Direkt zum Inhalt | Direkt zur Navigation

Mario Golling

Mario Golling

Dipl.-Wirt.-Inf. Mario Golling

ist seit Juli 2010

wissenschaftlicher Mitarbeiter am


Institut für Technische Informatik


Gebäude: 41/300
Zimmer: 0305
Telefon: +49 89 6004 2255
E-Mail : Mario.Golling [at] unibw.de

 

Forschungsschwerpunkte

 

  • Intrusion Detection mit Schwerpunkten: Hochgeschwindigkeitsnetze, Next-Generation Intrusion Detection, Mehrstufige Einbruchserkennung
  • Sicherheit von Netzen
  • Cyber Warfare
  • Geolokalisation
  • Cloud Computing Security

 

Veröffentlichungen

 

2014:

R. Koch, M. Golling, and G. D. Rodosek, “Behavior-based Intrusion Detection in Encrypted Environments," in IEEE Communications Magazine, Network & Services Management Series, 2014.

R. Koch, M. Golling, and G. D. Rodosek, “Towards Comparability of Intrusion Detection Systems: New Data Sets,” in TERENA Networking Conference (TNC) - TNC2014, 2014.

M. Golling, R. Koch und L. Stiemert, “Architektur zur mehrstufigen Angriffserkennung in Hochgeschwindigkeits-Nackbone-Netzen,” in DFN- Forum Kommunikationstechnologien, ser. LNI, P. Müller, B. Neumair, H. Reiser, und G. D. Rodosek, Eds. GI, 2014.

R. Koch, M. Golling, and G. D. Rodosek, “Smart Defence: An Architecture for new Challenges to Cyber Security,” in DFN-Forum Kommunikationstechnologien, ser. LNI, P. Müller, B. Neumair, H. Reiser, und G. D. Rodosek, Eds. GI, 2014.

M. Golling, R. Koch, and G. D. Rodosek, “From Just-in-Time Intrusion Detection to Pro-Active Response by Means of Collaborated Cross- Domain Multilayered Intrusion Detection,” 2014, poster presented at the 9th International Conference on Cyber Warfare and Security ICCWS- 2014. (Best Poster Award)

M. Golling, R. Hofstede, and R. Koch, “Towards Multi-layered Intrusion Detection in High-Speed Backbone Networks,” in Proceedings of the 6th International Conference on Cyber Conflict (CyCon). IEEE, 2014, pp. 1–17.

R. Koch, M. Golling, and G. D. Rodosek, “Using Layer 1 Signal Analysis for the Supervision of COTS Products,” in 9th International Conference on Cyber Warfare and Security ICCWS-2014, 2014, pp. 1–4. (Certificate of Merit)

R. Koch, M. Golling, and G. D. Rodosek, “Towards Smart Network Defense,” 2014, poster presented at the 9th International Conference on Cyber Warfare and Security ICCWS-2014.

R. Koch, M. Golling, and G. D. Rodosek, “Applying Case-Based Reasoning to Intrusion Detection,” 2014, poster presented at the 9th International Conference on Cyber Warfare and Security ICCWS-2014.

 

2013:

R. Koch, M. Golling, and G. D. Rodosek, “Geolocation and Verification of IP-Addresses with Specific Focus on IPv6,” Journal of Communication and Computer. 11 (2013) 1381-1395.

S.-D. Hein, F. Tietze und M. Golling, “Daten-Archäologie – Forensische Toolkits zur Rekonstruktion von Browser-Sessions,” Admin-Magazin, November 2013.

R. Koch, M. Golling, and G. D. Rodosek, “Geolocation and Verification of IP-Addresses with Specific Focus on IPv6,” in 5th International Symposium on Cyberspace Safety and Security (CSS 2013). Springer, 2013, pp. 1–20.

G. D. Rodosek, R. Koch, M. Golling, and D. Kergl, “Seminar Cyber Defense FT2013,” Universität der Bundeswehr München, Tech. Rep. 2013-02, November 2013.

R. Koch, M. Golling, and G. D. Rodosek, “An Architecture for Supervising COTS Products,” in First IEEE Conference on Communications and Network Security (IEEE CNS 2013), 2013, pp. 1–2.

R. Koch, M. Golling, and G. D. Rodosek, “Attracting Sophisticated Attacks to Secure Systems: A new Honeypot Architecture,” in First IEEE Conference on Communications and Network Security (IEEE CNS 2013), 2013, pp. 1–2.

R. Koch, M. Golling, and G. D. Rodosek, “Advanced Geolocation of IP Addresses,” in International Conference on Communication and Network Security (ICCNS), 2013, pp. 1–10.

R. Koch, M. Golling, and G. D. Rodosek,, “Evaluation of State of the Art IDS Message Exchange Protocols,” in International Conference on Communication and Network Security (ICCNS), 2013, pp. 1–10.

R. Koch and M. Golling, “Architecture for Evaluating and Correlating NIDS in Real-World networks,” in Proceedings of the 5th International Conference on Cyber Conflict (CyCon). IEEE, 2013, pp. 1–20.

G. D. Rodosek, M. Golling, W. Hommel, and F. Tietze, “ICEMAN: An Architecture for Secure Federated Inter-Cloud Identity Management,” in Proceedings of the 5th IFIP/IEEE International Workshop on Management of the Future Internet. IEEE, May 2013.

G. D. Rodosek, M. Golling, and W. Hommel, “MuSIC: An IT-Security Architecture for Inter-Community Clouds,” in Proceedings of the IFIP/IEEE Integrated Network Management Symposium (IM 2013).IEEE, May 2013.

G. D. Rodosek, F. Tietze, P. Hillmann, M. Golling und B. Stelte (Hrsg.), “Grundlagen der IT-Forensik,” Universität der Bundeswehr München, Tech. Rep. 2013-01, June 2013.

M. Golling, R. Koch, P. Hillmann, and G. D. Rodosek, “Ganzheitliche Architektur zur Entwicklung und Analyse sicherheitskritischer Systeme und Anwendungen,” in 6. DFN-Forum Kommunikationstechnologien, Beiträge der Fachtagung, 03.-04. Juni 2013, Erlangen, ser. LNI, vol. 217, Gesellschaft für Informatik (GI). GI, 2013, pp. 87–96.

G. D. Rodosek and M. Golling, “Cyber security: Challenges and application areas,” in Supply Chain Safety Management. Springer, 2013, pp. 179–197.

 

2012:

R. Koch, B. Stelte, and M. Golling, “Attack Trends in Present Computer Networks,” in Proceedings of the 4th International Conference on Cyber Conflict (CyCon). IEEE, June 2012, pp. 1–12.

G. D. Rodosek, M. Golling, W. Hommel, and A. Reinhold, “Inter-clouds: Einsatzmöglichkeiten und Anforderungen an die IT-Sicherheit,” in 5. DFN- Forum Kommunikationstechnologien: Verteilte Systeme im Wissenschaftsbereich, Beiträge der Fachtagung, 21.-22. Mai 2012, Regensburg.

M. Golling und G. Dreo, “Maßnahmen und Herausforderungen beim Schutz von IT-Systemen,” Technik in Bayern, VDI, vol. 1, 2012.

G.Dreo, M.Golling und B.Stelte (Hrsg.),“Ausgewählte Themen der IT-Sicherheit,” Universität der Bundeswehr München, Tech. Rep. 2012-02, Juli 2012.

 

2011:

M. Kretzschmar, M. Golling, and S. Hanigk, “Security Management Areas in the Inter-cloud,” in Cloud Computing (CLOUD), 2011 IEEE International Conference on. IEEE, 2011, pp. 762–763.

M. Kretzschmar and M. Golling, “Functional Components for a Security Manager within Future Inter-cloud Environments,” in Network and Service Management (CNSM), 2011 7th International Conference on. IEEE, 2011, pp. 1–5.

M. Kretzschmar and M. Golling, “Security Management Spectrum in Future Multi-Provider Inter- cloud Environments—Method to Highlight Necessary Further Development,” in Systems and Virtualization Management (SVM), 2011 5th International DMTF Academic Alliance Workshop on. IEEE, 2011, pp. 1–8.

M. Kretzschmar und M. Golling, “Eine Taxonomie und Bewertung von Cloud Computing-Diensten aus Sicht der Anwendungsentwickler,” in 4. DFN-Forum Kommunikationstechnologien, Beiträge der Fachtagung, 20. Juni bis 21. Juni 2011, Bonn, ser. LNI, vol. 187. Gesellschaft für Informatik eV (GI), 2011, pp. 47–56.

M. Adrat, T. Bosch, W. Felber, M. Grossmann, J. Fischer, M. Golling, S. Hanigk, M. Hauser, and M. Schwall, Bausteine von Breitband-Wellenformen als Beiträge zur COALWNW - Abschlussbericht Forschungsvorhaben FKIE-Projekt. FKIE, 2011.

M. Golling and B. Stelte, “Requirements for a Future EWS – Cyber Defence in the Internet of the Future,” in Proceedings of the 3rd International Conference on Cyber Conflict (ICCC). pp. 1–16. IEEE, June 2011

 

sonstige wissenschaftliche Tätigkeiten

 

Mitglied im Programmkommitee (Technical Program Committee):

  • 14th IEEE/IFIP International Symposium on Integrated Network Management (IM 2015), 11-15 May 2015 in Ottawa, Canada
  • Global Information Infrastructure and Networking Symposium 2014 (GIIS'14), to be held in Montreal, Canada on September 15-19, 2014

Reviewer für:

  • Applied Computing and Informatics (ACI), Elsevier
  • Journal of the Network and Systems Management (JONS), Springer
  • International Journal of Network Management, Wiley, (available through ACM Digital Library)

sonstiges:

  • Principal Investigator für die Ressourcen der UniBwM im Rahmen des EmanicsLab (European research network initiated in 2007)
  • Mitglied im Arbeitskreis IT-Sicherheit der UniBwM