Skip to main content

Showing 1–11 of 11 results for author: Zseby, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2409.02973  [pdf, other

    cs.LG

    SDOoop: Capturing Periodical Patterns and Out-of-phase Anomalies in Streaming Data Analysis

    Authors: Alexander Hartl, Félix Iglesias Vázquez, Tanja Zseby

    Abstract: Streaming data analysis is increasingly required in applications, e.g., IoT, cybersecurity, robotics, mechatronics or cyber-physical systems. Despite its relevance, it is still an emerging field with open challenges. SDO is a recent anomaly detection method designed to meet requirements of speed, interpretability and intuitive parameterization. In this work, we present SDOoop, which extends the ca… ▽ More

    Submitted 4 September, 2024; originally announced September 2024.

  2. arXiv:2102.09980  [pdf, ps, other

    cs.CR cs.LG cs.NI cs.OS

    A flow-based IDS using Machine Learning in eBPF

    Authors: Maximilian Bachl, Joachim Fabini, Tanja Zseby

    Abstract: eBPF is a new technology which allows dynamically loading pieces of code into the Linux kernel. It can greatly speed up networking since it enables the kernel to process certain packets without the involvement of a userspace program. So far eBPF has been used for simple packet filtering applications such as firewalls or Denial of Service protection. We show that it is possible to develop a flow ba… ▽ More

    Submitted 4 March, 2022; v1 submitted 19 February, 2021; originally announced February 2021.

  3. arXiv:2010.08362  [pdf, other

    cs.NI

    Detecting Fair Queuing for Better Congestion Control

    Authors: Maximilian Bachl, Joachim Fabini, Tanja Zseby

    Abstract: Low delay is an explicit requirement for applications such as cloud gaming and video conferencing. Delay-based congestion control can achieve the same throughput but significantly smaller delay than loss-based one and is thus ideal for these applications. However, when a delay- and a loss-based flow compete for a bottleneck, the loss-based one can monopolize all the bandwidth and starve the delay-… ▽ More

    Submitted 19 February, 2021; v1 submitted 16 October, 2020; originally announced October 2020.

  4. arXiv:2007.13444  [pdf, other

    cs.LG cs.NI stat.ML

    EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection

    Authors: Fares Meghdouri, Maximilian Bachl, Tanja Zseby

    Abstract: Fully Connected Neural Networks (FCNNs) have been the core of most state-of-the-art Machine Learning (ML) applications in recent years and also have been widely used for Intrusion Detection Systems (IDSs). Experimental results from the last years show that generally deeper neural networks with more layers perform better than shallow models. Nonetheless, with the growing number of layers, obtaining… ▽ More

    Submitted 15 October, 2020; v1 submitted 27 July, 2020; originally announced July 2020.

  5. LFQ: Online Learning of Per-flow Queuing Policies using Deep Reinforcement Learning

    Authors: Maximilian Bachl, Joachim Fabini, Tanja Zseby

    Abstract: The increasing number of different, incompatible congestion control algorithms has led to an increased deployment of fair queuing. Fair queuing isolates each network flow and can thus guarantee fairness for each flow even if the flows' congestion controls are not inherently fair. So far, each queue in the fair queuing system either has a fixed, static maximum size or is managed by an Active Queue… ▽ More

    Submitted 15 October, 2020; v1 submitted 6 July, 2020; originally announced July 2020.

    Journal ref: 2020 IEEE 45th Conference on Local Computer Networks (LCN)

  6. arXiv:2002.03872  [pdf, other

    cs.LG cs.CR cs.NI stat.ML

    SparseIDS: Learning Packet Sampling with Reinforcement Learning

    Authors: Maximilian Bachl, Fares Meghdouri, Joachim Fabini, Tanja Zseby

    Abstract: Recurrent Neural Networks (RNNs) have been shown to be valuable for constructing Intrusion Detection Systems (IDSs) for network data. They allow determining if a flow is malicious or not already before it is over, making it possible to take action immediately. However, considering the large number of packets that has to be inspected, for example in cloud/fog and edge computing, the question of com… ▽ More

    Submitted 4 May, 2020; v1 submitted 10 February, 2020; originally announced February 2020.

    Journal ref: 2020 IEEE Conference on Communications and Network Security (CNS), Avignon, France

  7. Explainability and Adversarial Robustness for RNNs

    Authors: Alexander Hartl, Maximilian Bachl, Joachim Fabini, Tanja Zseby

    Abstract: Recurrent Neural Networks (RNNs) yield attractive properties for constructing Intrusion Detection Systems (IDSs) for network data. With the rise of ubiquitous Machine Learning (ML) systems, malicious actors have been catching up quickly to find new ways to exploit ML vulnerabilities for profit. Recently developed adversarial ML techniques focus on computer vision and their applicability to network… ▽ More

    Submitted 19 February, 2020; v1 submitted 20 December, 2019; originally announced December 2019.

    Comments: Accepted at IEEE BigDataService 2020

    Journal ref: 2020 IEEE Sixth International Conference on Big Data Computing Service and Applications (BigDataService)

  8. Cocoa: Congestion Control Aware Queuing

    Authors: Maximilian Bachl, Joachim Fabini, Tanja Zseby

    Abstract: Recent model-based congestion control algorithms such as BBR use repeated measurements at the endpoint to build a model of the network connection and use it to achieve optimal throughput with low queuing delay. Conversely, applying this model-based approach to Active Queue Management (AQM) has so far received less attention. We propose the new AQM scheduler cocoa based on fair queuing, which adapt… ▽ More

    Submitted 22 November, 2019; v1 submitted 23 October, 2019; originally announced October 2019.

    Journal ref: Buffer Sizing Workshop (BS'19), December 2-3, 2019, Stanford, CA, USA

  9. arXiv:1909.07866  [pdf, other

    cs.CR cs.LG cs.NI

    Walling up Backdoors in Intrusion Detection Systems

    Authors: Maximilian Bachl, Alexander Hartl, Joachim Fabini, Tanja Zseby

    Abstract: Interest in poisoning attacks and backdoors recently resurfaced for Deep Learning (DL) applications. Several successful defense mechanisms have been recently proposed for Convolutional Neural Networks (CNNs), for example in the context of autonomous driving. We show that visualization approaches can aid in identifying a backdoor independent of the used classifier. Surprisingly, we find that common… ▽ More

    Submitted 5 April, 2020; v1 submitted 17 September, 2019; originally announced September 2019.

    Journal ref: 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and Artificial Intelligence for Data Communication Networks (Big-DAMA '19), December 9, 2019, Orlando, FL, USA

  10. arXiv:1811.08569  [pdf, other

    cs.CR cs.NI

    Encryption is Futile: Delay Attacks on High-Precision Clock Synchronization

    Authors: Robert Annessi, Joachim Fabini, Felix Iglesias, Tanja Zseby

    Abstract: Clock synchronization has become essential to modern societies since many critical infrastructures depend on a precise notion of time. This paper analyzes security aspects of high-precision clock synchronization protocols, particularly their alleged protection against delay attacks when clock synchronization traffic is encrypted using standard network security protocols such as IPsec, MACsec, or T… ▽ More

    Submitted 20 November, 2018; originally announced November 2018.

  11. arXiv:1705.10669  [pdf

    cs.CR cs.NI

    SecureTime: Secure Multicast Time Synchronization

    Authors: Robert Annessi, Joachim Fabini, Tanja Zseby

    Abstract: Due to the increasing dependency of critical infrastructure on synchronized clocks, network time synchronization protocols have become an attractive target for attackers. We identify data origin authentication as the key security objective and suggest to employ recently proposed high-performance digital signature schemes (Ed25519 and MQQ-SIG)) as foundation of a novel set of security measures to s… ▽ More

    Submitted 30 May, 2017; originally announced May 2017.