Search Results

Documents authored by Dacier, Marc C.


Found 3 Possible Name Variants:

Dacier, Marc C.

Document
Network Attack Detection and Defense (Dagstuhl Seminar 16361)

Authors: Marc C. Dacier, Sven Dietrich, Frank Kargl, and Hartmut König

Published in: Dagstuhl Reports, Volume 6, Issue 9 (2017)


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 16361 "Network Attack Detection and Defense: Security Challenges and Opportunities of Software-Defined Networking". Software-defined networking (SDN) has attracted a great attention both in industry and academia since the beginning of the decade. This attention keeps undiminished. Security-related aspects of software-defined networking have only been considered more recently. Opinions differ widely. The main objective of the seminar was to discuss the various contrary facets of SDN security. The seminar continued the series of Dagstuhl events Network Attack Detection and Defense held in 2008, 2012, and 2014. The objectives of the seminar were threefold, namely (1) to discuss the security challenges of SDN, (2) to debate strategies to monitor and protect SDN-enabled networks, and (3) to propose methods and strategies to leverage on the flexibility brought by SDN for designing new security mechanisms. At the seminar, which brought together participants from academia and industry, we discussed the advantages and disadvantages of using software-defined networks from the security point of view. We agreed that SDN provides new possibilities to better secure networks, but also offers a number of serious security problems which require further research. The outcome of these discussions and the proposed research directions are presented in this report.

Cite as

Marc C. Dacier, Sven Dietrich, Frank Kargl, and Hartmut König. Network Attack Detection and Defense (Dagstuhl Seminar 16361). In Dagstuhl Reports, Volume 6, Issue 9, pp. 1-28, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2017)


Copy BibTex To Clipboard

@Article{dacier_et_al:DagRep.6.9.1,
  author =	{Dacier, Marc C. and Dietrich, Sven and Kargl, Frank and K\"{o}nig, Hartmut},
  title =	{{Network Attack Detection and Defense (Dagstuhl Seminar 16361)}},
  pages =	{1--28},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2017},
  volume =	{6},
  number =	{9},
  editor =	{Dacier, Marc C. and Dietrich, Sven and Kargl, Frank and K\"{o}nig, Hartmut},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.6.9.1},
  URN =		{urn:nbn:de:0030-drops-69122},
  doi =		{10.4230/DagRep.6.9.1},
  annote =	{Keywords: attack detection, denial-of-service attack detection and response, intrusion detection, malware assessment, network monitoring, openflow protocol, programmable networks, security, software-defined networking, targeted attacks, vulnerability analysis}
}

Dacier, Marc

Document
Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292)

Authors: Marc Dacier, Frank Kargl, Hartmut König, and Alfonso Valdes

Published in: Dagstuhl Reports, Volume 4, Issue 7 (2014)


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 14292 "Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures". The main objective of the seminar was to discuss new approaches and ideas for securing industrial control systems. It is the sequel of several previous Dagstuhl seminars: (1) the series "Network Attack Detection and Defense" held in 2008 and 2012, and (2) the Dagstuhl seminar "Securing Critical Infrastructures from Targeted Attacks", held in 2012. At the seminar, which brought together members from academia an industry, appropriate methods for detecting attacks on industrial control systems (ICSs) and for limiting the impact on the physical components were considered. A central question was whether and how reactive security mechanisms can be made more ICS- and process-aware. To some extent it seems possible to adopt existing security approaches from other areas (e.g., conventional networks, embedded systems, or sensor networks). The main question is whether adopting these approaches is sufficient to reach the desired level of security for ICSs. Detecting attacks to the physical components and appropriate reactions to attacks are new aspects that need to be considered as well. The main result of the seminar is a list of recommendations for future directions in ICS security that is presented in this report.

Cite as

Marc Dacier, Frank Kargl, Hartmut König, and Alfonso Valdes. Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292). In Dagstuhl Reports, Volume 4, Issue 7, pp. 62-79, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2014)


Copy BibTex To Clipboard

@Article{dacier_et_al:DagRep.4.7.62,
  author =	{Dacier, Marc and Kargl, Frank and K\"{o}nig, Hartmut and Valdes, Alfonso},
  title =	{{Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292)}},
  pages =	{62--79},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2014},
  volume =	{4},
  number =	{7},
  editor =	{Dacier, Marc and Kargl, Frank and K\"{o}nig, Hartmut and Valdes, Alfonso},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.4.7.62},
  URN =		{urn:nbn:de:0030-drops-47912},
  doi =		{10.4230/DagRep.4.7.62},
  annote =	{Keywords: Security, Intrusion Detection, Critical Infrastructures, Industrial Control Systems, SCADA, Vulnerability Analysis, Malware Assessment, Attack Response and Countermeasures}
}
Document
Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502)

Authors: Marc Dacier, Frank Kargl, and Alfonso Valdes

Published in: Dagstuhl Reports, Volume 2, Issue 12 (2013)


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 12502 "Securing Critical Infrastructures from Targeted Attacks". Through a series of presentations, discussions, and working group meetings, the seminar achieved to shape a clearer picture of what actually constitutes a targeted attack on a critical infrastructure and defined the terms PEST (persistent, sophisticated and targeted) attacks and Critical Cyber Infrastructure in this context. This clearer view will hopefully help the research community and industry to address such threats in a more consistent and holistic way.

Cite as

Marc Dacier, Frank Kargl, and Alfonso Valdes. Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502). In Dagstuhl Reports, Volume 2, Issue 12, pp. 49-63, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{dacier_et_al:DagRep.2.12.49,
  author =	{Dacier, Marc and Kargl, Frank and Valdes, Alfonso},
  title =	{{Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502)}},
  pages =	{49--63},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{2},
  number =	{12},
  editor =	{Dacier, Marc and Kargl, Frank and Valdes, Alfonso},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.12.49},
  URN =		{urn:nbn:de:0030-drops-39894},
  doi =		{10.4230/DagRep.2.12.49},
  annote =	{Keywords: Critical Infrastructures, Targeted Attacks, Security}
}
Document
4. 8102 Working Group – Attack Taxonomy

Authors: Marc Daciér, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, and James Sterbenz

Published in: Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008)


Abstract
The starting point of this working group was the question about the kinds of attacks that can be detected by inspecting in network traffic. In general, we identified four major problems that network-based intrusion detection systems are facing: 1. Encrypted network traffic 2. Application-level attacks 3. Performance 4. Evasion attack.

Cite as

Marc Daciér, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, and James Sterbenz. 4. 8102 Working Group – Attack Taxonomy. In Perspectives Workshop: Network Attack Detection and Defense. Dagstuhl Seminar Proceedings, Volume 8102, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)


Copy BibTex To Clipboard

@InProceedings{dacier_et_al:DagSemProc.08102.4,
  author =	{Daci\'{e}r, Marc and Debar, Herv\'{e} and Holz, Thorsten and Kirda, Engin and Kohlrausch, Jan and Kruegel, Christopher and Rieck, Konrad and Sterbenz, James},
  title =	{{4. 8102 Working Group – Attack Taxonomy}},
  booktitle =	{Perspectives Workshop: Network Attack Detection and Defense},
  pages =	{1--4},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8102},
  editor =	{Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K\"{o}nig and Christopher Kruegel},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.4},
  URN =		{urn:nbn:de:0030-drops-14955},
  doi =		{10.4230/DagSemProc.08102.4},
  annote =	{Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation}
}
Document
7. 08102 Working Group – Intrusion and Fraud Detection for Web Services

Authors: Marc Daciér, Ulrich Flegel, Ralph Holz, and Norbert Luttenberger

Published in: Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008)


Abstract
Web services (WS) technology bears the promise to finally bring the power of SOA middleware to the road on a large scale and across organizational domains. Big players such as Google, Amazon, SAP, and IBM have already adopted the technol-ogy. European funding agencies are strongly believing and heavily investing into WS-related technological developments and application scenarios. We expect a growing adoption and widespread use of Web services for different application areas, among them e.g. value added service composition, Web 2.0-enhanced communication sys-tems (e.g. based on Ajax), and focused service offerings from specialized small or medium sized enterprises (SMEs).

Cite as

Marc Daciér, Ulrich Flegel, Ralph Holz, and Norbert Luttenberger. 7. 08102 Working Group – Intrusion and Fraud Detection for Web Services. In Perspectives Workshop: Network Attack Detection and Defense. Dagstuhl Seminar Proceedings, Volume 8102, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)


Copy BibTex To Clipboard

@InProceedings{dacier_et_al:DagSemProc.08102.7,
  author =	{Daci\'{e}r, Marc and Flegel, Ulrich and Holz, Ralph and Luttenberger, Norbert},
  title =	{{7. 08102 Working Group – Intrusion and Fraud Detection for Web Services}},
  booktitle =	{Perspectives Workshop: Network Attack Detection and Defense},
  pages =	{1--3},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8102},
  editor =	{Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K\"{o}nig and Christopher Kruegel},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.7},
  URN =		{urn:nbn:de:0030-drops-14982},
  doi =		{10.4230/DagSemProc.08102.7},
  annote =	{Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation}
}

Daciér, Marc

Document
Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292)

Authors: Marc Dacier, Frank Kargl, Hartmut König, and Alfonso Valdes

Published in: Dagstuhl Reports, Volume 4, Issue 7 (2014)


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 14292 "Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures". The main objective of the seminar was to discuss new approaches and ideas for securing industrial control systems. It is the sequel of several previous Dagstuhl seminars: (1) the series "Network Attack Detection and Defense" held in 2008 and 2012, and (2) the Dagstuhl seminar "Securing Critical Infrastructures from Targeted Attacks", held in 2012. At the seminar, which brought together members from academia an industry, appropriate methods for detecting attacks on industrial control systems (ICSs) and for limiting the impact on the physical components were considered. A central question was whether and how reactive security mechanisms can be made more ICS- and process-aware. To some extent it seems possible to adopt existing security approaches from other areas (e.g., conventional networks, embedded systems, or sensor networks). The main question is whether adopting these approaches is sufficient to reach the desired level of security for ICSs. Detecting attacks to the physical components and appropriate reactions to attacks are new aspects that need to be considered as well. The main result of the seminar is a list of recommendations for future directions in ICS security that is presented in this report.

Cite as

Marc Dacier, Frank Kargl, Hartmut König, and Alfonso Valdes. Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292). In Dagstuhl Reports, Volume 4, Issue 7, pp. 62-79, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2014)


Copy BibTex To Clipboard

@Article{dacier_et_al:DagRep.4.7.62,
  author =	{Dacier, Marc and Kargl, Frank and K\"{o}nig, Hartmut and Valdes, Alfonso},
  title =	{{Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292)}},
  pages =	{62--79},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2014},
  volume =	{4},
  number =	{7},
  editor =	{Dacier, Marc and Kargl, Frank and K\"{o}nig, Hartmut and Valdes, Alfonso},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.4.7.62},
  URN =		{urn:nbn:de:0030-drops-47912},
  doi =		{10.4230/DagRep.4.7.62},
  annote =	{Keywords: Security, Intrusion Detection, Critical Infrastructures, Industrial Control Systems, SCADA, Vulnerability Analysis, Malware Assessment, Attack Response and Countermeasures}
}
Document
Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502)

Authors: Marc Dacier, Frank Kargl, and Alfonso Valdes

Published in: Dagstuhl Reports, Volume 2, Issue 12 (2013)


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 12502 "Securing Critical Infrastructures from Targeted Attacks". Through a series of presentations, discussions, and working group meetings, the seminar achieved to shape a clearer picture of what actually constitutes a targeted attack on a critical infrastructure and defined the terms PEST (persistent, sophisticated and targeted) attacks and Critical Cyber Infrastructure in this context. This clearer view will hopefully help the research community and industry to address such threats in a more consistent and holistic way.

Cite as

Marc Dacier, Frank Kargl, and Alfonso Valdes. Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502). In Dagstuhl Reports, Volume 2, Issue 12, pp. 49-63, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2013)


Copy BibTex To Clipboard

@Article{dacier_et_al:DagRep.2.12.49,
  author =	{Dacier, Marc and Kargl, Frank and Valdes, Alfonso},
  title =	{{Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502)}},
  pages =	{49--63},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2013},
  volume =	{2},
  number =	{12},
  editor =	{Dacier, Marc and Kargl, Frank and Valdes, Alfonso},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagRep.2.12.49},
  URN =		{urn:nbn:de:0030-drops-39894},
  doi =		{10.4230/DagRep.2.12.49},
  annote =	{Keywords: Critical Infrastructures, Targeted Attacks, Security}
}
Document
4. 8102 Working Group – Attack Taxonomy

Authors: Marc Daciér, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, and James Sterbenz

Published in: Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008)


Abstract
The starting point of this working group was the question about the kinds of attacks that can be detected by inspecting in network traffic. In general, we identified four major problems that network-based intrusion detection systems are facing: 1. Encrypted network traffic 2. Application-level attacks 3. Performance 4. Evasion attack.

Cite as

Marc Daciér, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, and James Sterbenz. 4. 8102 Working Group – Attack Taxonomy. In Perspectives Workshop: Network Attack Detection and Defense. Dagstuhl Seminar Proceedings, Volume 8102, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)


Copy BibTex To Clipboard

@InProceedings{dacier_et_al:DagSemProc.08102.4,
  author =	{Daci\'{e}r, Marc and Debar, Herv\'{e} and Holz, Thorsten and Kirda, Engin and Kohlrausch, Jan and Kruegel, Christopher and Rieck, Konrad and Sterbenz, James},
  title =	{{4. 8102 Working Group – Attack Taxonomy}},
  booktitle =	{Perspectives Workshop: Network Attack Detection and Defense},
  pages =	{1--4},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8102},
  editor =	{Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K\"{o}nig and Christopher Kruegel},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.4},
  URN =		{urn:nbn:de:0030-drops-14955},
  doi =		{10.4230/DagSemProc.08102.4},
  annote =	{Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation}
}
Document
7. 08102 Working Group – Intrusion and Fraud Detection for Web Services

Authors: Marc Daciér, Ulrich Flegel, Ralph Holz, and Norbert Luttenberger

Published in: Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008)


Abstract
Web services (WS) technology bears the promise to finally bring the power of SOA middleware to the road on a large scale and across organizational domains. Big players such as Google, Amazon, SAP, and IBM have already adopted the technol-ogy. European funding agencies are strongly believing and heavily investing into WS-related technological developments and application scenarios. We expect a growing adoption and widespread use of Web services for different application areas, among them e.g. value added service composition, Web 2.0-enhanced communication sys-tems (e.g. based on Ajax), and focused service offerings from specialized small or medium sized enterprises (SMEs).

Cite as

Marc Daciér, Ulrich Flegel, Ralph Holz, and Norbert Luttenberger. 7. 08102 Working Group – Intrusion and Fraud Detection for Web Services. In Perspectives Workshop: Network Attack Detection and Defense. Dagstuhl Seminar Proceedings, Volume 8102, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)


Copy BibTex To Clipboard

@InProceedings{dacier_et_al:DagSemProc.08102.7,
  author =	{Daci\'{e}r, Marc and Flegel, Ulrich and Holz, Ralph and Luttenberger, Norbert},
  title =	{{7. 08102 Working Group – Intrusion and Fraud Detection for Web Services}},
  booktitle =	{Perspectives Workshop: Network Attack Detection and Defense},
  pages =	{1--3},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8102},
  editor =	{Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K\"{o}nig and Christopher Kruegel},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.7},
  URN =		{urn:nbn:de:0030-drops-14982},
  doi =		{10.4230/DagSemProc.08102.7},
  annote =	{Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation}
}
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail