19 Search Results for "Dressler, Falko"


Document
Inter-Vehicular Communication - From Edge Support to Vulnerable Road Users II (Dagstuhl Seminar 22512)

Authors: Ana Aguiar, Onur Altintas, Falko Dressler, Gunnar Karlsson, and Florian Klingler

Published in: Dagstuhl Reports, Volume 12, Issue 12 (2023)


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 21262 "Inter-Vehicular Communication – From Edge Support to Vulnerable Road Users II". Looking back at the last decade, one can observe enormous progress in the domain of vehicular networking. In this growing community, many ongoing activities focus on the design of communication protocols to support safety applications, intelligent navigation, and many others. We shifted the focus from basic networking principles to open challenges in edge computing support and, as a novel aspect, on how to integrate so called vulnerable road users (VRU) into the picture.

Cite as

Ana Aguiar, Onur Altintas, Falko Dressler, Gunnar Karlsson, and Florian Klingler. Inter-Vehicular Communication - From Edge Support to Vulnerable Road Users II (Dagstuhl Seminar 22512). In Dagstuhl Reports, Volume 12, Issue 12, pp. 54-73, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)


Copy BibTex To Clipboard

@Article{aguiar_et_al:DagRep.12.12.54,
  author =	{Aguiar, Ana and Altintas, Onur and Dressler, Falko and Karlsson, Gunnar and Klingler, Florian},
  title =	{{Inter-Vehicular Communication - From Edge Support to Vulnerable Road Users II (Dagstuhl Seminar 22512)}},
  pages =	{54--73},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2023},
  volume =	{12},
  number =	{12},
  editor =	{Aguiar, Ana and Altintas, Onur and Dressler, Falko and Karlsson, Gunnar and Klingler, Florian},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.12.12.54},
  URN =		{urn:nbn:de:0030-drops-178466},
  doi =		{10.4230/DagRep.12.12.54},
  annote =	{Keywords: 5G/6G, bicyclists, cooperative driving, edge computing, intelligent transportation systems, pedestrians, tactile internet, V2X, vehicle-to-vehicle communication, vulnerable road users}
}
Document
Inter-Vehicular Communication - From Edge Support to Vulnerable Road Users (Dagstuhl Seminar 21262)

Authors: Ana Aguiar, Onur Altintas, Falko Dressler, and Gunnar Karlsson

Published in: Dagstuhl Reports, Volume 11, Issue 5 (2021)


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 21262 "Inter-Vehicular Communication - From Edge Support to Vulnerable Road Users". Looking back at the last decade, one can observe enormous progress in the domain of vehicular networking. In this growing community, many ongoing activities focus on the design of communication protocols to support safety applications, intelligent navigation, and many others. We shifted the focus from basic networking principles to open challenges in edge computing support and, as a novel aspect, on how to integrate so called vulnerable road users (VRU) into the picture.

Cite as

Ana Aguiar, Onur Altintas, Falko Dressler, and Gunnar Karlsson. Inter-Vehicular Communication - From Edge Support to Vulnerable Road Users (Dagstuhl Seminar 21262). In Dagstuhl Reports, Volume 11, Issue 5, pp. 89-96, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2021)


Copy BibTex To Clipboard

@Article{aguiar_et_al:DagRep.11.5.89,
  author =	{Aguiar, Ana and Altintas, Onur and Dressler, Falko and Karlsson, Gunnar},
  title =	{{Inter-Vehicular Communication - From Edge Support to Vulnerable Road Users (Dagstuhl Seminar 21262)}},
  pages =	{89--96},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2021},
  volume =	{11},
  number =	{5},
  editor =	{Aguiar, Ana and Altintas, Onur and Dressler, Falko and Karlsson, Gunnar},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.11.5.89},
  URN =		{urn:nbn:de:0030-drops-155722},
  doi =		{10.4230/DagRep.11.5.89},
  annote =	{Keywords: vehicular networks, vulnerable road users, edge computing, intelligent transportation systems}
}
Document
Inter-Vehicular Communication Towards Cooperative Driving (Dagstuhl Seminar 18202)

Authors: Onur Altintas, Suman Banerjee, Falko Dressler, and Geert Heijenk

Published in: Dagstuhl Reports, Volume 8, Issue 5 (2019)


Abstract
Looking back at the last decade, one can observe enormous progress in the domain of vehicular networking. In this growing community, many ongoing activities focus on the design of communication protocols to support safety applications, intelligent navigation, multi-player gaming and others. This seminar shifted the focus from basic networking principles to networked control applications. We were particularly interested in eSafety applications and traffic efficiency applications that are thought to yield substantial benefits for the emerging "cooperative automated driving" domain. The seminar brought together experts from several fields, including classical computer science (computer networking, simulation and modeling, operating system design), electrical engineering (digital signal processing, communication networks), and automated driving (mechanical engineering, image processing, control theory), to discuss the most challenging issues related to inter-vehicular communication and cooperative driving.

Cite as

Onur Altintas, Suman Banerjee, Falko Dressler, and Geert Heijenk. Inter-Vehicular Communication Towards Cooperative Driving (Dagstuhl Seminar 18202). In Dagstuhl Reports, Volume 8, Issue 5, pp. 31-59, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2018)


Copy BibTex To Clipboard

@Article{altintas_et_al:DagRep.8.5.31,
  author =	{Altintas, Onur and Banerjee, Suman and Dressler, Falko and Heijenk, Geert},
  title =	{{Inter-Vehicular Communication Towards Cooperative Driving (Dagstuhl Seminar 18202)}},
  pages =	{31--59},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2018},
  volume =	{8},
  number =	{5},
  editor =	{Altintas, Onur and Banerjee, Suman and Dressler, Falko and Heijenk, Geert},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.8.5.31},
  URN =		{urn:nbn:de:0030-drops-98929},
  doi =		{10.4230/DagRep.8.5.31},
  annote =	{Keywords: automated driving, cooperative driving, road traffic safety, vehicular networking}
}
Document
Inter-Vehicular Communication -- Quo Vadis (Dagstuhl Seminar 13392)

Authors: Onur Altintas, Falko Dressler, Hannes Hartenstein, and Ozan K. Tonguz

Published in: Dagstuhl Reports, Volume 3, Issue 9 (2014)


Abstract
"Inter-Vehicular Communication -- Quo Vadis?". With this question in mind, leading experts in the field of vehicular networking met in Dagstuhl to discuss the current state of the art and, most importantly, the open challenges in R&D from both an scientific and an industry point of view. After more than a decade of research on vehicular networks, the experts very seriously asked the question whether all of the initial research issues had been solved so far. It turned out that the perspective changed in the last few years, mainly thanks to the ongoing field operational tests in Europe and the U.S. The results point to new research directions and new challenges that need to be solved for a second generation of vehicular networking applications and protocols. In four working groups, the experts studied these new challenges and derived recommendations that are also very helpful for the respective funding organizations.

Cite as

Onur Altintas, Falko Dressler, Hannes Hartenstein, and Ozan K. Tonguz. Inter-Vehicular Communication -- Quo Vadis (Dagstuhl Seminar 13392). In Dagstuhl Reports, Volume 3, Issue 9, pp. 190-213, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2014)


Copy BibTex To Clipboard

@Article{altintas_et_al:DagRep.3.9.190,
  author =	{Altintas, Onur and Dressler, Falko and Hartenstein, Hannes and Tonguz, Ozan K.},
  title =	{{Inter-Vehicular Communication -- Quo Vadis (Dagstuhl Seminar 13392)}},
  pages =	{190--213},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2014},
  volume =	{3},
  number =	{9},
  editor =	{Altintas, Onur and Dressler, Falko and Hartenstein, Hannes and Tonguz, Ozan K.},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.3.9.190},
  URN =		{urn:nbn:de:0030-drops-44227},
  doi =		{10.4230/DagRep.3.9.190},
  annote =	{Keywords: Vehicular Networking, Inter-Vehicle Communication, Intelligent Transportation Systems}
}
Document
Network Attack Detection and Defense Early Warning Systems - Challenges and Perspectives (Dagstuhl Seminar 12061)

Authors: Georg Carle, Hervé Debar, Falko Dressler, and Hartmut König

Published in: Dagstuhl Reports, Volume 2, Issue 2 (2012)


Abstract
The increasing dependence of human society on information technology (IT) systems requires appropriate measures to cope with their misuse. The growing potential of threats, which make these systems more and more vulnerable, is caused by the complexity of the technologies themselves. The potential of threats in networked systems will further grow as well as the number of individuals who are able to abuse these systems. It becomes increasingly apparent that IT security cannot be achieved by prevention alone. Preventive measures and reactive aspects need to complement one another. A major challenge of modern IT security technologies is to cope with an exploding variability of attacks which stems from a significant commercial motivation behind them. Increasingly proactive measures are required to ward off these threats. Increased efforts in research and society are required to protect critical civil infrastructures, such as the health care system, the traffic system, power supply, trade, military networks, and others in developed countries. This is a consequence of the increasing shift of industrial IT systems to the IP protocol leading to sensible IT infrastructures which are more vulnerable as the proprietary systems used in the past. The abundance of services of modern infrastructures critically depends on information and communication technologies. Though, being key enablers of critical infrastructures, these technologies are, at the same time, reckoned among the most vulnerable elements of the whole system. The cooperative information exchange between institutions is mandatory in order to detect distributed and coordinated attacks. Based on a large-scale acquisition of pertinent information, Early Warning Systems are a currently pursued approach to draw up situation pictures that allows the detection of trends and upcoming threats, allowing furthermore taking appropriate measures. The Dagstuhl seminar brought together researchers from academia and industry. The objective of the seminar was to further discuss challenges and methods in the area of attack detection and defense. The seminar was supposed to focus on design aspects of early warning systems and related monitoring infrastructures, e.g., intrusion detection overlays, to protect computer systems, networks, and critical infrastructures. The seminar was jointly organized by Georg Carle, Hervé Debar, Hartmut König, and Jelena Mirkovic. It was attended by 34 participants from nine countries.

Cite as

Georg Carle, Hervé Debar, Falko Dressler, and Hartmut König. Network Attack Detection and Defense Early Warning Systems - Challenges and Perspectives (Dagstuhl Seminar 12061). In Dagstuhl Reports, Volume 2, Issue 2, pp. 1-20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2012)


Copy BibTex To Clipboard

@Article{carle_et_al:DagRep.2.2.1,
  author =	{Carle, Georg and Debar, Herv\'{e} and Dressler, Falko and K\"{o}nig, Hartmut},
  title =	{{Network Attack Detection and Defense Early Warning Systems - Challenges and Perspectives (Dagstuhl Seminar 12061)}},
  pages =	{1--20},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2012},
  volume =	{2},
  number =	{2},
  editor =	{Carle, Georg and Debar, Herv\'{e} and Dressler, Falko and K\"{o}nig, Hartmut},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.2.2.1},
  URN =		{urn:nbn:de:0030-drops-34761},
  doi =		{10.4230/DagRep.2.2.1},
  annote =	{Keywords: early warning systems, critical infrastructure protection, botnets, intrusion detection, malware assessment, vulnerability analysis, network monitoring, flow analysis, denial-of-service detection and response, event correlation, attack response and countermeasures}
}
Document
10402 Abstracts Collection and Executive Summary – Inter-Vehicular Communication

Authors: Falko Dressler, Frank Kargl, Jörg Ott, Ozan K. Tonguz, and Lars Wischhof

Published in: Dagstuhl Seminar Proceedings, Volume 10402, Inter-Vehicular Communication (2011)


Abstract
From October 3 to October 6, 2010, the Dagstuhl Seminar 10402 ``Inter-Vehicular Communication'' was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar are put together in this paper. The first section describes the seminar topics and goals in general.

Cite as

Falko Dressler, Frank Kargl, Jörg Ott, Ozan K. Tonguz, and Lars Wischhof. 10402 Abstracts Collection and Executive Summary – Inter-Vehicular Communication. In Inter-Vehicular Communication. Dagstuhl Seminar Proceedings, Volume 10402, pp. 1-7, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2011)


Copy BibTex To Clipboard

@InProceedings{dressler_et_al:DagSemProc.10402.1,
  author =	{Dressler, Falko and Kargl, Frank and Ott, J\"{o}rg and Tonguz, Ozan K. and Wischhof, Lars},
  title =	{{10402 Abstracts Collection and Executive Summary – Inter-Vehicular Communication}},
  booktitle =	{Inter-Vehicular Communication},
  pages =	{1--7},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2011},
  volume =	{10402},
  editor =	{Falko Dressler and Frank Kargl and J\"{o}rg Ott and Ozan K. Tonguz and Lars Wischhof},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.10402.1},
  URN =		{urn:nbn:de:0030-drops-29299},
  doi =		{10.4230/DagSemProc.10402.1},
  annote =	{Keywords: Inter-Vehicular Communication, Car-2-Car, Car-2-X, Intelligent Transportation Systems}
}
Document
10402 Report – Working Group on Communication Patterns

Authors: Claudio Casetti, Falko Dressler, Lars Eggert, Felix Schmidt-Eisenlohr, Jerome Haerri, Ozan K. Tonguz, Jörg Ott, and Lars Wischhof

Published in: Dagstuhl Seminar Proceedings, Volume 10402, Inter-Vehicular Communication (2011)


Abstract
The objective of the working group communication patterns during the Dagstuhl Seminar on Vehicular Networks has been to review the current status of the communication patterns and principles and discuss the upcoming challenges the community will face in the near future. This is an executive summary of the discussions during the sessions.

Cite as

Claudio Casetti, Falko Dressler, Lars Eggert, Felix Schmidt-Eisenlohr, Jerome Haerri, Ozan K. Tonguz, Jörg Ott, and Lars Wischhof. 10402 Report – Working Group on Communication Patterns. In Inter-Vehicular Communication. Dagstuhl Seminar Proceedings, Volume 10402, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2011)


Copy BibTex To Clipboard

@InProceedings{casetti_et_al:DagSemProc.10402.2,
  author =	{Casetti, Claudio and Dressler, Falko and Eggert, Lars and Schmidt-Eisenlohr, Felix and Haerri, Jerome and Tonguz, Ozan K. and Ott, J\"{o}rg and Wischhof, Lars},
  title =	{{10402 Report – Working Group on Communication Patterns}},
  booktitle =	{Inter-Vehicular Communication},
  pages =	{1--3},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2011},
  volume =	{10402},
  editor =	{Falko Dressler and Frank Kargl and J\"{o}rg Ott and Ozan K. Tonguz and Lars Wischhof},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.10402.2},
  URN =		{urn:nbn:de:0030-drops-29287},
  doi =		{10.4230/DagSemProc.10402.2},
  annote =	{Keywords: V2V, communication principles}
}
Document
10402 Report – Working Group on Fundamental Limits and Opportunities

Authors: Hannes Hartenstein, Geert Heijenk, Martin Mauve, Björn Scheuermann, and Lars Wolf

Published in: Dagstuhl Seminar Proceedings, Volume 10402, Inter-Vehicular Communication (2011)


Abstract
This working group investigated first steps towards finding a theoretical foundation for inter-vehicle communication. The main outcome is a sketch of a roadmap for future work in this direction.

Cite as

Hannes Hartenstein, Geert Heijenk, Martin Mauve, Björn Scheuermann, and Lars Wolf. 10402 Report – Working Group on Fundamental Limits and Opportunities. In Inter-Vehicular Communication. Dagstuhl Seminar Proceedings, Volume 10402, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2011)


Copy BibTex To Clipboard

@InProceedings{hartenstein_et_al:DagSemProc.10402.3,
  author =	{Hartenstein, Hannes and Heijenk, Geert and Mauve, Martin and Scheuermann, Bj\"{o}rn and Wolf, Lars},
  title =	{{10402 Report – Working Group on Fundamental Limits and Opportunities}},
  booktitle =	{Inter-Vehicular Communication},
  pages =	{1--3},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2011},
  volume =	{10402},
  editor =	{Falko Dressler and Frank Kargl and J\"{o}rg Ott and Ozan K. Tonguz and Lars Wischhof},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.10402.3},
  URN =		{urn:nbn:de:0030-drops-29266},
  doi =		{10.4230/DagSemProc.10402.3},
  annote =	{Keywords: Inter-Vehicle Communication, Car-to-X Communication, Fundamental Limits}
}
Document
10402 Report – Working Group on Security and Privacy

Authors: Frank Kargl, Levente Buttyan, David Eckhoff, Panagiotis Papadimitratos, and Elmar Schoch

Published in: Dagstuhl Seminar Proceedings, Volume 10402, Inter-Vehicular Communication (2011)


Abstract
In the security working group, participants created an overview map of current topics in IVC security and privacy research that also includes an estimate of maturity of certain topics.

Cite as

Frank Kargl, Levente Buttyan, David Eckhoff, Panagiotis Papadimitratos, and Elmar Schoch. 10402 Report – Working Group on Security and Privacy. In Inter-Vehicular Communication. Dagstuhl Seminar Proceedings, Volume 10402, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2011)


Copy BibTex To Clipboard

@InProceedings{kargl_et_al:DagSemProc.10402.4,
  author =	{Kargl, Frank and Buttyan, Levente and Eckhoff, David and Papadimitratos, Panagiotis and Schoch, Elmar},
  title =	{{10402 Report – Working Group on Security and Privacy}},
  booktitle =	{Inter-Vehicular Communication},
  pages =	{1--4},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2011},
  volume =	{10402},
  editor =	{Falko Dressler and Frank Kargl and J\"{o}rg Ott and Ozan K. Tonguz and Lars Wischhof},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.10402.4},
  URN =		{urn:nbn:de:0030-drops-29275},
  doi =		{10.4230/DagSemProc.10402.4},
  annote =	{Keywords: IVC, C2X, VANET, security, privacy}
}
Document
1. 08102 Executive Summary – Perspectives Workshop: Network Attack Detection and Defense

Authors: Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut Koenig, and Christopher Kruegel

Published in: Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008)


Abstract
From March 2nd to 6th, 2008, the Dagstuhl Perspective Workshop 08102 Net-work Attack Detection and Defense was held at the International Conference and Research Center (IBFI), Schloss Dagstuhl. The objective of the workshop was to work out a manifesto that identifies past shortcomings and future direc-tions for the field. During the workshop, several participants presented their perspective on the development of the area. Furthermore, ongoing work and on open problems were discussed. Six working groups were formed to discuss the state of the art and the challenges of future research directions. The Executive Summary describes the workshop topics and goals in general, and gives an overview of its course. Abstracts of the presentations given during the work-shop, the outcomes of the working groups, and the manifesto are put together in the online proceedings.

Cite as

Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut Koenig, and Christopher Kruegel. 1. 08102 Executive Summary – Perspectives Workshop: Network Attack Detection and Defense. In Perspectives Workshop: Network Attack Detection and Defense. Dagstuhl Seminar Proceedings, Volume 8102, pp. 1-6, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)


Copy BibTex To Clipboard

@InProceedings{carle_et_al:DagSemProc.08102.1,
  author =	{Carle, Georg and Dressler, Falko and Kemmerer, Richard A. and Koenig, Hartmut and Kruegel, Christopher},
  title =	{{1. 08102 Executive Summary – Perspectives Workshop: Network Attack Detection and Defense}},
  booktitle =	{Perspectives Workshop: Network Attack Detection and Defense},
  pages =	{1--6},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8102},
  editor =	{Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K\"{o}nig and Christopher Kruegel},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.1},
  URN =		{urn:nbn:de:0030-drops-14926},
  doi =		{10.4230/DagSemProc.08102.1},
  annote =	{Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation}
}
Document
2. 08102 Working Group – Early Warning Systems

Authors: Joachim Biskup, Bernhard Hämmerli, Michael Meier, Sebastian Schmerl, Jens Tölle, and Michael Vogel

Published in: Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008)


Abstract
Early Warning Systems aim at detecting unclassified but potentially harmful sys-tem behavior based on preliminary indications and are complementary to Intrusion Detection Systems. Both kinds of systems try to detect, identify and react before pos-sible damage occurs and contribute to an integrated and aggregated situation report (big picture). A particular emphasis of Early Warning Systems is to establish hypotheses and predictions as well as to generate advises in still not completely understood situations. Thus the term early has two meanings, a) to start early in time aiming to minimize damage, and b) to process uncertain and incomplete information.

Cite as

Joachim Biskup, Bernhard Hämmerli, Michael Meier, Sebastian Schmerl, Jens Tölle, and Michael Vogel. 2. 08102 Working Group – Early Warning Systems. In Perspectives Workshop: Network Attack Detection and Defense. Dagstuhl Seminar Proceedings, Volume 8102, pp. 1-2, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)


Copy BibTex To Clipboard

@InProceedings{biskup_et_al:DagSemProc.08102.2,
  author =	{Biskup, Joachim and H\"{a}mmerli, Bernhard and Meier, Michael and Schmerl, Sebastian and T\"{o}lle, Jens and Vogel, Michael},
  title =	{{2. 08102 Working Group – Early Warning Systems}},
  booktitle =	{Perspectives Workshop: Network Attack Detection and Defense},
  pages =	{1--2},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8102},
  editor =	{Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K\"{o}nig and Christopher Kruegel},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.2},
  URN =		{urn:nbn:de:0030-drops-14936},
  doi =		{10.4230/DagSemProc.08102.2},
  annote =	{Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation}
}
Document
3. 08102 Outcome Working Group – Situational Awareness

Authors: Richard A. Kemmerer, Roland Bueschkes, Ali Fessi, Hartmut Koenig, Peter Herrmann, Stephen Wolthusen, Marko Jahnke, Hervé Debar, Ralph Holz, Tanja Zseby, and Dirk Haage

Published in: Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008)


Abstract
Situation awareness (SA) has been defined as "the perception of elements in the environment within a volume of time and space, the comprehension of their meaning, and the projection of their status in the near future" (Endsley, 1988, 1995b, 2000).

Cite as

Richard A. Kemmerer, Roland Bueschkes, Ali Fessi, Hartmut Koenig, Peter Herrmann, Stephen Wolthusen, Marko Jahnke, Hervé Debar, Ralph Holz, Tanja Zseby, and Dirk Haage. 3. 08102 Outcome Working Group – Situational Awareness. In Perspectives Workshop: Network Attack Detection and Defense. Dagstuhl Seminar Proceedings, Volume 8102, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)


Copy BibTex To Clipboard

@InProceedings{kemmerer_et_al:DagSemProc.08102.3,
  author =	{Kemmerer, Richard A. and Bueschkes, Roland and Fessi, Ali and Koenig, Hartmut and Herrmann, Peter and Wolthusen, Stephen and Jahnke, Marko and Debar, Herv\'{e} and Holz, Ralph and Zseby, Tanja and Haage, Dirk},
  title =	{{3. 08102 Outcome Working Group – Situational Awareness}},
  booktitle =	{Perspectives Workshop: Network Attack Detection and Defense},
  pages =	{1--3},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8102},
  editor =	{Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K\"{o}nig and Christopher Kruegel},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.3},
  URN =		{urn:nbn:de:0030-drops-14942},
  doi =		{10.4230/DagSemProc.08102.3},
  annote =	{Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation}
}
Document
4. 8102 Working Group – Attack Taxonomy

Authors: Marc Daciér, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, and James Sterbenz

Published in: Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008)


Abstract
The starting point of this working group was the question about the kinds of attacks that can be detected by inspecting in network traffic. In general, we identified four major problems that network-based intrusion detection systems are facing: 1. Encrypted network traffic 2. Application-level attacks 3. Performance 4. Evasion attack.

Cite as

Marc Daciér, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, and James Sterbenz. 4. 8102 Working Group – Attack Taxonomy. In Perspectives Workshop: Network Attack Detection and Defense. Dagstuhl Seminar Proceedings, Volume 8102, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)


Copy BibTex To Clipboard

@InProceedings{dacier_et_al:DagSemProc.08102.4,
  author =	{Daci\'{e}r, Marc and Debar, Herv\'{e} and Holz, Thorsten and Kirda, Engin and Kohlrausch, Jan and Kruegel, Christopher and Rieck, Konrad and Sterbenz, James},
  title =	{{4. 8102 Working Group – Attack Taxonomy}},
  booktitle =	{Perspectives Workshop: Network Attack Detection and Defense},
  pages =	{1--4},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8102},
  editor =	{Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K\"{o}nig and Christopher Kruegel},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.4},
  URN =		{urn:nbn:de:0030-drops-14955},
  doi =		{10.4230/DagSemProc.08102.4},
  annote =	{Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation}
}
Document
5. 08102 Working Group – Measurement Requirements

Authors: Lothar Braun, Thorsten Braun, Georg Carle, Falko Dressler, Anja Feldmann, Dirk Haage, Tobias Limmer, and Tanja Zseby

Published in: Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008)


Abstract
The objective of this working group was to derive measurement requirements and challenges that originate from intrusion detection.

Cite as

Lothar Braun, Thorsten Braun, Georg Carle, Falko Dressler, Anja Feldmann, Dirk Haage, Tobias Limmer, and Tanja Zseby. 5. 08102 Working Group – Measurement Requirements. In Perspectives Workshop: Network Attack Detection and Defense. Dagstuhl Seminar Proceedings, Volume 8102, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)


Copy BibTex To Clipboard

@InProceedings{braun_et_al:DagSemProc.08102.5,
  author =	{Braun, Lothar and Braun, Thorsten and Carle, Georg and Dressler, Falko and Feldmann, Anja and Haage, Dirk and Limmer, Tobias and Zseby, Tanja},
  title =	{{5. 08102 Working Group – Measurement Requirements}},
  booktitle =	{Perspectives Workshop: Network Attack Detection and Defense},
  pages =	{1--4},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8102},
  editor =	{Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K\"{o}nig and Christopher Kruegel},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.5},
  URN =		{urn:nbn:de:0030-drops-14962},
  doi =		{10.4230/DagSemProc.08102.5},
  annote =	{Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation}
}
Document
6. 08102 Working Group – Requirements for Network Monitoring from an IDS Perspective

Authors: Lothar Braun, Falko Dressler, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Tobias Limmer, Konrad Rieck, and James Sterbenz

Published in: Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008)


Abstract
Detection of malicious traffic is based on its input data, the information that is co-ming from network-based monitoring systems. Best detection rates would only be possible by monitoring all data transferred over all network lines in a distributed net-work. Monitoring and reporting this amount of data are feasible in neither today's, nor will be in future's systems. Later analysis like stateful inspection of the traffic imposes even more processing costs. But only at this level of monitoring and analysis there may be a chance to capture all attacks inside a system. So there needs to be a trade-off between detection success and the processing costs.

Cite as

Lothar Braun, Falko Dressler, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Tobias Limmer, Konrad Rieck, and James Sterbenz. 6. 08102 Working Group – Requirements for Network Monitoring from an IDS Perspective. In Perspectives Workshop: Network Attack Detection and Defense. Dagstuhl Seminar Proceedings, Volume 8102, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)


Copy BibTex To Clipboard

@InProceedings{braun_et_al:DagSemProc.08102.6,
  author =	{Braun, Lothar and Dressler, Falko and Holz, Thorsten and Kirda, Engin and Kohlrausch, Jan and Kruegel, Christopher and Limmer, Tobias and Rieck, Konrad and Sterbenz, James},
  title =	{{6. 08102 Working Group – Requirements for Network Monitoring from an IDS Perspective}},
  booktitle =	{Perspectives Workshop: Network Attack Detection and Defense},
  pages =	{1--4},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8102},
  editor =	{Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K\"{o}nig and Christopher Kruegel},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.6},
  URN =		{urn:nbn:de:0030-drops-14970},
  doi =		{10.4230/DagSemProc.08102.6},
  annote =	{Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation}
}
  • Refine by Author
  • 13 Dressler, Falko
  • 4 Altintas, Onur
  • 4 Carle, Georg
  • 4 Kruegel, Christopher
  • 3 Debar, Hervé
  • Show More...

  • Refine by Classification
  • 2 Networks → Cyber-physical networks
  • 1 Computing methodologies → Machine learning
  • 1 Human-centered computing
  • 1 Networks → Network dynamics
  • 1 Networks → Network protocols
  • Show More...

  • Refine by Keyword
  • 8 attack response and countermeasures
  • 8 event correlation
  • 8 flow analysis
  • 7 Intrusion detection and prevention
  • 7 automated security
  • Show More...

  • Refine by Type
  • 19 document

  • Refine by Publication Year
  • 8 2008
  • 4 2011
  • 1 2005
  • 1 2006
  • 1 2012
  • Show More...

Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail