Skip to main content

Showing 1–19 of 19 results for author: Fraunholz, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2308.14164  [pdf, other

    cs.CR cs.NI

    P3LI5: Practical and Confidential Lawful Interception on the 5G Core

    Authors: Francesco Intoci, Julian Sturm, Daniel Fraunholz, Apostolos Pyrgelis, Colin Barschel

    Abstract: Lawful Interception (LI) is a legal obligation of Communication Service Providers (CSPs) to provide interception capabilities to Law Enforcement Agencies (LEAs) in order to gain insightful data from network communications for criminal proceedings, e.g., network identifiers for tracking suspects. With the privacy-enhancements of network identifiers in the 5th generation of mobile networks (5G), LEA… ▽ More

    Submitted 27 August, 2023; originally announced August 2023.

    Comments: Accepted in the proceedings of IEEE Computer and Netowrk Security (IEEE CNS) 2023. Subject to IEEE copyright policy

  2. Evaluating Deception and Moving Target Defense with Network Attack Simulation

    Authors: Daniel Reti, Karina Elzer, Daniel Fraunholz, Daniel Schneider, Hans-Dieter Schotten

    Abstract: In the field of network security, with the ongoing arms race between attackers, seeking new vulnerabilities to bypass defense mechanisms and defenders reinforcing their prevention, detection and response strategies, the novel concept of cyber deception has emerged. Starting from the well-known example of honeypots, many other deception strategies have been developed such as honeytokens and moving… ▽ More

    Submitted 25 January, 2023; originally announced January 2023.

  3. The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities around the World

    Authors: Simon Daniel Duque Anton, Daniel Fraunholz, Daniel Krohmer, Daniel Reti, Daniel Schneider, Hans Dieter Schotten

    Abstract: Operational Technology (OT)-networks and -devices, i.e. all components used in industrial environments, were not designed with security in mind. Efficiency and ease of use were the most important design characteristics. However, due to the digitisation of industry, an increasing number of devices and industrial networks is opened up to public networks. This is beneficial for administration and org… ▽ More

    Submitted 27 November, 2021; originally announced November 2021.

    Comments: IEEE Internet of Things Journal, May 2021

  4. arXiv:2111.03884  [pdf

    cs.CR

    An Adaptive Honeypot Configuration, Deployment and Maintenance Strategy

    Authors: Daniel Fraunholz, Marc Zimmermann, Hans D. Schotten

    Abstract: Since honeypots first appeared as an advanced network security concept they suffer from poor deployment and maintenance strategies. State-of-the-Art deployment is a manual process in which the honeypot needs to be configured and maintained by a network administrator. In this paper we present a method for a dynamic honeypot configuration, deployment and maintenance strategy based on machine learnin… ▽ More

    Submitted 6 November, 2021; originally announced November 2021.

  5. Deep Down the Rabbit Hole: On References in Networks of Decoy Elements

    Authors: Daniel Reti, Daniel Fraunholz, Janis Zemitis, Daniel Schneider, Hans Dieter Schotten

    Abstract: Deception technology has proven to be a sound approach against threats to information systems. Aside from well-established honeypots, decoy elements, also known as honeytokens, are an excellent method to address various types of threats. Decoy elements are causing distraction and uncertainty to an attacker and help detecting malicious activity. Deception is meant to be complementing firewalls and… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.

    Journal ref: 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)

  6. arXiv:2101.02102  [pdf, ps, other

    cs.CR cs.GT

    A Qualitative Empirical Analysis of Human Post-Exploitation Behavior

    Authors: Daniel Schneider, Daniel Fraunholz, Daniel Krohmer

    Abstract: Honeypots are a well-studied defensive measure in network security. This work proposes an effective low-cost honeypot that is easy to deploy and maintain. The honeypot introduced in this work is able to handle commands in a non-standard way by blocking them or replying with an insult to the attacker. To determine the most efficient defense strategy, the interaction between attacker and defender is… ▽ More

    Submitted 6 January, 2021; originally announced January 2021.

  7. arXiv:2012.08811  [pdf, other

    cs.CR

    Investigating the Ecosystem of Offensive Information Security Tools

    Authors: Simon D Duque Anton, Daniel Fraunholz, Daniel Schneider

    Abstract: The internet landscape is growing and at the same time becoming more heterogeneous. Services are performed via computers and networks, critical data is stored digitally. This enables freedom for the user, and flexibility for operators. Data is easier to manage and distribute. However, every device connected to a network is potentially susceptible to cyber attacks. Security solutions, such as antiv… ▽ More

    Submitted 16 December, 2020; originally announced December 2020.

    Comments: Six pages, one figure, this work is a preprint of a paper accepted at the 1st Workshop on Next Generation Networks and Applications (NGNA-2020)

  8. Creating it from SCRATCh: A Practical Approach for Enhancing the Security of IoT-Systems in a DevOps-enabled Software Development Environment

    Authors: Simon D Duque Anton, Daniel Fraunholz, Daniel Krohmer, Daniel Reti, Hans D Schotten, Franklin Selgert, Marcell Marosvölgyi, Morten Larsen, Krishna Sudhakar, Tobias Koch, Till Witt, Cédric Bassem

    Abstract: DevOps describes a method to reorganize the way different disciplines in software engineering work together to speed up software delivery. However, the introduction of DevOps-methods to organisations is a complex task. A successful introduction results in a set of structured process descriptions. Despite the structure, this process leaves margin for error: Especially security issues are addressed… ▽ More

    Submitted 28 October, 2020; originally announced October 2020.

    Comments: Post print of a paper presented at the 1st USDAI workshop and published in the SAFECOMP 2020 Workshop proceedings

  9. Using Temporal and Topological Features for Intrusion Detection in Operational Networks

    Authors: Simon D. Duque Anton, Daniel Fraunholz, Hans Dieter Schotten

    Abstract: Until two decades ago, industrial networks were deemed secure due to physical separation from public networks. An abundance of successful attacks proved that assumption wrong. Intrusion detection solutions for industrial application need to meet certain requirements that differ from home- and office-environments, such as working without feedback to the process and compatibility with legacy systems… ▽ More

    Submitted 9 July, 2019; originally announced July 2019.

    Comments: Preprint of a work accepted but not published yet at the ARES 2019

  10. arXiv:1906.03064  [pdf, other

    cs.CY cs.IR

    Highly Scalable and Flexible Model for Effective Aggregation of Context-based Data in Generic IIoT Scenarios

    Authors: Simon Duque Anton, Daniel Fraunholz, Janis Zemitis, Frederic Pohl, Hans Dieter Schotten

    Abstract: Interconnectivity of production machines is a key feature of the Industrial Internet of Things (IIoT). This feature allows for many advantages in producing. Configuration and maintenance gets easier, as access to the given production unit is not necessarily coupled to physical presence. Customized production of goods is easily possible, reducing production times and increasing throughput. There ar… ▽ More

    Submitted 28 May, 2019; originally announced June 2019.

  11. arXiv:1905.12443  [pdf

    cs.CR

    Implementing SCADA Scenarios and Introducing Attacks to Obtain Training Data for Intrusion Detection Methods

    Authors: Simon Duque Antón, Michael Gundall, Daniel Fraunholz, Hans Dieter Schotten

    Abstract: There are hardly any data sets publicly available that can be used to evaluate intrusion detection algorithms. The biggest threat for industrial applications arises from state-sponsored and criminal groups. Often, formerly unknown exploits are employed by these attackers, so-called 0-day exploits. They cannot be discovered with signature-based intrusion detection. Thus, statistical or machine lear… ▽ More

    Submitted 28 May, 2019; originally announced May 2019.

  12. Putting Things in Context: Securing Industrial Authentication with Context Information

    Authors: Simon Duque Anton, Daniel Fraunholz, Christoph Lipps, Khurshid Alam, Hans Dieter Schotten

    Abstract: The development in the area of wireless communication, mobile and embedded computing leads to significant changes in the application of devices. Over the last years, embedded devices were brought into the consumer area creating the Internet of Things. Furthermore, industrial applications increasingly rely on communication through trust boundaries. Networking is cheap and easily applicable while pr… ▽ More

    Submitted 29 May, 2019; originally announced May 2019.

    Comments: This is the preprint of a work published in the Intl. Journal on Cyber Situational Awareness (IJCSA)

  13. Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set

    Authors: Simon Duque Anton, Suneetha Kanoor, Daniel Fraunholz, Hans Dieter Schotten

    Abstract: In the context of the Industrial Internet of Things, communication technology, originally used in home and office environments, is introduced into industrial applications. Commercial off-the-shelf products, as well as unified and well-established communication protocols make this technology easy to integrate and use. Furthermore, productivity is increased in comparison to classic industrial contro… ▽ More

    Submitted 28 May, 2019; originally announced May 2019.

    Comments: This is a preprint of a work published in the Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018)

  14. The Dos and Don'ts of Industrial Network Simulation: A Field Report

    Authors: Simon Duque Anton, Daniel Fraunholz, Dennis Krummacker, Christoph Fischer, Michael Karrenbauer, Hans Dieter Schotten

    Abstract: Advances in industrial control lead to increasing incorporation of intercommunication technologies and embedded devices into the production environment. In addition to that, the rising complexity of automation tasks creates demand for extensive solutions. Standardised protocols and commercial off the shelf devices aid in providing these solutions. Still, setting up industrial communication network… ▽ More

    Submitted 28 May, 2019; originally announced May 2019.

    Comments: This is a preprint of a work published in the Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control (ISCSIC 2018)

  15. A Question of Context: Enhancing Intrusion Detection by Providing Context Information

    Authors: Simon Duque Anton, Daniel Fraunholz, Stephan Teuber, Hans Dieter Schotten

    Abstract: Due to the fourth industrial revolution, and the resulting increase in interconnectivity, industrial networks are more and more opened to publicly available networks. Apart from the huge benefit in manageability and flexibility, the openness also results in a larger attack surface for malicious adversaries. In comparison to office environments, industrial networks have very high volumes of data. I… ▽ More

    Submitted 28 May, 2019; originally announced May 2019.

    Comments: This is a preprint of a work published at the 2017 Internet of Things Business Models, Users, and Networks

  16. Two Decades of SCADA Exploitation: A Brief History

    Authors: Simon Duque Anton, Daniel Fraunholz, Christoph Lipps, Frederic Pohl, Marc Zimmermann, Hans D. Schotten

    Abstract: Since the early 1960, industrial process control has been applied by electric systems. In the mid 1970's, the term SCADA emerged, describing the automated control and data acquisition. Since most industrial and automation networks were physically isolated, security was not an issue. This changed, when in the early 2000's industrial networks were opened to the public internet. The reasons were mani… ▽ More

    Submitted 21 May, 2019; originally announced May 2019.

  17. arXiv:1809.07500  [pdf, other

    cs.LG cs.CR stat.ML

    Time is of the Essence: Machine Learning-based Intrusion Detection in Industrial Time Series Data

    Authors: Simon Duque Anton, Lia Ahrens, Daniel Fraunholz, Hans Dieter Schotten

    Abstract: The Industrial Internet of Things drastically increases connectivity of devices in industrial applications. In addition to the benefits in efficiency, scalability and ease of use, this creates novel attack surfaces. Historically, industrial networks and protocols do not contain means of security, such as authentication and encryption, that are made necessary by this development. Thus, industrial I… ▽ More

    Submitted 20 September, 2018; originally announced September 2018.

    Comments: Extended version of a publication in the 2018 IEEE International Conference on Data Mining Workshops (ICDMW)

  18. arXiv:1804.06196  [pdf, other

    cs.CR

    Demystifying Deception Technology:A Survey

    Authors: Daniel Fraunholz, Simon Duque Anton, Christoph Lipps, Daniel Reti, Daniel Krohmer, Frederic Pohl, Matthias Tammen, Hans Dieter Schotten

    Abstract: Deception boosts security for systems and components by denial, deceit, misinformation, camouflage and obfuscation. In this work an extensive overview of the deception technology environment is presented. Taxonomies, theoretical backgrounds, psychological aspects as well as concepts, implementations, legal aspects and ethics are discussed and compared.

    Submitted 17 April, 2018; originally announced April 2018.

    Comments: 25 pages, 169 references

  19. arXiv:1709.09455  [pdf

    cs.NI cs.CR

    Angriffserkennung für industrielle Netzwerke innerhalb des Projektes IUNO

    Authors: Simon Duque Anton, Daniel Fraunholz, Hans Dieter Schotten

    Abstract: The increasing interconnectivity of industrial networks is one of the central current hot topics. It is adressed by research institutes, as well as industry. In order to perform the fourth industrial revolution, a full connectivity between production facilities is necessary. Due to this connectivity, however, an abundance of new attack vectors emerges. In the National Reference Project for Industr… ▽ More

    Submitted 21 November, 2017; v1 submitted 27 September, 2017; originally announced September 2017.

    Comments: Paper is written in German, presented on the 22. ITG Fachtagung Mobilkommunikation in Osnabrueck