Cybersecurity - Security Engineering

Die moderne Gesellschaft ist in zunehmendem Maße auf die Sicherheit und Zuverlässigkeit von IT-Systemen und des Internets angewiesen. Die Verwundbarkeit unserer digitalen Welt wird durch Hackerangriffe auf Netze oder Datenbanken, Computerviren, Internetwürmer und Trojanerangriffe immer wieder schmerzlich bewiesen. Hinzu kommt: Je mehr sensible Daten wie Online-Bestellungen, medizinische Daten oder elektronisches Bargeld in offenen Netzen wie dem Internet übertragen werden, desto mehr Angriffsflächen gibt es für solche Angriffe. Daher muss der Schutz von Computern und Netzen eines der wichtigsten Ziele sein.

Im Forschungsbereich Security Engineering befassen wir uns daher mit Schutzmaßnahmen auf allen Ebenen: von den technischen Grundlagen über Angriffserkennung bis hin zur Sensibilisierung der Nutzer.


Aktuelle Forschungspartner

Publikationen

  • 1.
    Assaf, K., Mühle, A., Köhler, D., Meinel, C.: Prison Break: From Proprietary Data Sources to SSI Verifiable Credentials. International Conference on Advanced Information Networking and Applications. pp. 355–366. Springer (2023).
     
  • 2.
    Hoops, F., Mühle, A., Matthes, F., Meinel, C.: A Taxonomy of Decentralized Identifier Methods for Practitioners. 2023 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS). pp. 57–65. IEEE (2023).
     
  • 3.
    Mühle, A., Assaf, K., Köhler, D., Meinel, C.: Requirements of a Digital Education Credential System. 2023 IEEE Global Engineering Education Conference (EDUCON). pp. 1–10. IEEE (2023).
     
  • A Comprehensive Review of... - Download
    4.
    Majd, M., Najafi, P., Alhosseini, S.A., Cheng, F., Meinel, C.: A Comprehensive Review of Anomaly Detection in Web Logs. Proceedings of the 9th IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT’22). IEEE Press, Vancouver, Washington, USA (2022).
     
  • 5.
    Mühle, A., Grüner, A., Meinel, C.: Gotta Catch’em All! Improving P2P Network Crawling Strategies. 12th International Conference on Digital Forensics and Cybercrime. , Singpore, Singapore (2021).
     
  • 6.
    Mühle, A., Grüner, A., Meinel, C.: Characterising Proxy Usage in the Bitcoin Peer-to-Peer Network. 22nd International Conference on Distributed Computing and Networking (2021).
     
  • 7.
    Koehler, D., Klieme, E., Kreuseler, D., Cheng, F., Meinel, C.: Assessment of Remote Biometric Authentication Systems: Another Take on the Quest to Replace Passwords. Proceedings of 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP 2021). IEEE (2021).
     
  • 8.
    Ehrmann, L., Stolle, M., Klieme, E., Tietz, C., Meinel, C.: Detecting Interaction Activities While Walking Using Smartphone Sensors. In: Barolli, L., Woungang, I., and Enokido, T. (eds.) Advanced Information Networking and Applications. pp. 382–393. Springer (2021).
     
  • SIEMA: Bringing Advanced ... - Download
    9.
    Najafi, P., Cheng, F., Meinel, C.: SIEMA: Bringing Advanced Analytics to LegacySecurity Information and Event Management. International Conference on Security and Privacy in Communication Networks. Springer (2021).
     
  • 10.
    Schmidt, K., Mühle, A., Grüner, A., Meinel, C.: Clear the Fog: Towards a Taxonomy of Self-Sovereign Identity Ecosystem Members. 18th Annual International Conference on Privacy, Security and Trust (PST). , Auckland, New Zealand (2021).
     
  • Consuming Security: Evalu... - Download
    11.
    Koehler, D., Serth, S., Meinel, C.: Consuming Security: Evaluating Podcasts to Promote Online Learning Integrated with Everyday Life. Proceedings of the World Engineering Education Forum (2021).
     
  • 12.
    Klieme, E., Trenz, P., Paeschke, D., Tietz, C., Meinel, C.: DoorCollect: Towards a Smart Door Handle for User Identification based on a Data Collection System for unsupervised Long-Term Experiments. 2021 IEEE Symposium on Computers and Communications (ISCC). pp. 1–7 (2021).
     
  • NLP-based Entity Behavior... - Download
    13.
    Najafi, P., Koehler, D., Cheng, F., Meinel, C.: NLP-based Entity Behavior Analytics for Malware Detection. 2021 IEEE International Performance, Computing, and Communications Conference (IPCCC). pp. 1–5. IEEE (2021).
     
  • 14.
    Klieme, E., Wilke, J., van Dornick, N., Meinel, C.: FIDOnuous: A FIDO2/WebAuthn Extension to Support Continuous Web Authentication. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). pp. 1857–1867 (2020).
     
  • 15.
    Tietz, C., Klieme, E., Brabender, R., Lasarow, T., Rambold, L., Meinel, C.: Under Pressure: Pushing Down on Me - Touch Sensitive Door Handle to Identify Users at Room Entry. In: Samarati, P., di Vimercati, S.D.C., Obaidat, M.S., and Ben-Othman, J. (eds.) Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020. pp. 565–571. ScitePress (2020).
     
  • 16.
    Tietz, C., Klieme, E., Behrendt, L., Böning, P., Marschke, L., Meinel, C.: Verification of Keyboard Acoustics Authentication on Laptops and Smartphones Using WebRTC. 2019 3rd Cyber Security in Networking Conference (CSNet). pp. 130–137 (2019).
     
  • MalRank: A Measure of Mal... - Download
    17.
    Najafi, P., Mühle, A., Pünter, W., Cheng, F., Meinel, C.: MalRank: A Measure of Maliciousness in SIEM-based Knowledge Graphs. Proceedings of the 35th Annual Computer Security Applications Conference. pp. 417–429. ACM (2019).
     
  • 18.
    Mühle, A., Grüner, A., Gayvoronskaya, T., Meinel, C.: A survey on essential components of a self-sovereign identity. Computer Science Review. 30, 80–86 (2018).
     
  • 19.
    Klieme, E., Tietz, C., Meinel, C.: Beware of SMOMBIES: Verification of Users Based on Activities While Walking. 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). pp. 651–660 (2018).
     
  • Guilt-by-Association: Det... - Download
    20.
    Najafi, P., Sapegin, A., Cheng, F., Meinel, C.: Guilt-by-Association: Detecting Malicious Entities via Graph Mining. International Conference on Security and Privacy in Communication Systems. pp. 88–107. Springer (2017).
     
  • 21.
    Klieme, E., Engelbrecht, K.-P., Möller, S.: Poster: Towards Continuous Authentication Based on Mobile Messaging App Usage. Symposium on Usable Privacy and Security. (2014).