Liste veröffentlichter Publikationen

2018

DDoS Defense using MTD and SDN
Jessica Steinberger, Benjamin Kuhnert, Christian Dietz, Lisa Ball, Anna Sperotto, Harald Baier, Aiko Pras and Gabi Dreo; in: Proceedings of IEEE/IFIP Network Operations and Management Symposium (NOMS’18), Taipeh (Taiwan), April 2018, to appear

2017

CAKE: Hybrides Gruppen-Schlüssel-Management Verfahren

Peter Hillmann, Marcus Knüpfer und Gabi Dreo Rodosek; in: 10. DFN-Forum Kommunikationstechnologien; Bonn: Gesellschaft für Informatik e.V., 2017

Content Driven Profile Matching across Online Social Networks

Roedler, Robert, Dennis Kergl, and Gabi Dreo Rodosek; in: Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2017

Cyber Range: Netzverteidigung trainieren mittels Simulation

Ralf Kaschow, Oliver Hanka, Marcus Knüpfer, Volker Eiseler; in: DACH Security 2017

Integrating visual analysis of network security and management of detection system configurations

Bastian Hellmann, Volker Ehlers und Gabi Dreo Rodosek; in: Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), IEEE, 2017

Modeling and learning incident prioritization

Leonard Renners, Felix Heine, and Gabi Dreo Rodosek; in: 9th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS); Bucharest: IEEE, 2017

On the Perception of Risk Assessment in Intrusion Detection Systems

Mario Golling, Robert Koch, Gabi Dreo Rodosek; in: 10. DFN-Forum Kommunikationstechnologien; Bonn: Gesellschaft für Informatik e.V., 2017

Optimized Travel to Meetings on a Common Location of Geographical Distributed Participants

Peter Hillmann, Bastian Kühnel, Tobias Uhlig, Gabi Dreo Rodosek, and Oliver Rose; in: Proceedings of the 12th IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI). IEEE, 2017

System Complexity Meets Decision Makers: A Framework for Level-Appropriate Information Processing

Volker Eiseler, Robert Koch, Gabi Dreo Rodosek; in: Proceedings of the 12th International Conference on Cyber Warfare and Security; UK: Academic Conferences and Publishing Limited, 2017

Towards Internet Scale Quality-of-Experience Measurement with Twitter

Dennis Kergl, Robert Roedler, Gabi Dreo Rodosek; in: Security of Networks and Services in an All-Connected World (AIMS); Cham: Springer, 2017

VulMap: Global Information Security Vulnerabilities – IEEE CNS 17 Poster

Kergl, Dennis, Robert Roedler, and Gabi Dreo Rodosek; in: 2017 IEEE Conference on Communications and Network Security; IEEE, 2017 (Best Poster Award)

 

2016

A Traffic Merging and Generation Framework for Realistic Synthesis of Network Traffic
Cem Gündogan, Sandro Passarelli, Peter Hillmann, Christian Dietz and Lars Stiemert; in: Spring Conference, 2016

Profile Matching across Online Social Networks based on Geo-Tags

Robert Roedler, Dennis Kergl, Gabi Dreo Rodosek; in: Advances in Nature and Biologically Inspired Computing; Cham: Springer, 2016

Detection of zero day exploits using real-time social media streams

Dennis Kergl, Robert Roedler, Gabi Dreo Rodosek; in: Advances in Nature and Biologically Inspired Computing; Cham: Springer, 2016

Dr. WATTson: Lightweight current-based Intrusion Detection (CBID)

Robert Koch, Teo Kühn, Marcel Odenwald, Gabi Dreo Rodosek; in: 14th Annual Conference on Privacy, Security and Trust (PST); IEEE, 2016

Evaluation of the General Applicability of Dragoon for the k-Center Problem
Tobias Uhlig, Peter Hillmann and Oliver Rose; in: Winter Simulation Conference (WSC), IEEE/ACM, 2016

How to Achieve Early Botnet Detection at the Provider Level?
Christian Dietz, Anna Sperotto, Gabi Dreo, Aiko Pras; in: IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS); 142-146; Springer, 2016

Language Agnostic Botnet Detection Based on ESOM and DNS
Christian Dietz, Rocco Mandrysch, Urs Anliker, Gabi Dreo; in: Journal on Cybercrime & Digital Investigations – CybIN; Botconf, 2016

Modeling the Location Selection of Mirror Servers in Content Delivery Networks
Peter Hillmann, Tobias Uhlig, Gabi Dreo Rodosek and Oliver Rose; in: Services Computing Conferece/Bigdata Congress, IEEE, 2016

Monitoring of the DNS Infrastructure for Proactive Botnet Detection
Christian Dietz, Anna Sperotto, Gabi Dreo, Aiko Pras; in: Spring Conference, 2016

On the Path to High Precise IP Geolocation: A Self-Optimizing Model
Peter Hillmann, Lars Stiemert, Gabi Dreo Rodosek, Oliver Rose; in: International Journal of Intelligent Computing Research (IJICR), Infonomics Society, 2016

Proactive Botnets Detection and Defense at Internet scale
Christian Dietz, Gabi Dreo, Anna Sperotto, Aiko Pras; in: TERENA Networking Conference (TNC16), 2016

Simulation and Optimization of Content Delivery Networks Considering User Profiles and Preferences of Internet Service Providers
Peter Hillmann, Tobias Uhlig, Gabi Dreo Rodosek, and Oliver Rose; in: Winter Simulation Conference (WSC), IEEE/ACM, 2016

Using Geolocation for the Strategic Preincident Preparation of an IT Forensics Analysis

Robert Koch, Mario Golling, Lars Stiemert, Gabi Dreo Rodosek; in: IEEE Systems Journal, Vol. 10, Iss. 4, Dec. 2016

Robert Koch, Mario Golling, and Gabi Dreo Rodosek: On Tor - A Long-Term Blackbox Investigation in IEEE Computer, Special Issue On Communications and Privacy under Surveillance, IEEE, 2016

2015

Dragoon: Advanced Modelling of IP Geolocation by use of Latency Measurements
Peter Hillmann, Lars Stiemert, Gabi Dreo Rodosek, and Oliver Rose In: Proceedings of the 10th International Conference for Internet Technology and Secured Transactions (ICITST), IEEE, 2015

Towards a SDN-Enabled IDS Environment
Sebastian Seeber, Lars Stiemert, and Gabi Dreo Rodosek In: Proceedings of the 3rd International Conference on Communications and Network Security (CNS), IEEE, 2015

A Novel Approach to Solve K-Center Problems with Geographical Placement
Peter Hillmann, Tobias Uhlig, Gabi Dreo Rodosek, Oliver Rose In: Proceedings of the 10th IEEE International Conference on Service Operations and Logistics, and Informatics (IEEE SOLI 2015). IEEE, 2015

Strategie zur Verfolgung einzelner IP-Pakete zur Datenflussanalyse
Frank Tietze, Peter Hillmann, and Gabi Dreo Rodosek In: 8. DFN-Forum Kommunikationstechnologien, Beiträge der Fachtagung, 08.-09. Juni 2015, Lübeck, volume 243 of LNI, pages 47–56. Gesellschaft für Informatik (GI), GI, 2015. Nominated for Best Paper Award

Modelling of IP Geolocation by use of Latency Measurements
Peter Hillmann, Lars Stiemert, Gabi Dreo Rodosek, and Oliver Rose In: Proceedings of the 11th International Conference on Network and Service Management (CNSM). IEEE, 2015

Geographical Placement of Warehouses based on the K-Center Problem
Peter Hillmann, Tobias Uhlig, Gabi Dreo Rodosek, and Oliver Rose In: Proceedings of the Winter Simulation Conference (WSC). IEEE, 2015

Strategies for Tracking Individual IP Packets Towards DDoS
Peter Hillmann, Frank Tietze, and Gabi Dreo Rodosek In: PIK Magazine, 2015

Tracemax: A Novel Single Packet IP Traceback Strategy for Data-Flow Analysis
Peter Hillmann, Frank Tietze, and Gabi Dreo Rodosek In: Proceedings of the 40th IEEE Conference on Local Computer Networks (LCN). IEEE, 2015

On the Evaluation of Military Simulations: Towards A Taxonomy of Assessment Criteria
Mario Golling, Robert Koch, Peter Hillmann, Volker Eiseler, Lars Stiemert, and Andreas Rekker In: Military Communications and Information Systems (MilCIS) Conference, IEEE, 2015

Enhancing network security by software vulnerability detection using social media analysis Extended Abstract
Dennis Kergl In: 15th international Conference on Data Mining (ICDM), IEEE, 2015

Disequilibrium: Tor’s Exit Node Selection Under the Stereoscope
Robert Koch, Mario Golling, and Gabi Dreo Rodosek In: 2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (RATSP), IEEE, 2015

A Decentralized Framework for Geolocation-based Pre-Incident Network Forensics
Mario Golling, Robert Koch, Lars Stiemert, Volker Eiseler, Frank Tietze, and Gabi Dreo Rodosek In: 7th International Symposium on Cyberspace Safety and Security (CSS 2015), IEEE, 2015

An Agent-based Framework for a Decentralized Reconstruction of Attack Paths
Mario Golling, Robert Koch, Frank Tietze, Sandy-Dorothea Hein, Michael Kretzschmar, and Gabi Dreo Rodosek In: DFN-Forum Kommunikationstechnologien, ser. LNI, P. Müller, B. Neumair, H. Reiser, und G. D. Rodosek, Eds. GI, 2015

Entwicklung einer Architektur für das Accounting in dynamischen Virtuellen Organisationen
Mario Golling, and Michael Kretzschmar In: BoD–Books on Demand, 2015

Blackout and Now? – Network Centric Warfare in an Anti-Access Area-Denial Theatre
Robert Koch, and Mario Golling In: Proceedings of the 7th International Conference on Cyber Conflict (CyCon), IEEE, 2015

Using Geolocation for the Strategic Pre-Incident Preparation of an IT Forensics Analysis
Robert Koch, Mario Golling, Lars Stiemert, and Gabi Dreo Rodosek In: IEEE Systems Journal Special Issue On ”Traffic Forensics: Systems, Tools, and Experimentations, 2015

How to Exchange Security Events? Overview and Evaluation of Formats and Protocols
Jessica Steinberger, Anna Sperotto, Mario Golling, Harald Baier, and Aiko Pras In: 14th IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2015), 2015

Performance Analysis of Diversity Techniques for Secure SATCOM-on-the-Move Systems
Christian A. Hofmann, Robert T. Schwarz and Andreas Knopp In: IEEE Military Communications Conference (MILCOM), IEEE, 2015

Technische Beurteilung und Weiterentwicklung von militärischen Funksystemen
Christian A. Hofmann, Andreas Knopp, Vito Dantona and Berthold Lankl In: Wehrwissenschaftliche Forschung Jahresbericht, Nov. 2014, 2015

2014

YANG2UML: Bijective Transformation and Simplification of YANG to UML
Mario Golling, Robert Koch, Peter Hillmann, Rick Hofstede, and Frank Tietze In: Proceedings of the 10th International Conference on Network and Service Management (CNSM). IEEE, 2014

Behavior-based Intrusion Detection in Encrypted Environments
Robert Koch, Mario Golling, and Gabi Dreo Rodosek In: IEEE Communications Magazine, Network & Services Management Series, 2014

Towards Comparability of Intrusion Detection Systems: New Data Sets
Robert Koch, Mario Golling, and Gabi Dreo Rodosek In: TERENA Networking Conference (TNC) – TNC2014, 2014

Architektur zur mehrstufigen Angriffserkennung in Hochgeschwindigkeits-Backbone-Netzen
Mario Golling, Robert Koch, and Lars Stiemert In: DFN- Forum Kommunikationstechnologien, ser. LNI, P. Müller, B. Neumair, H. Reiser, und G. D. Rodosek, Eds. GI, 2014

Smart Defence: An Architecture for new Challenges to Cyber Security
Robert Koch, Mario Golling, and Gabi Dreo Rodosek In: DFN-Forum Kommunikationstechnologien, ser. LNI, P. Müller, B. Neumair, H. Reiser, und G. D. Rodosek, Eds. GI, 2014

From Just-in-Time Intrusion Detection to Pro-Active Response by Means of Collaborated Cross-Domain Multilayered Intrusion Detection
Mario Golling, Robert Koch, and Gabi Dreo Rodosek poster presented at: 9th International Conference on Cyber Warfare and Security ICCWS- 2014. (Best Poster Award)

Towards Multi-layered Intrusion Detection in High-Speed Backbone Networks
Mario Golling, Rick Hofstede, and Robert Koch In: Proceedings of the 6th International Conference on Cyber Conflict (CyCon). IEEE, 2014, pp. 1–17

Using Layer 1 Signal Analysis for the Supervision of COTS Products
Robert Koch, Mario Golling, and Gabi Dreo Rodosek In: 9th International Conference on Cyber Warfare and Security ICCWS-2014, 2014, pp. 1–4. (Certificate of Merit)

Towards Smart Network Defense
Robert Koch, Mario Golling, and Gabi Dreo Rodosek poster presented at: 9th International Conference on Cyber Warfare and Security ICCWS-2014.

Applying Case-Based Reasoning to Intrusion Detection
Robert Koch, Mario Golling, Volker Eiseler and Gabi Dreo Rodosek poster presented at:9th International Conference on Cyber Warfare and Security ICCWS-2014.

2013:

G. Dreo and M. Golling,
Cyber Security: Challenges and Application Areas, in Supply Chain Management, Springer, 2013.

G. Dreo, M. Golling and W. Hommel,
MuSIC: An IT Security Architecture for Inter-Community Clouds, in IFIP/IEEE International Symposium on Integrated Network Management. 2013.

G. Dreo, M. Golling, W. Hommel and F. Tietze,
ICEMAN: An Architecture for Secure Federated Inter-Cloud Identity Management, in IFIP/IEEE Inter- national Workshop on Management of the Future Internet. 2013.

M. Golling, R. Koch, P. Hillmann and G. Dreo,
Ganzheitliche Architektur zur Entwicklung und Analyse sicherheitskritischer Systeme und Anwendungen, in DFN-Forum Kommunikationstechnologien 2013.

 

2012:

G. Dreo, M. Golling, W. Hommel and A. Reinhold,
Inter-Clouds: Einsatzmöglichkeiten und Anforderungen an die IT-Sicherheit, in DFN-Forum Kom- munikationstechnologien 2012.

R. Koch, B. Stelte and M. Golling,
Attack Trends in present computer networks, in IEEE 4th Conference on Cyber Conflict (CYCON), 2012.

 

2011:

M. Kretzschmar and M. Golling,
Eine Taxonomie und Bewertung von Cloud Computing-Diensten aus Sicht der Anwendungsentwickler, DFN-Forum Kommunikationstechnologien 2011.

M. Golling and B. Stelte,
Requirements for a future EWS-Cyber Defence in the internet of the future, in 3rd International Conference on Cyber Conflict (ICCC), IEEE, 2011.

M. Adrat, T. Bosch, W. Felder, M. Grossmann, G. Ulbricht, J. Fischer, M. Golling, S. Hanigk, M. Hauser und M. Schwall,
Abschlußbericht: Bausteine von Breitband-Wellenformen als Beiträge zur CoalWNW, Forschungs- vorhaben FKIE-Projekt-Nr. 100234, Fraunhofer-Institut für Kommunikation, Informationsverarbeitung und Ergonomie FKIE, August 2011.

R. Koch and M. Golling,
Start Catching Up: Towards Next-Generation In- trusion Detection, in 10th annual GOVCERT.NL symposium, 2011.

M. Kretzschmar, M. Golling and S. Hanigk,
Security Management Areas in the Inter-Cloud, in IEEE 4th International Conference on Cloud Comput- ing, 2011.

M. Kretzschmar and M. Golling,
Functional components for a Security Manager within future Inter-Cloud environments, in 7th International Confer- ence on Network and Service Management, CNSM, IEEE 2011.

M. Kretzschmar and M. Golling,
The Security Management Spectrum in Multi-Provider Inter-Cloud Environments, in Systems and Virtualization Man- agement (SVM), 5th International Distributed Management Task Force Aca- demic Alliance Workshop, 2011

M. Golling and G. Dreo,
Maßnahmen und Herausforderungen beim Schutz von IT-Systemen, in Technik in Bayern, VDI, 2011

 

Technische Berichte

im Jahr 2014

Prof. Dr. Gabi Dreo, Peter Hillmann, Frank Tietze, Sebastian Seeber

Cyber Defence

pdf-Datei

 

im Jahr 2013

Prof. Dr. Gabi Dreo, Frank Tietze, Peter Hillmann, Mario Golling, Björn Stelte

Cyber Defence

pdf-Datei

 

im Jahr 2012

Prof. Dr. Gabi Dreo, Mario Golling, Björn Stelte

Ausgewählte Themen der IT-Sicherheit

pdf-Datei

 

im Jahr 2009

Dr. Udo Helmbrecht, Prof. Dr. Gabi Dreo Rodosek, Björn Stelte, Robert Koch

Sichere und integre IT-Systeme

 

im Jahr 2008

Gabi Dreo, Udo Helmbrecht, Volker Eiseler , Frank Eyermann , Matthias Göhner, Iris Hochstatter, Andreas Matheus (Hrsg.)

Von der Sicherheit elektronischer Dokumente bis zu digitalen Identitäten

 

im Jahr 2004

B. Stiller, O. Braun, F. Eyermann, A. Heursch, P. Racz. (Hrsg.)

Internet Economics III

PDF-Version


B. Stiller, F. Eyermann, A. Heursch, P. Racz (Hrsg.)

Mobile Systems III

PDF-Version


B.Stiller, F.Eyermann , A.Heursch, P.Racz, R.Sofia (Hrsg.)

Internet Economics IV

PDF-Version

 

im Jahr 2003

O. Braun, B. Stiller, . A. Heursch, P. Racz (Hrsg.)

Internet Economics II

PDF-Version

O. Braun, B. Stiller, . A. Heursch, P. Racz (Hrsg.)

Mobile Systems II

PDF-Version

Weiteres