Results 161-180 of 203.
Bookmark and Share    
Full Text
Peer Reviewed
See detailSecurity monitoring for Content Centric Networking
Goergen, David UL; Cholez, Thibault UL; François, Jérôme UL et al

in Data Privacy Management and Autonomous Spontaneous Security (2013)

Content-Centric Networking (CCN) is one of the most promising research area for a future Internet. The goal is to obtain a more scalable, secure, collaborative Internet supporting context-aware services ... [more ▼]

Content-Centric Networking (CCN) is one of the most promising research area for a future Internet. The goal is to obtain a more scalable, secure, collaborative Internet supporting context-aware services. However, as a new overlay infrastructure, CCN raises the need of a new monitoring architecture to assess security of CCN devices. In particular, the stateful nature of CCN routers introduces new attack threats that need to be addressed. We propose in this paper a monitoring approach for the instrumentation of CCN enabled network nodes. The rationale of our monitoring approach is demonstrated through real experimentations to detect and mitigate network level attacks against CCN. [less ▲]

Detailed reference viewed: 169 (8 UL)
Full Text
See detailA Study on Highway Traffic Flow Optimization using Partial Velocity Synchronization
Forster, Markus UL; Frank, Raphaël UL; Engel, Thomas UL

in Proceedings of the 1st GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2013) Technical Report CCS-2013-01 (2013)

In this paper we present a study of highway traffic flow optimization using Partial Velocity Synchronization (PVS). PVS is a Cellular Automaton (CA) model that is extended by a communication layer ... [more ▼]

In this paper we present a study of highway traffic flow optimization using Partial Velocity Synchronization (PVS). PVS is a Cellular Automaton (CA) model that is extended by a communication layer providing the ability to exchange relevant information between vehicles. We show that it is possible to enhance traffic flow on highways significantly with a small number of velocity recommendations computed from the traffic conditions ahead. Furthermore we show that only a limited number of hops in an information chain is necessary to reschedule the vehicles on a given highway segment to avoid the formation of shockwaves. Our results show that traffic flow will be increased while travel time and emissions will be reduced dramatically. [less ▲]

Detailed reference viewed: 484 (8 UL)
Full Text
Peer Reviewed
See detailLuxTraffic: A Collaborative Traffic Sensing System
Kovacheva, Aleksandrina; Frank, Raphaël UL; Engel, Thomas UL

in Proceedings of the 19th IEEE Workshop on Local & Metropolitan Area Networks (LANMAN'13) (2013)

Detailed reference viewed: 215 (7 UL)
Full Text
Peer Reviewed
See detailSymbolic Execution of Satellite Control Procedures in Graph-Transformation-Based EMF Ecosystems
Nachtigall, Nico UL; Braatz, Benjamin UL; Engel, Thomas UL

in Boulanger, Frédéric; Famelis, Michalis; Ratiu, Daniel (Eds.) MoDeVVa@MoDELS (2013)

Symbolic execution is a well-studied technique for analysing the behaviour of software components with applications to test case generation. We propose a framework for symbolically executing satellite ... [more ▼]

Symbolic execution is a well-studied technique for analysing the behaviour of software components with applications to test case generation. We propose a framework for symbolically executing satellite control procedures and generating test cases based on graph transformation techniques. A graph-based operational symbolic execution semantics is defined and the executed procedure models are used for generating test cases by performing model transformations. The approach is discussed based on a prototype implementation using the Eclipse Modelling Framework (EMF), Henshin and ECLiPSe-CLP tool ecosystem. [less ▲]

Detailed reference viewed: 106 (8 UL)
Full Text
Peer Reviewed
See detailMulti-dimensional Aggregation for DNS Monitoring'
Dolberg, Lautaro UL; François, Jérôme UL; Engel, Thomas UL

in Proceedings of the 26th Large Installation System Administration Conference (LISA 12) (2013)

Detailed reference viewed: 124 (2 UL)
Full Text
Peer Reviewed
See detailAssessing In-Vehicle Information Systems application in the car: a versatile tool and unified testing platform.
Louveton, Nicolas UL; McCall, Roderick UL; Avanesov, Tigran UL et al

in Proceedings of the 5th International Conference on Automotive User Interfaces and Interactive Vehicular Applications (2013)

In this paper we present the DriveLab IVIS testing platform which allows for the same experiments to be conducted both under simulator and real car conditions. Other key aspects of DriveLab is that it is ... [more ▼]

In this paper we present the DriveLab IVIS testing platform which allows for the same experiments to be conducted both under simulator and real car conditions. Other key aspects of DriveLab is that it is highly modular (therefore allowing the exchange or integration of different components) and that it supports more than one driver. For example we show that the same IVIS devices and scenario can be used with two different 3D engines. The paper provides a technical overview and a brief example of use. [less ▲]

Detailed reference viewed: 213 (23 UL)
Full Text
Peer Reviewed
See detailASMATRA: Ranking ASs Providing Transit Service to Malware Hosters
Wagner, Cynthia UL; François, Jérôme UL; State, Radu UL et al

in IFIP/IEEE International Symposium on Integrated Network Management IM2013 (2013)

The Internet has grown into an enormous network offering a variety of services, which are spread over a multitude of domains. BGP-routing and Autonomous Systems (AS) are the key components for maintaining ... [more ▼]

The Internet has grown into an enormous network offering a variety of services, which are spread over a multitude of domains. BGP-routing and Autonomous Systems (AS) are the key components for maintaining high connectivity in the Internet. Unfortunately, Internet Service Providers (ISPs) operating ASs do not only host normal users and content, but also malicious content used by attackers for spreading malware, hosting phishing web-sites or performing any kind of fraudulent activity. Practical analysis shows that such malware-providing ASs prevent themselves from being de-peered by hiding behind other ASs, which do not host the malware themselves but simply provide transit service for malware. This paper presents a new method for detecting ASs that provide transit service for malware hosters, without being malicious themselves. A formal definition of the problem and the metrics are determined by using the AS graph. The PageRank algorithm is applied to improve the scalability and the completeness of the approach. The method is assessed on real and publicly available datasets, showing promising results. [less ▲]

Detailed reference viewed: 98 (1 UL)
Full Text
Peer Reviewed
See detailTowards Bidirectional Engineering of Satellite Control Procedures Using Triple Graph Grammars
Gottmann, Susann UL; Hermann, Frank UL; Ermel, Claudia et al

in Jacquet, Christophe; Balasubramanian, Daniel; Jones, Edward (Eds.) et al Proc. Int. Workshop on Multi-Paradigm Modeling 2013 (MPM'13) (2013)

The development and maintenance of satellite control software are very complex, mission-critical and cost-intensive tasks that require expertise from different domains. In order to adequately address ... [more ▼]

The development and maintenance of satellite control software are very complex, mission-critical and cost-intensive tasks that require expertise from different domains. In order to adequately address these challenges, we propose to use visual views of the software to provide concise abstractions of the system from different perspectives. This paper introduces a visual language for process flow models of satellite control procedures that we developed in cooperation with the industrial partner SES for the satellite control language SPELL. Furthermore, we present a general and formal bidirectional engineering approach for automatically translating satellite control procedures into corresponding process flow visualisations. The bidirectional engineering framework is supported by a visual editor based on Eclipse GMF, the transformation tool HenshinTGG, and additional extensions to meet requirements set up by the specific application area of satellite control languages. [less ▲]

Detailed reference viewed: 108 (21 UL)
Full Text
Peer Reviewed
See detailOn an Automated Translation of Satellite Procedures Using Triple Graph Grammars
Hermann, Frank UL; Gottmann, Susann UL; Nachtigall, Nico UL et al

in Duddy, Keith; Kappel, Gerti (Eds.) Theory and Practice of Model Transformations (2013)

Model transformation based on triple graph grammars (TGGs) is a general, intuitive and formally well defined technique for the translation of models [5,6,2]. While previous concepts and case studies were ... [more ▼]

Model transformation based on triple graph grammars (TGGs) is a general, intuitive and formally well defined technique for the translation of models [5,6,2]. While previous concepts and case studies were focused mainly on visual models of software and systems, this article describes an industrial application of model transformations based on TGGs as a powerful technique for software translation using the tool Henshin [1]. The general problem in this scenario is to translate source code that is currently in use into corresponding source code that shall run on a new system. Up to now, this problem was addressed based on manually written converters, parser generators, compiler-compilers or meta-programming environments using term rewriting or similar techniques (see e. g. [4]). [less ▲]

Detailed reference viewed: 205 (22 UL)
Full Text
Peer Reviewed
See detailCorrectness and Completeness of Generalised Concurrent Model Synchronisation Based on Triple Graph Grammars
Gottmann, Susann UL; Hermann, Frank UL; Nachtigall, Nico UL et al

in Baudry, Benoit; Dingel, Juergen; Lucio, Levi (Eds.) et al Proc. Int. Workshop on Analysis of Model Transformations 2013 (AMT'13) (2013)

Detailed reference viewed: 133 (19 UL)
Full Text
Peer Reviewed
See detailOn Optimal Scheduling in Duty-Cycled IoT Industrial Applications using IEEE 802.15.4e TSCH
Palattella, Maria Rita UL; Accettura, Nicola; Grieco, Luigi Alfredo et al

in IEEE Sensors Journal (2013), 13(10), 3655-3666

Detailed reference viewed: 173 (4 UL)
Full Text
Peer Reviewed
See detailSemantic based DNS Forensics
Marchal, Samuel UL; François, Jérôme UL; State, Radu UL et al

in Proceedings of the IEEE International Workshop on Information Forensics and Security (2012, December)

In network level forensics, Domain Name Service (DNS) is a rich source of information. This paper describes a new approach to mine DNS data for forensic purposes. We propose a new technique that leverages ... [more ▼]

In network level forensics, Domain Name Service (DNS) is a rich source of information. This paper describes a new approach to mine DNS data for forensic purposes. We propose a new technique that leverages semantic and natural language processing tools in order to analyze large volumes of DNS data. The main research novelty consists in detecting malicious and dangerous domain names by evaluating the semantic similarity with already known names. This process can provide valuable information for reconstructing network and user activities. We show the efficiency of the method on experimental real datasets gathered from a national passive DNS system. [less ▲]

Detailed reference viewed: 244 (3 UL)
Full Text
Peer Reviewed
See detailProactive Discovery of Phishing Related Domain Names
Marchal, Samuel UL; François, Jérôme UL; State, Radu UL et al

in Proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, Amsterdam 12-14 September 2012 (2012, September)

Phishing is an important security issue to the Internet, which has a significant economic impact. The main solution to counteract this threat is currently reactive blacklisting; however, as phishing ... [more ▼]

Phishing is an important security issue to the Internet, which has a significant economic impact. The main solution to counteract this threat is currently reactive blacklisting; however, as phishing attacks are mainly performed over short periods of time, reactive methods are too slow. As a result, new approaches to early identify malicious websites are needed. In this paper a new proactive discovery of phishing related domain names is introduced. We mainly focus on the automated detec- tion of possible domain registrations for malicious activities. We leverage techniques coming from natural language modelling in order to build pro- active blacklists. The entries in this list are built using language models and vocabularies encountered in phishing related activities - “secure”, “banking”, brand names, etc. Once a pro-active blacklist is created, ongoing and daily monitoring of only these domains can lead to the efficient detection of phishing web sites. [less ▲]

Detailed reference viewed: 170 (1 UL)
Full Text
Peer Reviewed
See detailLarge Scale DNS Analysis
Marchal, Samuel UL; Engel, Thomas UL

in 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, Luxembourg, June 4-8 2012 (2012, June)

In this paper we present an architecture for large scale DNS monitoring. The analysis of DNS traffic is becoming of first importance currently, as it allows to monitor the main part of the interactions on ... [more ▼]

In this paper we present an architecture for large scale DNS monitoring. The analysis of DNS traffic is becoming of first importance currently, as it allows to monitor the main part of the interactions on the Internet. DNS traffic can reveal anomalies such as worm infected hosts, botnets or spam participating hosts. The efficiency and the speed of detection of such anomalies rely on the capacity of DNS monitoring system to treat quickly huge quantity of data. We propose a system that leverages distributed processing and storage facilities. [less ▲]

Detailed reference viewed: 129 (2 UL)
Full Text
Peer Reviewed
See detailSemantic Exploration of DNS
Marchal, Samuel UL; François, Jérôme UL; Wagner, Cynthia UL et al

in Proceedings of the 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25 2012 (2012, May)

The DNS structure discloses useful information about the organization and the operation of an enterprise network, which can be used for designing attacks as well as monitoring domains supporting malicious ... [more ▼]

The DNS structure discloses useful information about the organization and the operation of an enterprise network, which can be used for designing attacks as well as monitoring domains supporting malicious activities. Thus, this paper introduces a new method for exploring the DNS domains. Although our previous work described a tool to generate existing DNS names accurately in order to probe a domain automatically, the approach is extended by leveraging semantic analysis of domain names. In particular, the semantic distributional similarity and relatedness of sub-domains are considered as well as sequential patterns. The evaluation shows that the discovery is highly improved while the overhead remains low, comparing with non semantic DNS probing tools including ours and others. [less ▲]

Detailed reference viewed: 157 (0 UL)
Full Text
Peer Reviewed
See detailA Distance-Based Method to Detect Anomalous Attributes in Log Files
Hommes, Stefan UL; State, Radu UL; Engel, Thomas UL

in Proceedings of IEEE/IFIP NOMS 2012 (2012, April)

Dealing with large volumes of logs is like the prover- bial needle in the haystack problem. Finding relevant events that might be associated with an incident, or real time analysis of operational logs is ... [more ▼]

Dealing with large volumes of logs is like the prover- bial needle in the haystack problem. Finding relevant events that might be associated with an incident, or real time analysis of operational logs is extremely difficult when the underlying data volume is huge and when no explicit misuse model exists. While domain-specific knowledge and human expertise may be useful in analysing log data, automated approaches for detecting anomalies and track incidents are the only viable solutions when confronted with large volumes of data. In this paper we address the issue of automated log analysis and consider more specifically the case of ISP-provided firewall logs. We leverage approaches derived from statistical process control and information theory in order to track potential incidents and detect suspicious network activity. [less ▲]

Detailed reference viewed: 151 (4 UL)
Full Text
Peer Reviewed
See detailDNSSM: A large-scale Passive DNS Security Monitoring Framework
Marchal, Samuel UL; François, Jérôme UL; Wagner, Cynthia UL et al

in IEEE/IFIP Network Operations and Management Symposium (2012, April)

We present a monitoring approach and the supporting software architecture for passive DNS traffic. Monitoring DNS traffic can reveal essential network and system level activity profiles. Worm infected and ... [more ▼]

We present a monitoring approach and the supporting software architecture for passive DNS traffic. Monitoring DNS traffic can reveal essential network and system level activity profiles. Worm infected and botnet participating hosts can be identified and malicious backdoor communications can be detected. Any passive DNS monitoring solution needs to address several challenges that range from architectural approaches for dealing with large volumes of data up to specific Data Mining approaches for this purpose. We describe a framework that leverages state of the art distributed processing facilities with clustering techniques in order to detect anomalies in both online and offline DNS traffic. This framework entitled DSNSM is implemented and operational on several networks. We validate the framework against two large trace sets. [less ▲]

Detailed reference viewed: 232 (2 UL)
See detailNARVAL SCILAB TOOLBOX: Network Analysis and Routing eVALuation
Melakessou, Foued UL; Engel, Thomas UL

in Abstract book of 2012 International Workshop on Scilab & OW2 (IWSO) (2012)

Network Analysis and Routing eVALuation 2.0 referenced as NARVAL has been designed on top of the Scilab environment. It has been created at the University of Luxembourg within the Interdisciplinary Centre ... [more ▼]

Network Analysis and Routing eVALuation 2.0 referenced as NARVAL has been designed on top of the Scilab environment. It has been created at the University of Luxembourg within the Interdisciplinary Centre for Security, Reliability and Trust (SnT). The Centre carries out interdisciplinary research and graduate education in secure, reliable, and trustworthy ICT systems and services. This module is focusing on the analysis of network protocols. The main goal of this toolbox is to provide a complete software environment enabling the understanding of available communication algorithms, but also the design of new schemes. NARVAL permits to generate random topologies in order to study the impact of routing algorithms on the effectiveness of transmission protocols used by data communications. The target audience includes academics, students, engineers and scientists. We put some efforts to build detailed help files. The description of each function has been carefully done in order to facilitate the end users' comprehension. The module is self-sufficient as it does not depend on other internal/external Scilab toolboxes. NARVAL is running on the current release Scilab 5.3.3. We decided to create a specific classification according to the goal of each function: NARVAL_D_* (topology Discovery), NARVAL_F_* (general Functions), NARVAL_G_* (Graph), NARVAL_IP_* (Image Processing), NARVAL_I_* ( Internet traffic), NARVAL_M_* (Mobility), NARVAL_P_* (Peer-to-Peer), NARVAL_R_* (Routing), NARVAL_S_* (Security), NARVAL_T_* (Topology generation) and NARVAL_W_* (Wireless Sensor Network). This work was carried out as part of the EU FP7 BUTLER project (http://www.iot-butler.eu). [less ▲]

Detailed reference viewed: 501 (8 UL)
Full Text
Peer Reviewed
See detailTowards Collaborative Traffic Sensing using Mobile Phones
Frank, Raphaël UL; Mouton, Maximilien UL; Engel, Thomas UL

in Proceedings of the IEEE Vehicular Networking Conference 2012 (2012)

Participatory mobile sensing applications are becoming increasingly popular. The growing population of privately-held mobile smartphones enables a plethora of new services. One of the most promising ... [more ▼]

Participatory mobile sensing applications are becoming increasingly popular. The growing population of privately-held mobile smartphones enables a plethora of new services. One of the most promising application areas is collaborative traffic sensing. Here, smartphones are used as mobile sensors to collect and share relevant location information in order to reconstruct a global picture of the traffic situation in a monitored area. There are several challenges that need to be addressed in order to provide an efficient and ubiquitous service. In this talk we present how low-cost mobile smartphones can be used for such services without compromising the everyday usage of the device. We first test several sensing policies and evaluate how they affect location accuracy and battery life. We then perform a penetration rate study to identify the proportion of participants required to provide good service by varying several parameters. The outcome shows that if configured correctly, smartphones can be used as accurate mobile traffic sensors providing important information even at low penetration rates. [less ▲]

Detailed reference viewed: 122 (3 UL)