Skip to main content

Showing 1–25 of 25 results for author: Brust, M R

Searching in archive cs. Search in all archives.
.
  1. Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning

    Authors: Mostafa Rezazad, Matthias R. Brust, Mohammad Akbari, Pascal Bouvry, Ngai-Man Cheung

    Abstract: A novel class of extreme link-flooding DDoS (Distributed Denial of Service) attacks is designed to cut off entire geographical areas such as cities and even countries from the Internet by simultaneously targeting a selected set of network links. The Crossfire attack is a target-area link-flooding attack, which is orchestrated in three complex phases. The attack uses a massively distributed large-s… ▽ More

    Submitted 1 March, 2019; originally announced March 2019.

    Comments: arXiv admin note: text overlap with arXiv:1801.00235

    Journal ref: Advances in Intelligent Systems and Computing, 2018

  2. arXiv:1902.09364  [pdf, other

    cs.SI physics.soc-ph

    Transforming Collaboration Data into Network Layers for Enhanced Analytics

    Authors: Saharnaz E. Dilmaghani, Apivadee Piyatumrong, Pascal Bouvry, Matthias R. Brust

    Abstract: We consider the problem of automatically generating networks from data of collaborating researchers. The objective is to apply network analysis on the resulting network layers to reveal supplemental patterns and insights of the research collaborations. In this paper, we describe our data-to-networks method, which automatically generates a set of logical network layers from the relational input dat… ▽ More

    Submitted 25 February, 2019; originally announced February 2019.

    Comments: International Conference on Optimization and Learning (OLA), 2019

  3. arXiv:1808.06900  [pdf, other

    cs.NI cs.DS cs.RO eess.SY

    Defending against Intrusion of Malicious UAVs with Networked UAV Defense Swarms

    Authors: Matthias R. Brust, Grégoire Danoy, Pascal Bouvry, Dren Gashi, Himadri Pathak, Mike P. Gonçalves

    Abstract: Nowadays, companies such as Amazon, Alibaba, and even pizza chains are pushing forward to use drones, also called UAVs (Unmanned Aerial Vehicles), for service provision, such as package and food delivery. As governments intend to use these immense economic benefits that UAVs have to offer, urban planners are moving forward to incorporate so-called UAV flight zones and UAV highways in their smart c… ▽ More

    Submitted 2 September, 2018; v1 submitted 21 August, 2018; originally announced August 2018.

    Comments: IEEE Conference on Local Computer Networks (LCN), 2017

  4. The Privacy Exposure Problem in Mobile Location-based Services

    Authors: Fang-Jing Wu, Matthias R. Brust, Yan-Ann Chen, Tie Luo

    Abstract: Mobile location-based services (LBSs) empowered by mobile crowdsourcing provide users with context-aware intelligent services based on user locations. As smartphones are capable of collecting and disseminating massive user location-embedded sensing information, privacy preservation for mobile users has become a crucial issue. This paper proposes a metric called privacy exposure to quantify the not… ▽ More

    Submitted 2 August, 2018; originally announced August 2018.

    Comments: This work was supported in part by A*STAR Singapore under SERC grant 1224104046. This work has been partially funded by the European Union's Horizon 2020 research and innovation programme within the project "Worldwide Interoperability for SEmantics IoT" under grant agreement Number 723156

  5. arXiv:1801.00235  [pdf, other

    cs.CR

    Early detection of Crossfire attacks using deep learning

    Authors: Saurabh Misra, Mengxuan Tan, Mostafa Rezazad, Matthias R. Brust, Ngai-Man Cheung

    Abstract: Crossfire attack is a recently proposed threat designed to disconnect whole geographical areas, such as cities or states, from the Internet. Orchestrated in multiple phases, the attack uses a massively distributed botnet to generate low-rate benign traffic aiming to congest selected network links, so-called target links. The adoption of benign traffic, while simultaneously targeting multiple netwo… ▽ More

    Submitted 19 April, 2018; v1 submitted 30 December, 2017; originally announced January 2018.

    Comments: 5 pages, 5 figures.Presented at Deep Learning Security Workshop 2017, Singapore. Added references for section 2 and section 4. Added new author

  6. arXiv:1607.05048  [pdf, other

    cs.NI cs.MA eess.SY

    VBCA: A Virtual Forces Clustering Algorithm for Autonomous Aerial Drone Systems

    Authors: Matthias R. Brust, Mustafa Ilhan Akbas, Damla Turgut

    Abstract: We consider the positioning problem of aerial drone systems for efficient three-dimensional (3-D) coverage. Our solution draws from molecular geometry, where forces among electron pairs surrounding a central atom arrange their positions. In this paper, we propose a 3-D clustering algorithm for autonomous positioning (VBCA) of aerial drone networks based on virtual forces. These virtual forces indu… ▽ More

    Submitted 18 July, 2016; originally announced July 2016.

  7. arXiv:1607.04439  [pdf, other

    cs.RO cs.NI eess.SY

    A Networked Swarm Model for UAV Deployment in the Assessment of Forest Environments

    Authors: Matthias R. Brust, Bogdan M. Strimbu

    Abstract: Autonomous Unmanned Aerial Vehicles (UAVs) have gained popularity due to their many potential application fields. Alongside sophisticated sensors, UAVs can be equipped with communication adaptors aimed for inter-UAV communication. Inter-communication of UAVs to form a UAV swarm raises questions on how to manage its communication structure and mobility. In this paper, we consider therefore the prob… ▽ More

    Submitted 15 July, 2016; originally announced July 2016.

  8. arXiv:1601.08011  [pdf, ps, other

    cs.NI cs.CR

    A Concise Network-Centric Survey of IP Traceback Schemes based on Probabilistic Packet Marking

    Authors: Matthias R. Brust, Ankunda R. Kiremire

    Abstract: Multiple probabilistic packet marking (PPM) schemes for IP traceback have been proposed to deal with Distributed Denial of Service (DDoS) attacks by reconstructing their attack graphs and identifying the attack sources. In this paper, ten PPM-based IP traceback schemes are compared and analyzed in terms of features such as convergence time, performance evaluation, underlying topologies, incrementa… ▽ More

    Submitted 4 February, 2016; v1 submitted 29 January, 2016; originally announced January 2016.

  9. arXiv:1305.4133  [pdf, other

    cs.SI physics.soc-ph

    Social Network Generation and Role Determination Based on Smartphone Data

    Authors: Mustafa Ilhan Akbas, Matthias R. Brust, Damla Turgut

    Abstract: We deal with the problem of automatically generating social networks by analyzing and assessing smartphone usage and interaction data. We start by assigning weights to the different types of interactions such as messaging, email, phone calls, chat and physical proximity. Next, we propose a ranking algorithm which recognizes the pattern of interaction taking into account the changes in the collecte… ▽ More

    Submitted 17 May, 2013; originally announced May 2013.

    Comments: IEEE International Conference on Computer Communications (INFOCOM'12) Student Workshop

  10. arXiv:0912.4553  [pdf

    cs.MA cs.AI

    Consensus Dynamics in a non-deterministic Naming Game with Shared Memory

    Authors: Reginaldo J. da Silva Filho, Matthias R. Brust, Carlos H. C. Ribeiro

    Abstract: In the naming game, individuals or agents exchange pairwise local information in order to communicate about objects in their common environment. The goal of the game is to reach a consensus about naming these objects. Originally used to investigate language formation and self-organizing vocabularies, we extend the classical naming game with a globally shared memory accessible by all agents. This… ▽ More

    Submitted 22 December, 2009; originally announced December 2009.

    Comments: 6 pages

  11. arXiv:0708.0627  [pdf

    cs.NI cs.DC

    ADS as Information Management Service in an M-Learning Environment

    Authors: Matthias R. Brust, Daniel Goergen, Christian Hutter, Steffen Rothkugel

    Abstract: Leveraging the potential power of even small handheld devices able to communicate wirelessly requires dedicated support. In particular, collaborative applications need sophisticated assistance in terms of querying and exchanging different kinds of data. Using a concrete example from the domain of mobile learning, the general need for information dissemination is motivated. Subsequently, and driv… ▽ More

    Submitted 4 August, 2007; originally announced August 2007.

    Comments: 8th International Conference on Knowledge-Based Intelligent Information & Engineering Systems (KES2004)

  12. arXiv:0708.0624  [pdf

    cs.NI cs.DC

    ADS-Directory Services for Mobile Ad-Hoc Networks Based on an Information Market Model

    Authors: Christian Hutter, Matthias R. Brust, Steffen Rothkugel

    Abstract: Ubiquitous computing based on small mobile devices using wireless communication links is becoming very attractive. The computational power and storage capacities provided allow the execution of sophisticated applications. Due to the fact that sharing of information is a central problem for distributed applications, the development of self organizing middleware services providing high level inter… ▽ More

    Submitted 4 August, 2007; originally announced August 2007.

    Comments: 9 pages, in the 1st International Workshop on Ubiquitous Computing (IWUC-2004) held in conjunction with the 6th International Conference on Enterprise Information Systems (ICEIS 2004)

  13. arXiv:0707.3030  [pdf

    cs.NE cs.AI cs.NI

    Optimal Design of Ad Hoc Injection Networks by Using Genetic Algorithms

    Authors: Gregoire Danoy, Pascal Bouvry, Matthias R. Brust, Enrique Alba

    Abstract: This work aims at optimizing injection networks, which consist in adding a set of long-range links (called bypass links) in mobile multi-hop ad hoc networks so as to improve connectivity and overcome network partitioning. To this end, we rely on small-world network properties, that comprise a high clustering coefficient and a low characteristic path length. We investigate the use of two genetic… ▽ More

    Submitted 20 July, 2007; originally announced July 2007.

    Comments: 1 page, 1 figure

    ACM Class: I.2.8

    Journal ref: Genetic and Evolutionary Computation Conference (GECCO 2007), ISBN 978-1-59593-697-4

  14. arXiv:0706.1402  [pdf

    cs.CY cs.HC

    Analyzing Design Process and Experiments on the AnITA Generic Tutoring System

    Authors: Matthias R. Brust, Steffen Rothkugel

    Abstract: In the field of tutoring systems, investigations have shown that there are many tutoring systems specific to a specific domain that, because of their static architecture, cannot be adapted to other domains. As consequence, often neither methods nor knowledge can be reused. In addition, the knowledge engineer must have programming skills in order to enhance and evaluate the system. One particular c… ▽ More

    Submitted 12 June, 2018; v1 submitted 11 June, 2007; originally announced June 2007.

    Comments: Published in: Proceedings of International Conference on Education and Information Systems (EISTA 04), 2004, ISBN 980-6560-11-6

  15. arXiv:0706.1201  [pdf

    cs.CY cs.HC cs.NI

    Developing a Collaborative and Autonomous Training and Learning Environment for Hybrid Wireless Networks

    Authors: Jose Eduardo M. Lobo, Jorge Luis Risco Becerra, Matthias R. Brust, Steffen Rothkugel, Christian M. Adriano

    Abstract: With larger memory capacities and the ability to link into wireless networks, more and more students uses palmtop and handheld computers for learning activities. However, existing software for Web-based learning is not well-suited for such mobile devices, both due to constrained user interfaces as well as communication effort required. A new generation of applications for the learning domain tha… ▽ More

    Submitted 8 June, 2007; originally announced June 2007.

    Comments: Global Congress on Engineering and Technology Education (GCETE 2005)

    ACM Class: K.3.1

  16. arXiv:0706.1151  [pdf

    cs.NI cs.DC

    A taxonomic Approach to Topology Control in Ad-hoc and Wireless Networks

    Authors: Matthias R. Brust, Steffen Rothkugel

    Abstract: Topology Control (TC) aims at tuning the topology of highly dynamic networks to provide better control over network resources and to increase the efficiency of communication. Recently, many TC protocols have been proposed. The protocols are designed for preserving connectivity, minimizing energy consumption, maximizing the overall network coverage or network capacity. Each TC protocol makes diff… ▽ More

    Submitted 8 June, 2007; originally announced June 2007.

    Comments: The Sixth International Conference on Networking, ICN 2007

    ACM Class: C.2.1; H.3.3

  17. arXiv:0706.1142  [pdf

    cs.DC cs.NI

    Localized Support for Injection Point Election in Hybrid Networks

    Authors: Matthias R. Brust, Steffen Rothkugel

    Abstract: Ad-hoc networks, a promising trend in wireless technology, fail to work properly in a global setting. In most cases, self-organization and cost-free local communication cannot compensate the need for being connected, gathering urgent information just-in-time. Equipping mobile devices additionally with GSM or UMTS adapters in order to communicate with arbitrary remote devices or even a fixed netw… ▽ More

    Submitted 8 June, 2007; originally announced June 2007.

    Comments: The Sixth International Conference on Networking (ICN 2007)

  18. arXiv:0706.1141  [pdf

    cs.MM cs.NI

    Multimedia Content Distribution in Hybrid Wireless Networks using Weighted Clustering

    Authors: Adrian Andronache, Matthias R. Brust, Steffen Rothkugel

    Abstract: Fixed infrastructured networks naturally support centralized approaches for group management and information provisioning. Contrary to infrastructured networks, in multi-hop ad-hoc networks each node acts as a router as well as sender and receiver. Some applications, however, requires hierarchical arrangements that-for practical reasons-has to be done locally and self-organized. An additional ch… ▽ More

    Submitted 8 June, 2007; originally announced June 2007.

    Comments: 2nd ACM Workshop on Wireless Multimedia Networking and Performance Modeling 2006 (ISBN 1-59593-485)

  19. arXiv:0706.1130  [pdf

    cs.NI cs.AR cs.CY cs.HC

    A Communication Model for Adaptive Service Provisioning in Hybrid Wireless Networks

    Authors: Matthias R. Brust, Steffen Rothkugel

    Abstract: Mobile entities with wireless links are able to form a mobile ad-hoc network. Such an infrastructureless network does not have to be administrated. However, self-organizing principles have to be applied to deal with upcoming problems, e.g. information dissemination. These kinds of problems are not easy to tackle, requiring complex algorithms. Moreover, the usefulness of pure ad-hoc networks is a… ▽ More

    Submitted 8 June, 2007; originally announced June 2007.

    Comments: WSEAS Transactions on Circuits and Systems 2004

  20. arXiv:0706.1127  [pdf

    cs.CY cs.HC

    Redesigning Computer-based Learning Environments: Evaluation as Communication

    Authors: Matthias R. Brust, Christian M. Adriano, Ivan M. L. Ricarte

    Abstract: In the field of evaluation research, computer scientists live constantly upon dilemmas and conflicting theories. As evaluation is differently perceived and modeled among educational areas, it is not difficult to become trapped in dilemmas, which reflects an epistemological weakness. Additionally, designing and developing a computer-based learning scenario is not an easy task. Advancing further,… ▽ More

    Submitted 8 June, 2007; originally announced June 2007.

    Comments: International Conference on Education and Information Systems (EISTA 04), ISBN 980-6560-11-6

  21. Inquiring the Potential of Evoking Small-World Properties for Self-Organizing Communication Networks

    Authors: Matthias R. Brust, Steffen Rothkugel, Carlos H. C. Ribeiro

    Abstract: Mobile multi-hop ad hoc networks allow establishing local groups of communicating devices in a self-organizing way. However, in a global setting such networks fail to work properly due to network partitioning. Providing that devices are capable of communicating both locally-e.g. using Wi-Fi or Bluetooth-and additionally also with arbitrary remote devices-e.g. using GSM/UMTS links-the objective i… ▽ More

    Submitted 11 June, 2007; v1 submitted 7 June, 2007; originally announced June 2007.

    Journal ref: Published in: Proceedings of 5th International Conference on Networking (ICN 06), 2006, IEEE Computer Society Press

  22. arXiv:0706.1087  [pdf

    cs.HC cs.CY

    On Anomalies in Annotation Systems

    Authors: Matthias R. Brust, Steffen Rothkugel

    Abstract: Today's computer-based annotation systems implement a wide range of functionalities that often go beyond those available in traditional paper-and-pencil annotations. Conceptually, annotation systems are based on thoroughly investigated psycho-sociological and pedagogical learning theories. They offer a huge diversity of annotation types that can be placed in textual as well as in multimedia form… ▽ More

    Submitted 7 June, 2007; originally announced June 2007.

    Comments: The Third International Workshop on E-learning and Mobile Learning on Telecommunications (ELETE 2007)

  23. arXiv:0706.1080  [pdf

    cs.DC cs.NI

    WACA: A Hierarchical Weighted Clustering Algorithm optimized for Mobile Hybrid Networks

    Authors: Matthias R. Brust, Adrian Andronache, Steffen Rothkugel

    Abstract: Clustering techniques create hierarchal network structures, called clusters, on an otherwise flat network. In a dynamic environment-in terms of node mobility as well as in terms of steadily changing device parameters-the clusterhead election process has to be re-invoked according to a suitable update policy. Cluster re-organization causes additional message exchanges and computational complexity… ▽ More

    Submitted 7 June, 2007; originally announced June 2007.

    Comments: The Third International Conference on Wireless and Mobile Communications 2007

  24. arXiv:0706.1066  [pdf

    cs.CY

    Applying Test-Paradigms in a Generic Tutoring System Concept for Web-based Learning

    Authors: Matthias R. Brust

    Abstract: Realizing test scenarios through a tutoring system involve questions about architecture and didactic methods in such a system. Observing the fact that traditional tutoring systems normally are domain-static, this paper shows investigations for a generic domain-independent tutoring system for utilizing test scenarios in computer-based and web-based environments. Furthermore, test paradigms are an… ▽ More

    Submitted 7 June, 2007; originally announced June 2007.

    Comments: Information and Resource Management (IRMA 2003)

  25. arXiv:0706.1063  [pdf

    cs.NI cs.DC cs.DS

    Small Worlds: Strong Clustering in Wireless Networks

    Authors: Matthias R. Brust, Steffen Rothkugel

    Abstract: Small-worlds represent efficient communication networks that obey two distinguishing characteristics: a high clustering coefficient together with a small characteristic path length. This paper focuses on an interesting paradox, that removing links in a network can increase the overall clustering coefficient. Reckful Roaming, as introduced in this paper, is a 2-localized algorithm that takes adva… ▽ More

    Submitted 11 June, 2007; v1 submitted 7 June, 2007; originally announced June 2007.

    Comments: To appear in: 1st International Workshop on Localized Algorithms and Protocols for Wireless Sensor Networks (LOCALGOS 2007), 2007, IEEE Compuster Society Press