Dezentrale Anomalieerkennung
»DecADe« wird vom Bundesministerium für Bildung und Forschung (BmBF) gefördert und betreut durch die VDI/VDE Innovation + Technik GmbH.
Das Konsortium setzt sich aus den folgenden geförderten Hochschulen und Unternehmen zusammen:
Die assoziierten Partner sind:
Präsentation des Projekts und aktueller Ergebnisse bei BMBF Status-Konferenz "Erkennung und Aufklärung von IT-Sicherheitsvorfällen
Vorstellung des Projekts bei der nationale Konferenz IT-Sicherheitsforschung
A resource-preserving self-regulating Uncoupled MAC algorithm to be applied in incident detectiong, Michael Heigl, Laurin Doerr, Nicolas Tiefnig, Dalibor Fiala, Martin Schramm. Computers & Security, Volume 85, 2019, Pages 270-287, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2019.05.010. [link]
Comparison of Optimization Goals for Resilient Routing, Cora Perner and Georg Carle. In Proceedings of ICC 2019 - ICC 2019 Workshop - 5G Auto, May 2019.
Multi-party authorization and conflict mediation for decentralized configuration management processes, Holger Kinkelin, Heiko Niedermayer, Marc-Oliver Müller and Georg Carle. In Proceedings of IM 2019 - IEEE/IFIP Workshop HotNSM 2019, April 2019.
Adaptive Network Management for Safety-Critical Systems, Cora Perner, Holger Kinkelin and Georg Carle. In Proceedings of IM 2019 - IEEE/IFIP Workshop DISSECT 2019, April 2019.
Data Querying and Access Control for Secure Multiparty Computation Marcel von Maltitz, Dominik Bitzer, Georg Carle. In Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, April 2019
Performance Perspective on Private Distributed Ledger Technologies for Industrial Networks, Fabien Geyer, Holger Kinkelin, Hendrik Leppelsack, Stefan Liebald, Dominik Scholz, Georg Carle and Dominic Schupke. In Proceedings of the International Conference on Networked Systems (NetSys) 2019, April 2019.
A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication, Michael Heigl, Martin Schramm and Dalibor Fiala. In 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), ISBN 978-1-5386-9150-2, March 2019.
A Performance and Resource Consumption Assessment of Secret Sharing based Secure Multiparty Computation Marcel von Maltitz, Georg Carle. In Data Privacy Management Workshop ’18, European Symposium on Research in Computer Security , September 2018
Incident reaction based on intrusion detections’ alert analysis, Michael Heigl, Laurin Dörr, Amar Almaini, Dalibor Fiala, Martin Schramm. In Proceedings of the IEEE 23rd International Conference Applied Electronics, September 2018.
Securing IoT Microservices with Certificates, Marc-Oliver Pahl, Lorenzo Donini. In Network Operations and Management Symposium (Noms), April 2018. [link].
Machine Learning as a Reusable Microservice, Marc-Oliver Pahl, Markus Loipfinger. In Network Operations and Management Symposium (Noms), April 2018. [link].
Graph-Based IoT Microservice Security, Marc-Oliver Pahl, Francois-Xavier Aubet, Stefan Liebald. In Network Operations and Management Symposium (Noms), April 2018. [link].
Network Optimization for Safety-Critical Systems Using Software-Defined Networks, Cora Perner. In Lecture Notes In Computer Science, April 2018. [link].
A Management Framework for Secure Multiparty Computation in Dynamic Environments, Marcel Maltitz, Stefan Smarzly, Holger Kinkelin, Georg Carle. In Noms 2018 – IEEE/IFIP Dominos Workshop, April 2018.
Trustworthy Configuration Management for Networked Devices using Distributed Ledgers, Holger Kinkelin, Valentin Hauner, Heiko Niedermayer, Georg Carle. In Noms 2018 - IEEE/IFIP Dominos Workshop, April 2018.
Privacy by Design in Cars – Myth or Reality?, Stahl Florian. In Iapp Europe Data Protection Intensive 2018, April 2018.
Graph-based Anomaly Detection for IoT Microservices, François-Xavier Aubet, Marc-Oliver Pahl, Stefan Liebald, Mohammad Reza Norouzian. In Passive and Active Measurement Conference (Pam), March 2018. [link].
Live Detection and Analysis of HTTPS Interceptions, Tobias Brunnwieser, Oliver Gasser, Sree Harsha Totakura, Georg Carle. In Passive and Active Measurement Conference (Pam), Poster, March 2018.
In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements, Oliver Gasser, Benjamin Hof, Max Helm, Maciej Korczynski, Ralph Holz, Georg Carle. In Proceedings of the Passive and Active Measurement Conference (Pam 2018), Best Paper Award, March 2018. [link].
Performance Evaluation of Network Topologies using Graph-Based Deep Learning, Fabien Geyer. In Proceedings of the 11th International Conference on Performance Evaluation Methodologies and Tools, December 2017. [link].
Comparison of Supervised, Semi-supervised and Unsupervised Learning Methods in Network Intrusion Detection System (NIDS) Application, Nari Sivanandam Arunraj, Robert Hable, Michael Fernandes, Karl Leidl, Michael Heigl. In Anwendungen Und Konzepte Der Wirtschaftsinformatik, November 2017. [link].
Opportunities and Challenges of Ad-based Measurements from the Edge of the Network, Patricia Callejo, Connor Kelton, Narseo Vallina-Rodriguez, Rubén Cuevas, Oliver Gasser, Christian Kreibich, Florian Wohlfart, Ángel Cuevas. In Proc. of the 16th ACM Workshop on Hot Topics In Networks, November 2017.
Towards a Security Monitoring Architecture for Automotive Communication Systems, Michael Heigl, Laurin Doerr, Andreas Seiler, Martin Schramm. In Internationaler VDI-Kongress Electronics In Vehicles (Eliv), October 2017.
Assessment Simulation Model for Uncoupled Message Authentication, Laurin Doerr, Michael Heigl, Dalibor Fiala, Martin Schramm. In Proceedings of the 22nd International Conference on Applied Electronics In Pilsen, September 2017. [link].
Distributed Embedded Incident Detection and Response Mechanisms, Michael Heigl. In Protectit Security Convention 2017, July 2017.
Achieving reproducible network environments with INSALATA, Nadine Herold, Matthias Wachs, Marko Dorfhuber, Christoph Rudolf, Stefan Liebald, Georg Carle. In 11th International Conference on Autonomous Infrastructure, Management and Security (Aims’2017), Best Paper Award, July 2017.
Privacy Assessment using Static Taint Analysis (Tool Paper), Marcel von Maltitz, Cornelius Diekmann, Georg Carle. In Forte – 37th IFIP International Conference on Formal Techniques For Distributed Objects, Components and Systems, June 2017. [link].
An Approach to an Embedded Anomaly-Based IDS on the Example of SOME/IP, Michael Heigl, Karl Leidl. In 3rd Vector Testing Symposium, May 2017. [link].
Experimental Assessment of FIRO- and GARO-based Noise Sources for Digital TRNG Designs on FPGAs, Martin Schramm, Reiner Dojen, Michael Heigl. In 22nd International Conference on Applied Electronics In Pilsen, 2017.
IT-Security-Architektur für Next-Generation Kommunikationssysteme im Automobil, Laurin Doerr, Michael Heigl, Andreas Grzemba, Christian Boiger. In Vdi/Vw-Gemeinschaftstagung: Fahrerassistenzsysteme Und Automatisiertes Fahren, November 2016.
Kontaktmöglichkeiten bestehen über die oben genannten Partner.