ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange



Similar documents
ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange

ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange

4G Mobile Networks At Risk

smart grids forum Intelligent power grids: How to build in Safety and Security Conference March 21 22, 2013 in Munich, Germany

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Multi-Agent Systems. Expert Forum Agents within the context of Industry 4.0. Industry 4.0 Machine Learning. Energy and Smart Grids.

Industry 4.0 Challenges and Opportunities

National Plan for Information Infrastructure Protection

for High Performance Computing

Self-employed business consultant and coach, interested in new consulting, training or coaching work with companies or NGOs in Europe or the US.

Research scientist at the Chair of Psychology (Prof. Dr. Hugo M. Kehr)

The Annual Conference 2009 was supported by:

Applicant s Research Profile. Univ.-Prof. Dr.-Ing. habil. Dipl.-Wirt. Ing.

Photonics Industry report 2013

Cyber Security From product to system solution

Security and Compliance in Clouds: Challenges and Solutions

Security concept for gateway integrity protection within German smart grids

Incident Response from a Global Enterprise Perspective Public Siemens AG All rights reserved

Compliance in Clouds A cloud computing security perspective

Kick-off Meeting im Förderschwerpunkt des BMBF: Forschung für die nachhaltige Entwicklung der Megastädte von morgen

Industrie 4.0 and Digital Transformation in NRW: Challenges, Opportunities and Potential for Cooperation Seoul,

Secondary Use of the EHR via Pseudonymisation

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

Lehrstuhl für Rechnertechnik und Rechnerorganisation (LRR-TUM) Annual Report 1998/1999

Groups Inside FHNW: Why it s not just another AAI SP

TeleTrusT Bundesverband IT-Sicherheit e.v.

Medical Cyber-Physical Systems On the Research Challenges for the Safe Interconnection of Medical Devices

Workshop Program 1st German-U.S. Workshop on Predictive Analytics, Cyber-Physical Systems, and Industrie 4.0 in Big Data Environments

Cyber Security Strategy for Germany

Dr. Anna Maria Schneider

ETSI TS : Electronic Signatures and Infrastructures (ESI): Policy

Safety Management in Nuclear Technology

Security und Compliance in Clouds

Creating an Open Innovation Ecosystem at Deutsche Telekom

Automated assessment of C++ exercises with unit tests

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

Strategic Planning at the Deutsche Bundesbank

Nokia Networks. security you can rely on

to confirm that its document management- and archiving solution fulfils all applicable audit criteria for document management solutions

The internet and digital technologies play an integral part

Deutsche Gesellschaft für Essstörungen German Association of Eating Disorders

How To Write A Cybersecurity Framework

The Society of German Chemists (Gesellschaft Deutscher Chemiker, short: GDCh)

Ontology based Recruitment Process

EIT ICT Labs MASTER SCHOOL DSS Programme Specialisations

trends in mobile malware and importance of network based user protection

ERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS

Oracle Whitepaper April Security and the Oracle Database Cloud Service

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph

Challenges to an Integrated Cost Management during Early Phases of Product Development

Spoof Detection and the Common Criteria

Integration of Sustainable Approaches in the Building Design Process

Network Virtualization and Energy Efficiency

D1.3 Industry Advisory Board

Smart Factory Innovation Forum

ROS-INDUSTRIAL. Technologies, Trends, Applications

Beraterprofil. Prof. Dr. Frank H. Witt. Managementberater

1 Business Modeling. 1.1 Event-driven Process Chain (EPC) Seite 2

Smart Energy made in Germany

Towards Open Urban Platforms for Smart Cities and Communities. Memorandum of Understanding

A guide for enterprise-specific design of EA models

SECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Sabine Bendiek, Geschäftsführerin EMC Deutschland GmbH

Deutsche Nachwuchswissenschaftler in den USA

Advantages of VoIP in the german research network

AUTOMATION - AUTOMOTIVE - RENEWABLE ENERGIES

Windows HPC Server 2008 Deployment

Adhesive bonding technology. Adhesive bonding in transportation construction. Intelligent solutions for transportation construction

Business Continuity Policy

Workshop Security of Mass Transportation

What is Industrie 4.0

Privacy and Security Assessment. Technical Security and Data Privacy in a Single Process.

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

GERMAN UNIVERSITIES LIAISON OFFICES NEW YORK

e-journal of Practical Business Research

A Note on the Security in the Card Management System of the German E-Health Card

Intellectual Capital Management and Open Innovation

Applied and Integrated Security. C. Eckert

COSMOS events, activities and trainings in Austria, BM:UKK

Education standards in Intellectual Property Rights in German Speaking Countries

Information event «ehealth Suisse» and IHE Suisse

Transcription:

ASMONIA Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange Overview on Activities Related to Academic Utilization Contributors: Cassidian Systems ERNW Enno Rey Netzwerke GmbH Fraunhofer Research Institution for Applied and Integrated Security (AISEC) Hochschule Augsburg Nokia Siemens Networks GmbH & Co KG RWTH Aachen Editor: André Egners (RWTH Aachen)

Author(s) Company E-mail André Egners RWTH Aachen egners@umic.rwth-aachen.de About the ASMONIA project Given their inherent complexity, protecting telecommunication networks from attacks requires the implementation of a multitude of technical and organizational controls. Furthermore, to be fully effective these measures call for the collaboration between different administrative domains such as network operators, manufacturers, service providers, government authorities, and users of the services. ASMONIA is the acronym for the German name* of a research project that aims to improve the resilience, reliability and security of current and future mobile telecommunication networks. For this purpose the ASMONIA consortium made up of several partners from academia and industry performs a number of research tasks, based on the specific expertise of the individual partners. The project running from September 2011 till May 2013 receives funding from the German Federal Ministry of Education and Research (Bundesministerium für Bildung und Forschung, BMBF). Various associated partners further contribute on a voluntary basis. * The full name is "Angriffsanalyse und Schutzkonzepte für MObilfunkbasierte Netzinfrastrukturen unterstützt durch kooperativen InformationsAustausch" (Attack analysis and security concepts for mobile network infrastructures, supported by collaborative information exchange). Partners: Associated Partners: Cassidian Systems ERNW Enno Rey Netzwerke GmbH Fraunhofer Research Institution for Applied and Integrated Security (AISEC) Hochschule Augsburg Nokia Siemens Networks GmbH & Co KG RWTH Aachen Federal Agency for Digital Radio of Security Authorities and Organizations (BDBOS) Federal Office for Information Security (BSI) Deutsche Telecom AG (DTAG) For more details about the project please visit www.asmonia.de. 2 Copyright 2012 ASMONIA consortium. All rights reserved.

Executive Summary The purpose of this document is to collect and summarize ongoing and finished work with respect to the academic utilization. Each of the partners involved in the ASMONIA project devoted some resources to utilizing the results achieved during the project s runtime. This includes publications at various conferences, the organization of project workshops, talks or posters at external events, as well as the thematic integration into teaching curricula. Copyright 2012 ASMONIA consortium. All rights reserved. 3

Table of Contents 1 Publications 6 2 External Workshops 7 2.1 1 st External ASMONIA Workshop 7 3 Posters & Talks 8 3.1 Posters 8 3.2 Talks 8 4 ASMONIA Website 9 References 10 Glossary and Abbreviations 11 Glossary 11 Abbreviations 11 Revision History 12 Copyright 2012 ASMONIA consortium. All rights reserved. 5

1 Publications This chapter presents the publications in conferences proceedings, academic journals, and other written formats of the ASMONIA project as of January 2012. Tailored Concepts for Software Integrity Protection in Mobile Networks, Manfred Schäfer (NSN) and Wolf-Dietrich Moeller (NSN), Germany, in International Journal on Advances in Security Volume 4, 2011 [SM2011] Mit Sicherheit zum Geschäftserfolg: Ökonomische Einflüsse von Sicherheitsmechanismen auf die Wertschöpfung in Mobilfunknetzen, Michael Hoche (CASSIDIAN) and Heiko Kirsch (CASSIDIAN), in Praxis der Informationsverarbeitung und Kommunikation (PIK), Volume 34, Issue 4, Walter de Gruyter GmbH & Co. KG, Berlin/Boston, 2011 [HK_PIK2011] 6 Copyright 2012 ASMONIA consortium. All rights reserved.

2 External Workshops This chapter presents the workshops of the ASMONIA project as of January 2012. 2.1 1 st External ASMONIA Workshop Date: 29.3.2011 This external workshop has been organized by ERNW and was held in conjunction with the Troopers 2011 IT-Security conference in Heidelberg. The slide set of each talk can be found on the ASMONIA website www.asmonia.de The agenda can be seen below: ASMONIA Overview and Reference Architecture for Collaborative Information Exchange, Hans Hofinger, Fraunhofer AISEC, Garching near Munich, Germany Cyber Fed Model - a Collaborative Threat Mitigation Tool, Scott C. Pinkerton, Argonne National Laboratory, Chicago, IL, US Input for the Local Security Overview and Dashboard, Heiko Kirsch and Michael Hoche, Cassidian Systems, Friedrichshafen, Germany FIDeS: Event Correlation based on Knowledge-Supported Machine Learning, Mirko Horstmann, Technologie-Zentrum Informatik und Informationstechnik, Bremen, Germany Integrity Protection for 4G Devices and NW Elements, Manfred Schäfer and Sascha Wessel, Nokia Siemens Networks and Fraunhofer AISEC, Munich, Germany Femtocell: Femtostep to the Holy Grail, Ravishankar Borgaonkar and Kevin Redon, T-Labs, Berlin, Germany Future Directions in Malware Detection on Mobile Handsets, André Egners, RWTH Aachen University, Germany Project AMSEL: Automatically Collect and Learn to Detect Malware, Michael Meier, Technical University Dortmund, Germany Worldwide Observatory of Malicious Behaviours and Attack Threats, Apostolis Zarras, Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH), Greece Usage Scenarios of Elastic Systems in a Telco Infrastrucutre, Mark Gall, Fraunhofer AISEC, Garching near Munich, Germany Cloud Networking Research in SAIL Project, Dominique Dudkowski, NEC Europe Ltd., Heidelberg, Germany Threats and risks for 4G Mobile Communication Networks and Terminals, Peter Schneider, Nokia Siemens Networks, Munich, Germany Copyright 2012 ASMONIA consortium. All rights reserved. 7

3 Posters & Talks This chapter presents the posters and talks of the ASMONIA project as of January 2012. 3.1 Posters "Sharing Knowledge to Improve Misuse Prevention and Situational Awareness", Peter Schoo (Fraunhofer AISEC), BMBF Kongress Zukünftiges Internet 2011, 6.-7. Juli 2011, Berlin (http://asmonia.de/publications/asmoniaposterfutureinternet2011.pdf) 3.2 Talks Security and Regulatory Requirements for Public Could Offerings to Support Selected Customer Use Cases, Joachim Lüken (NSN) and Mark Gall (FRAUNHOFER AISEC), Troopers IT-Security Conference 2011 (http://www.troopers.de/wpcontent/uploads/2011/04/tr11_gall_lueken_security_and_regulatory_requirements _for_cloud_offerings.pdf) Future Directions in Mobile Malware Detection on Mobile Handsets, André Egners (RWTH Aachen), Troopers IT-Security Conference 2011 (http://www.troopers.de/wpcontent/uploads/2011/04/tr11_egners_malware_detection.pdf) Business Transparency via Security Dashboards, Heiko Kirsch (CASSIDIAN), Michael Hoche (CASSIDIAN), Troopers IT-Security Conference 2011 (http://www.troopers.de/wpcontent/uploads/2011/04/tr11_kirsch_business_transparency.pdf) "Innovative Schutzkonzepte für Mobilfunkbasierte Netzinfrastrukturen", Peter Schoo (Fraunhofer AISEC), Kolloquium Universität der Bundeswehr München, 2011 Sicherheit hat ihren Preis: Modellierung des Einflusses von Sicherheitsmechanismen auf Werteflüsse in Informations- und Kommunikationssystemen, Heiko Kirsch (CASSIDIAN), Michael Hoche (CASSIDIAN), in Essener Workshop zur Netzsicherheit 2011 (EWNS11) [HK2011] Business meets Security Risk Economical Insights for Risk-Based Decisions, Heiko Kirsch (CASSIDIAN), Michael Hoche (CASSIDIAN), in 3 rd International Workshop on Early Warning Systems in IT (EWS11) [KH2011] 8 Copyright 2012 ASMONIA consortium. All rights reserved.

4 ASMONIA Website Relevant external information concerning the ongoing project is presented on the ASMONIA website www.asmonia.de. News about the project status, press releases, as well the publication of project deliverables can be found on the website. The website is maintained at Fraunhofer AISEC by Hans Hofinger. Figure 1 : ASMONIA Website (December 2011) Copyright 2012 ASMONIA consortium. All rights reserved. 9

References [SM_IJAS2011] Manfred Schäfer, Wolf-Dietrich Moeller, "Tailored Concepts for Software Integrity Protection in Mobile Networks", International Journal On Advances in Security Vol.4, September 2011 http://www.thinkmind.org/index.php?view=article&articleid=sec_v4_n12_2011_6 [KH_EWNS2011] Heiko Kirsch, Michael Hoche, "Sicherheit hat ihren Preis: Modellierung des Einflusses von Sicherheitsmechanismen auf Werteflüsse in Informations- und Kommunikationssystemen", Essener Workshop zur Netzsicherheit 2011 http://132.252.182.11/tdr/images/0/0c/10_sicherheit_hat_ihren_preis_-_kirsch_- _CASSIDIAN.pdf [HK_EWS2011] [HK_PIK2011] Michael Hoche, Heiko Kirsch, Business meets Security Risk Economical Insights for Risk-Based Decisions, 3 rd International Workshop on Early Warning Systems in IT (EWS11) Michael Hoche, Heiko Kirsch, Mit Sicherheit zum Geschäftserfolg: Ökonomische Einflüsse von Sicherheitsmechanismen auf die Wertschöpfung in Mobilfunknetzen, Praxis der Informationsverarbeitung und Kommunikation (PIK) Journal, 2011 10 Copyright 2012 ASMONIA consortium. All rights reserved.

Glossary and Abbreviations Glossary Term Explanation Source Abbreviations Copyright 2012 ASMONIA consortium. All rights reserved. 11

Revision History Version Date Changes 0.1 14.11.2011 Initial Version 0.5 18.01.2012 Review Version 1.0 31.01.2012 Final Version 12 Copyright 2012 ASMONIA consortium. All rights reserved.