólera Tormo Phone: +49 176 90775273 E-mail: ginesdt@um.es Date of birth: 21 July, 1985 Nationality: Spanish Address: Dossenheimer Landsrtrasse 100 D-69121 Heidelberg, Germany PROFESSIONAL INTERESTS
More informationFIoT: A Framework for Self-Adaptive and Self-Organizing Internet of Things Applications. Nathalia Moraes do Nascimento nnascimento@inf.puc-rio.
FIoT: A Framework for Self-Adaptive and Self-Organizing Internet of Things Applications Nathalia Moraes do Nascimento nnascimento@inf.puc-rio.br Roadmap Motivation FIoT Main Idea Application Scenario Decentralized
More informationSecure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
More informationEnhanced concept of the TeamCom SCE for automated generated services based on JSLEE
Enhanced concept of the TeamCom SCE for automated generated services based on JSLEE Thomas Eichelmann 1, 2, Woldemar Fuhrmann 3, Ulrich Trick 1, Bogdan Ghita 2 1 Research Group for Telecommunication Networks,
More informationCGHub Client Security Guide Documentation
CGHub Client Security Guide Documentation Release 3.1 University of California, Santa Cruz April 16, 2014 CONTENTS 1 Abstract 1 2 GeneTorrent: a secure, client/server BitTorrent 2 2.1 GeneTorrent protocols.....................................
More informationDynamic Scheduling of Object Invocations in Distributed Object Oriented Real-Time Systems Jørgensen, Bo Nørregaard; Joosen, Wouter
Syddansk Universitet Dynamic Scheduling of Object Invocations in Distributed Object Oriented Real-Time Systems Jørgensen, Bo Nørregaard; Joosen, Wouter Published in: Lecture Notes in Computer Science Publication
More informationUniversity of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP
University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications
More informationInjazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
More informationAdvancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
More informationDR AYŞE KÜÇÜKYILMAZ. Imperial College London Personal Robotics Laboratory Department of Electrical and Electronic Engineering SW7 2BT London UK
DR AYŞE KÜÇÜKYILMAZ Imperial College London Personal Robotics Laboratory Department of Electrical and Electronic Engineering SW7 2BT London UK http://home.ku.edu.tr/~akucukyilmaz a.kucukyilmaz@imperial.ac.uk
More informationStatic Analysis of Executables for Collaborative Malware Detection on Android
Static of Executables for Collaborative Malware Detection on Android Aubrey-Derrick Schmidt, Rainer Bye, Hans-Gunther Schmidt, Jan Clausen, Osman Kiraz, Kamer Ali Yüksel, Seyit Ahmet Camtepe, and Sahin
More informationPublications of Ugo Fiore
Publications of Ugo Fiore Journal papers [J31] A. Castiglione, R. De Prisco, A. De Santis, U. Fiore, and F. Palmieri. A botnet-based command and control approach relying on swarm intelligence. In: Journal
More informationSeamless, Intelligent Grid Services for e-science
Silvan Kaiser, Collin Müller, Sahin Albayrak Seamless, Intelligent Grid Services for e-science DAI-001-2004 Zuerst erschienen: DAI-Labor, Berlin, March 2004 DAI-Labor, Technische Universität Berlin Fakultät
More informationAbdullah Mohammed Abdullah Khamis
Abdullah Mohammed Abdullah Khamis Jeddah, Saudi Arabia Email: Abdullahkhamis@gmail.com Mobile: +966 567243182 Tel: +966 2 6340699 (Yemeni) Research and Professional Objective To Complete my Ph.D. in Pattern
More informationDesign and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea hsriver@gmail.com and kimsr@konkuk.ac.kr
More informationPlease consult the Department of Engineering about the Computer Engineering Emphasis.
COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals
More informationMeeting Scheduling with Multi Agent Systems: Design and Implementation
Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, 2007 92 Meeting Scheduling with Multi Agent Systems: Design and
More informationUsing Artificial Intelligence in Intrusion Detection Systems
Using Artificial Intelligence in Intrusion Detection Systems Matti Manninen Helsinki University of Technology mimannin@niksula.hut.fi Abstract Artificial Intelligence could make the use of Intrusion Detection
More informationCisco Certified Security Professional (CCSP)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
More information(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS
COURSE PROFILE Course Name Code Semester Term Theory+PS+Lab (hour/week) Local Credits ECTS Network Security IT527 Fall 3 + 0 + 0 3 8 Prerequisites None Course Language Course Type Course Lecturer Course
More informationA SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
More informationDesigning an Object Relational Data Warehousing System: Project ORDAWA * (Extended Abstract)
Designing an Object Relational Data Warehousing System: Project ORDAWA * (Extended Abstract) Johann Eder 1, Heinz Frank 1, Tadeusz Morzy 2, Robert Wrembel 2, Maciej Zakrzewicz 2 1 Institut für Informatik
More informationData-Aware Service Choreographies through Transparent Data Exchange
Institute of Architecture of Application Systems Data-Aware Service Choreographies through Transparent Data Exchange Michael Hahn, Dimka Karastoyanova, and Frank Leymann Institute of Architecture of Application
More information3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing
More informationM.S. Computer Science Program
M.S. Computer Science Program Pre-requisite Courses The following courses may be challenged by sitting for the placement examination. CSC 500: Discrete Structures (3 credits) Mathematics needed for Computer
More informationB.Sc. in Computer Engineering, School of Electrical and Computer Engineering,
Narges Khakpour Postdoctoral Researcher Theoretical Computer Science School of Computer Science and Communication Royal Institute of Technology (KTH) Stockholm E-mail: nargeskh@kth.se Leiden Institute
More informationTeaching Statement. Verzeichnis von Veranstaltungen und Aktivitäten in der Lehre. Dr. rer. nat. Matthias Klusch
Teaching Statement Verzeichnis von Veranstaltungen und Aktivitäten in der Lehre Dr. rer. nat. Matthias Klusch Content 1 TEACHING INTERESTS...3 2 TEACHING EXPERIENCE...3 2.1 COURSES AND LECTURES...3 2.2
More information