Liste veröffentlichter Publikationen
2018
DDoS Defense using MTD and SDN
Jessica Steinberger, Benjamin Kuhnert, Christian Dietz, Lisa Ball, Anna Sperotto, Harald Baier, Aiko Pras and Gabi Dreo; in: Proceedings of IEEE/IFIP Network Operations and Management Symposium (NOMS’18), Taipeh (Taiwan), April 2018, to appear
2017
CAKE: Hybrides Gruppen-Schlüssel-Management Verfahren
Peter Hillmann, Marcus Knüpfer und Gabi Dreo Rodosek; in: 10. DFN-Forum Kommunikationstechnologien; Bonn: Gesellschaft für Informatik e.V., 2017
Content Driven Profile Matching across Online Social Networks
Roedler, Robert, Dennis Kergl, and Gabi Dreo Rodosek; in: Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2017
Cyber Range: Netzverteidigung trainieren mittels Simulation
Ralf Kaschow, Oliver Hanka, Marcus Knüpfer, Volker Eiseler; in: DACH Security 2017
Integrating visual analysis of network security and management of detection system configurations
Bastian Hellmann, Volker Ehlers und Gabi Dreo Rodosek; in: Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), IEEE, 2017
Modeling and learning incident prioritization
Leonard Renners, Felix Heine, and Gabi Dreo Rodosek; in: 9th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS); Bucharest: IEEE, 2017
On the Perception of Risk Assessment in Intrusion Detection Systems
Mario Golling, Robert Koch, Gabi Dreo Rodosek; in: 10. DFN-Forum Kommunikationstechnologien; Bonn: Gesellschaft für Informatik e.V., 2017
Optimized Travel to Meetings on a Common Location of Geographical Distributed Participants
Peter Hillmann, Bastian Kühnel, Tobias Uhlig, Gabi Dreo Rodosek, and Oliver Rose; in: Proceedings of the 12th IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI). IEEE, 2017
System Complexity Meets Decision Makers: A Framework for Level-Appropriate Information Processing
Volker Eiseler, Robert Koch, Gabi Dreo Rodosek; in: Proceedings of the 12th International Conference on Cyber Warfare and Security; UK: Academic Conferences and Publishing Limited, 2017
Towards Internet Scale Quality-of-Experience Measurement with Twitter
Dennis Kergl, Robert Roedler, Gabi Dreo Rodosek; in: Security of Networks and Services in an All-Connected World (AIMS); Cham: Springer, 2017
VulMap: Global Information Security Vulnerabilities – IEEE CNS 17 Poster
Kergl, Dennis, Robert Roedler, and Gabi Dreo Rodosek; in: 2017 IEEE Conference on Communications and Network Security; IEEE, 2017 (Best Poster Award)
2016
A Traffic Merging and Generation Framework for Realistic Synthesis of Network Traffic
Cem Gündogan, Sandro Passarelli, Peter Hillmann, Christian Dietz and Lars Stiemert; in: Spring Conference, 2016
Profile Matching across Online Social Networks based on Geo-Tags
Robert Roedler, Dennis Kergl, Gabi Dreo Rodosek; in: Advances in Nature and Biologically Inspired Computing; Cham: Springer, 2016
Detection of zero day exploits using real-time social media streams
Dennis Kergl, Robert Roedler, Gabi Dreo Rodosek; in: Advances in Nature and Biologically Inspired Computing; Cham: Springer, 2016
Dr. WATTson: Lightweight current-based Intrusion Detection (CBID)
Robert Koch, Teo Kühn, Marcel Odenwald, Gabi Dreo Rodosek; in: 14th Annual Conference on Privacy, Security and Trust (PST); IEEE, 2016
Evaluation of the General Applicability of Dragoon for the k-Center Problem
Tobias Uhlig, Peter Hillmann and Oliver Rose; in: Winter Simulation Conference (WSC), IEEE/ACM, 2016
How to Achieve Early Botnet Detection at the Provider Level?
Christian Dietz, Anna Sperotto, Gabi Dreo, Aiko Pras; in: IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS); 142-146; Springer, 2016
Language Agnostic Botnet Detection Based on ESOM and DNS
Christian Dietz, Rocco Mandrysch, Urs Anliker, Gabi Dreo; in: Journal on Cybercrime & Digital Investigations – CybIN; Botconf, 2016
Modeling the Location Selection of Mirror Servers in Content Delivery Networks
Peter Hillmann, Tobias Uhlig, Gabi Dreo Rodosek and Oliver Rose; in: Services Computing Conferece/Bigdata Congress, IEEE, 2016
Monitoring of the DNS Infrastructure for Proactive Botnet Detection
Christian Dietz, Anna Sperotto, Gabi Dreo, Aiko Pras; in: Spring Conference, 2016
On the Path to High Precise IP Geolocation: A Self-Optimizing Model
Peter Hillmann, Lars Stiemert, Gabi Dreo Rodosek, Oliver Rose; in: International Journal of Intelligent Computing Research (IJICR), Infonomics Society, 2016
Proactive Botnets Detection and Defense at Internet scale
Christian Dietz, Gabi Dreo, Anna Sperotto, Aiko Pras; in: TERENA Networking Conference (TNC16), 2016
Simulation and Optimization of Content Delivery Networks Considering User Profiles and Preferences of Internet Service Providers
Peter Hillmann, Tobias Uhlig, Gabi Dreo Rodosek, and Oliver Rose; in: Winter Simulation Conference (WSC), IEEE/ACM, 2016
Using Geolocation for the Strategic Preincident Preparation of an IT Forensics Analysis
Robert Koch, Mario Golling, Lars Stiemert, Gabi Dreo Rodosek; in: IEEE Systems Journal, Vol. 10, Iss. 4, Dec. 2016
Robert Koch, Mario Golling, and Gabi Dreo Rodosek: On Tor - A Long-Term Blackbox Investigation in IEEE Computer, Special Issue On Communications and Privacy under Surveillance, IEEE, 2016
2015
Dragoon: Advanced Modelling of IP Geolocation by use of Latency Measurements
Peter Hillmann, Lars Stiemert, Gabi Dreo Rodosek, and Oliver Rose In: Proceedings of the 10th International Conference for Internet Technology and Secured Transactions (ICITST), IEEE, 2015
Towards a SDN-Enabled IDS Environment
Sebastian Seeber, Lars Stiemert, and Gabi Dreo Rodosek In: Proceedings of the 3rd International Conference on Communications and Network Security (CNS), IEEE, 2015
A Novel Approach to Solve K-Center Problems with Geographical Placement
Peter Hillmann, Tobias Uhlig, Gabi Dreo Rodosek, Oliver Rose In: Proceedings of the 10th IEEE International Conference on Service Operations and Logistics, and Informatics (IEEE SOLI 2015). IEEE, 2015
Strategie zur Verfolgung einzelner IP-Pakete zur Datenflussanalyse
Frank Tietze, Peter Hillmann, and Gabi Dreo Rodosek In: 8. DFN-Forum Kommunikationstechnologien, Beiträge der Fachtagung, 08.-09. Juni 2015, Lübeck, volume 243 of LNI, pages 47–56. Gesellschaft für Informatik (GI), GI, 2015. Nominated for Best Paper Award
Modelling of IP Geolocation by use of Latency Measurements
Peter Hillmann, Lars Stiemert, Gabi Dreo Rodosek, and Oliver Rose In: Proceedings of the 11th International Conference on Network and Service Management (CNSM). IEEE, 2015
Geographical Placement of Warehouses based on the K-Center Problem
Peter Hillmann, Tobias Uhlig, Gabi Dreo Rodosek, and Oliver Rose In: Proceedings of the Winter Simulation Conference (WSC). IEEE, 2015
Strategies for Tracking Individual IP Packets Towards DDoS
Peter Hillmann, Frank Tietze, and Gabi Dreo Rodosek In: PIK Magazine, 2015
Tracemax: A Novel Single Packet IP Traceback Strategy for Data-Flow Analysis
Peter Hillmann, Frank Tietze, and Gabi Dreo Rodosek In: Proceedings of the 40th IEEE Conference on Local Computer Networks (LCN). IEEE, 2015
On the Evaluation of Military Simulations: Towards A Taxonomy of Assessment Criteria
Mario Golling, Robert Koch, Peter Hillmann, Volker Eiseler, Lars Stiemert, and Andreas Rekker In: Military Communications and Information Systems (MilCIS) Conference, IEEE, 2015
Enhancing network security by software vulnerability detection using social media analysis Extended Abstract
Dennis Kergl In: 15th international Conference on Data Mining (ICDM), IEEE, 2015
Disequilibrium: Tor’s Exit Node Selection Under the Stereoscope
Robert Koch, Mario Golling, and Gabi Dreo Rodosek In: 2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (RATSP), IEEE, 2015
A Decentralized Framework for Geolocation-based Pre-Incident Network Forensics
Mario Golling, Robert Koch, Lars Stiemert, Volker Eiseler, Frank Tietze, and Gabi Dreo Rodosek In: 7th International Symposium on Cyberspace Safety and Security (CSS 2015), IEEE, 2015
An Agent-based Framework for a Decentralized Reconstruction of Attack Paths
Mario Golling, Robert Koch, Frank Tietze, Sandy-Dorothea Hein, Michael Kretzschmar, and Gabi Dreo Rodosek In: DFN-Forum Kommunikationstechnologien, ser. LNI, P. Müller, B. Neumair, H. Reiser, und G. D. Rodosek, Eds. GI, 2015
Entwicklung einer Architektur für das Accounting in dynamischen Virtuellen Organisationen
Mario Golling, and Michael Kretzschmar In: BoD–Books on Demand, 2015
Blackout and Now? – Network Centric Warfare in an Anti-Access Area-Denial Theatre
Robert Koch, and Mario Golling In: Proceedings of the 7th International Conference on Cyber Conflict (CyCon), IEEE, 2015
Using Geolocation for the Strategic Pre-Incident Preparation of an IT Forensics Analysis
Robert Koch, Mario Golling, Lars Stiemert, and Gabi Dreo Rodosek In: IEEE Systems Journal Special Issue On ”Traffic Forensics: Systems, Tools, and Experimentations, 2015
How to Exchange Security Events? Overview and Evaluation of Formats and Protocols
Jessica Steinberger, Anna Sperotto, Mario Golling, Harald Baier, and Aiko Pras In: 14th IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2015), 2015
Performance Analysis of Diversity Techniques for Secure SATCOM-on-the-Move Systems
Christian A. Hofmann, Robert T. Schwarz and Andreas Knopp In: IEEE Military Communications Conference (MILCOM), IEEE, 2015
Technische Beurteilung und Weiterentwicklung von militärischen Funksystemen
Christian A. Hofmann, Andreas Knopp, Vito Dantona and Berthold Lankl In: Wehrwissenschaftliche Forschung Jahresbericht, Nov. 2014, 2015
2014
YANG2UML: Bijective Transformation and Simplification of YANG to UML
Mario Golling, Robert Koch, Peter Hillmann, Rick Hofstede, and Frank Tietze In: Proceedings of the 10th International Conference on Network and Service Management (CNSM). IEEE, 2014
Behavior-based Intrusion Detection in Encrypted Environments
Robert Koch, Mario Golling, and Gabi Dreo Rodosek In: IEEE Communications Magazine, Network & Services Management Series, 2014
Towards Comparability of Intrusion Detection Systems: New Data Sets
Robert Koch, Mario Golling, and Gabi Dreo Rodosek In: TERENA Networking Conference (TNC) – TNC2014, 2014
Architektur zur mehrstufigen Angriffserkennung in Hochgeschwindigkeits-Backbone-Netzen
Mario Golling, Robert Koch, and Lars Stiemert In: DFN- Forum Kommunikationstechnologien, ser. LNI, P. Müller, B. Neumair, H. Reiser, und G. D. Rodosek, Eds. GI, 2014
Smart Defence: An Architecture for new Challenges to Cyber Security
Robert Koch, Mario Golling, and Gabi Dreo Rodosek In: DFN-Forum Kommunikationstechnologien, ser. LNI, P. Müller, B. Neumair, H. Reiser, und G. D. Rodosek, Eds. GI, 2014
From Just-in-Time Intrusion Detection to Pro-Active Response by Means of Collaborated Cross-Domain Multilayered Intrusion Detection
Mario Golling, Robert Koch, and Gabi Dreo Rodosek poster presented at: 9th International Conference on Cyber Warfare and Security ICCWS- 2014. (Best Poster Award)
Towards Multi-layered Intrusion Detection in High-Speed Backbone Networks
Mario Golling, Rick Hofstede, and Robert Koch In: Proceedings of the 6th International Conference on Cyber Conflict (CyCon). IEEE, 2014, pp. 1–17
Using Layer 1 Signal Analysis for the Supervision of COTS Products
Robert Koch, Mario Golling, and Gabi Dreo Rodosek In: 9th International Conference on Cyber Warfare and Security ICCWS-2014, 2014, pp. 1–4. (Certificate of Merit)
Towards Smart Network Defense
Robert Koch, Mario Golling, and Gabi Dreo Rodosek poster presented at: 9th International Conference on Cyber Warfare and Security ICCWS-2014.
Applying Case-Based Reasoning to Intrusion Detection
Robert Koch, Mario Golling, Volker Eiseler and Gabi Dreo Rodosek poster presented at:9th International Conference on Cyber Warfare and Security ICCWS-2014.
2013:
G. Dreo and M. Golling,
Cyber Security: Challenges and Application Areas, in Supply Chain Management, Springer, 2013.
G. Dreo, M. Golling and W. Hommel,
MuSIC: An IT Security Architecture for Inter-Community Clouds, in IFIP/IEEE International Symposium on Integrated Network Management. 2013.
G. Dreo, M. Golling, W. Hommel and F. Tietze,
ICEMAN: An Architecture for Secure Federated Inter-Cloud Identity Management, in IFIP/IEEE Inter- national Workshop on Management of the Future Internet. 2013.
M. Golling, R. Koch, P. Hillmann and G. Dreo,
Ganzheitliche Architektur zur Entwicklung und Analyse sicherheitskritischer Systeme und Anwendungen, in DFN-Forum Kommunikationstechnologien 2013.
2012:
G. Dreo, M. Golling, W. Hommel and A. Reinhold,
Inter-Clouds: Einsatzmöglichkeiten und Anforderungen an die IT-Sicherheit, in DFN-Forum Kom- munikationstechnologien 2012.
R. Koch, B. Stelte and M. Golling,
Attack Trends in present computer networks, in IEEE 4th Conference on Cyber Conflict (CYCON), 2012.
2011:
M. Kretzschmar and M. Golling,
Eine Taxonomie und Bewertung von Cloud Computing-Diensten aus Sicht der Anwendungsentwickler, DFN-Forum Kommunikationstechnologien 2011.
M. Golling and B. Stelte,
Requirements for a future EWS-Cyber Defence in the internet of the future, in 3rd International Conference on Cyber Conflict (ICCC), IEEE, 2011.
M. Adrat, T. Bosch, W. Felder, M. Grossmann, G. Ulbricht, J. Fischer, M. Golling, S. Hanigk, M. Hauser und M. Schwall,
Abschlußbericht: Bausteine von Breitband-Wellenformen als Beiträge zur CoalWNW, Forschungs- vorhaben FKIE-Projekt-Nr. 100234, Fraunhofer-Institut für Kommunikation, Informationsverarbeitung und Ergonomie FKIE, August 2011.
R. Koch and M. Golling,
Start Catching Up: Towards Next-Generation In- trusion Detection, in 10th annual GOVCERT.NL symposium, 2011.
M. Kretzschmar, M. Golling and S. Hanigk,
Security Management Areas in the Inter-Cloud, in IEEE 4th International Conference on Cloud Comput- ing, 2011.
M. Kretzschmar and M. Golling,
Functional components for a Security Manager within future Inter-Cloud environments, in 7th International Confer- ence on Network and Service Management, CNSM, IEEE 2011.
M. Kretzschmar and M. Golling,
The Security Management Spectrum in Multi-Provider Inter-Cloud Environments, in Systems and Virtualization Man- agement (SVM), 5th International Distributed Management Task Force Aca- demic Alliance Workshop, 2011
M. Golling and G. Dreo,
Maßnahmen und Herausforderungen beim Schutz von IT-Systemen, in Technik in Bayern, VDI, 2011
Technische Berichte
im Jahr 2014
Prof. Dr. Gabi Dreo, Peter Hillmann, Frank Tietze, Sebastian Seeber
Cyber Defence
im Jahr 2013
Prof. Dr. Gabi Dreo, Frank Tietze, Peter Hillmann, Mario Golling, Björn Stelte
Cyber Defence
im Jahr 2012
Prof. Dr. Gabi Dreo, Mario Golling, Björn Stelte
Ausgewählte Themen der IT-Sicherheit
im Jahr 2009
Dr. Udo Helmbrecht, Prof. Dr. Gabi Dreo Rodosek, Björn Stelte, Robert Koch
Sichere und integre IT-Systeme
im Jahr 2008
Gabi Dreo, Udo Helmbrecht, Volker Eiseler , Frank Eyermann , Matthias Göhner, Iris Hochstatter, Andreas Matheus (Hrsg.)
Von der Sicherheit elektronischer Dokumente bis zu digitalen Identitäten
im Jahr 2004
B. Stiller, O. Braun, F. Eyermann, A. Heursch, P. Racz. (Hrsg.)
Internet Economics III
B. Stiller, F. Eyermann, A. Heursch, P. Racz (Hrsg.)
Mobile Systems III
B.Stiller, F.Eyermann , A.Heursch, P.Racz, R.Sofia (Hrsg.)
Internet Economics IV
im Jahr 2003
O. Braun, B. Stiller, . A. Heursch, P. Racz (Hrsg.)
Internet Economics II
O. Braun, B. Stiller, . A. Heursch, P. Racz (Hrsg.)
Mobile Systems II