3 Search Results for "Dietrich, Sven"


Document
Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431)

Authors: Sven Dietrich, Frank Kargl, Hartmut König, Pavel Laskov, and Artur Hermann

Published in: Dagstuhl Reports, Volume 13, Issue 10 (2024)


Abstract
This report documents the program and the findings of Dagstuhl Seminar 23431 "Network Attack Detection and Defense - AI-Powered Threats and Responses". With the emergence of artificial intelligence (AI), attack detection and defense are taking on a new level of quality. Artificial intelligence will promote further automation of attacks. There are already examples of this, such as the Deep Locker malware. It is expected that we will soon face a situation in which malware and attacks will become more and more automated, intelligent, and AI-powered. Consequently, today’s threat response systems will become more and more inadequate, especially when they rely on manual intervention of security experts and analysts. The main objective of the seminar was to assess the state of the art and potentials that AI advances create for both attackers and defenders. The seminar continued the series of Dagstuhl events "Network Attack Detection and Defense" held in 2008, 2012, 2014, and 2016. The objectives of the seminar were threefold, namely (1) to investigate various scenarios of AI-based malware and attacks, (2) to debate trust in AI and modeling of threats against AI, and (3) to propose methods and strategies for AI-powered network defenses. At the seminar, which brought together participants from academia and industry, we stated that recent advances in artificial intelligence have opened up new possibilities for each of these directions. In general, more and more researchers in networking and security look at AI-based methods which made this a timely event to assess and categorize the state of the art as well as work towards a roadmap for future research. The outcome of the discussions and the proposed research directions are presented in this report.

Cite as

Sven Dietrich, Frank Kargl, Hartmut König, Pavel Laskov, and Artur Hermann. Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431). In Dagstuhl Reports, Volume 13, Issue 10, pp. 90-129, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024)


Copy BibTex To Clipboard

@Article{dietrich_et_al:DagRep.13.10.90,
  author =	{Dietrich, Sven and Kargl, Frank and K\"{o}nig, Hartmut and Laskov, Pavel and Hermann, Artur},
  title =	{{Network Attack Detection and Defense - AI-Powered Threats and Responses (Dagstuhl Seminar 23431)}},
  pages =	{90--129},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2024},
  volume =	{13},
  number =	{10},
  editor =	{Dietrich, Sven and Kargl, Frank and K\"{o}nig, Hartmut and Laskov, Pavel and Hermann, Artur},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.13.10.90},
  URN =		{urn:nbn:de:0030-drops-198365},
  doi =		{10.4230/DagRep.13.10.90},
  annote =	{Keywords: artificial intelligence, cybersecurity, intrusion detection, machine learning}
}
Document
Network Attack Detection and Defense (Dagstuhl Seminar 16361)

Authors: Marc C. Dacier, Sven Dietrich, Frank Kargl, and Hartmut König

Published in: Dagstuhl Reports, Volume 6, Issue 9 (2017)


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 16361 "Network Attack Detection and Defense: Security Challenges and Opportunities of Software-Defined Networking". Software-defined networking (SDN) has attracted a great attention both in industry and academia since the beginning of the decade. This attention keeps undiminished. Security-related aspects of software-defined networking have only been considered more recently. Opinions differ widely. The main objective of the seminar was to discuss the various contrary facets of SDN security. The seminar continued the series of Dagstuhl events Network Attack Detection and Defense held in 2008, 2012, and 2014. The objectives of the seminar were threefold, namely (1) to discuss the security challenges of SDN, (2) to debate strategies to monitor and protect SDN-enabled networks, and (3) to propose methods and strategies to leverage on the flexibility brought by SDN for designing new security mechanisms. At the seminar, which brought together participants from academia and industry, we discussed the advantages and disadvantages of using software-defined networks from the security point of view. We agreed that SDN provides new possibilities to better secure networks, but also offers a number of serious security problems which require further research. The outcome of these discussions and the proposed research directions are presented in this report.

Cite as

Marc C. Dacier, Sven Dietrich, Frank Kargl, and Hartmut König. Network Attack Detection and Defense (Dagstuhl Seminar 16361). In Dagstuhl Reports, Volume 6, Issue 9, pp. 1-28, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2017)


Copy BibTex To Clipboard

@Article{dacier_et_al:DagRep.6.9.1,
  author =	{Dacier, Marc C. and Dietrich, Sven and Kargl, Frank and K\"{o}nig, Hartmut},
  title =	{{Network Attack Detection and Defense (Dagstuhl Seminar 16361)}},
  pages =	{1--28},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2017},
  volume =	{6},
  number =	{9},
  editor =	{Dacier, Marc C. and Dietrich, Sven and Kargl, Frank and K\"{o}nig, Hartmut},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.6.9.1},
  URN =		{urn:nbn:de:0030-drops-69122},
  doi =		{10.4230/DagRep.6.9.1},
  annote =	{Keywords: attack detection, denial-of-service attack detection and response, intrusion detection, malware assessment, network monitoring, openflow protocol, programmable networks, security, software-defined networking, targeted attacks, vulnerability analysis}
}
Document
Ethics in Data Sharing (Dagstuhl Seminar 14052)

Authors: Julie E. Cohen, Sven Dietrich, Aiko Pras, Lenore D. Zuck, and Hildebrand Mireille

Published in: Dagstuhl Reports, Volume 4, Issue 1 (2014)


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 14052 "Ethics in Data Sharing". The seminar brought together computer scientists, an ethicist and legal scholars to discuss the topic of "ethics in data sharing."

Cite as

Julie E. Cohen, Sven Dietrich, Aiko Pras, Lenore D. Zuck, and Hildebrand Mireille. Ethics in Data Sharing (Dagstuhl Seminar 14052). In Dagstuhl Reports, Volume 4, Issue 1, pp. 170-183, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2014)


Copy BibTex To Clipboard

@Article{cohen_et_al:DagRep.4.1.170,
  author =	{Cohen, Julie E. and Dietrich, Sven and Pras, Aiko and Zuck, Lenore D. and Hildebrand Mireille},
  title =	{{Ethics in Data Sharing (Dagstuhl Seminar 14052)}},
  pages =	{170--183},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2014},
  volume =	{4},
  number =	{1},
  editor =	{Cohen, Julie E. and Dietrich, Sven and Pras, Aiko and Zuck, Lenore D. and Hildebrand Mireille},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.4.1.170},
  URN =		{urn:nbn:de:0030-drops-45418},
  doi =		{10.4230/DagRep.4.1.170},
  annote =	{Keywords: Ethics, Data Sharing Practices, Data Dissemination, Ethics across borders, Anonymization, Sanitization}
}
  • Refine by Author
  • 3 Dietrich, Sven
  • 2 Kargl, Frank
  • 2 König, Hartmut
  • 1 Cohen, Julie E.
  • 1 Dacier, Marc C.
  • Show More...

  • Refine by Classification
  • 1 Networks → Network security
  • 1 Security and privacy → Intrusion/anomaly detection and malware mitigation
  • 1 Security and privacy → Network security
  • 1 Security and privacy → Systems security

  • Refine by Keyword
  • 2 intrusion detection
  • 1 Anonymization
  • 1 Data Dissemination
  • 1 Data Sharing Practices
  • 1 Ethics
  • Show More...

  • Refine by Type
  • 3 document

  • Refine by Publication Year
  • 1 2014
  • 1 2017
  • 1 2024

Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail