21 research outputs found

    Emerging research directions in computer science : contributions from the young informatics faculty in Karlsruhe

    Get PDF
    In order to build better human-friendly human-computer interfaces, such interfaces need to be enabled with capabilities to perceive the user, his location, identity, activities and in particular his interaction with others and the machine. Only with these perception capabilities can smart systems ( for example human-friendly robots or smart environments) become posssible. In my research I\u27m thus focusing on the development of novel techniques for the visual perception of humans and their activities, in order to facilitate perceptive multimodal interfaces, humanoid robots and smart environments. My work includes research on person tracking, person identication, recognition of pointing gestures, estimation of head orientation and focus of attention, as well as audio-visual scene and activity analysis. Application areas are humanfriendly humanoid robots, smart environments, content-based image and video analysis, as well as safety- and security-related applications. This article gives a brief overview of my ongoing research activities in these areas

    Semantic search and composition in unstructured peer-to-peer networks

    Get PDF
    This dissertation focuses on several research questions in the area of semantic search and composition in unstructured peer-to-peer (P2P) networks. Going beyond the state of the art, the proposed semantic-based search strategy S2P2P offers a novel path-suggestion based query routing mechanism, providing a reasonable tradeoff between search performance and network traffic overhead. In addition, the first semantic-based data replication scheme DSDR is proposed. It enables peers to use semantic information to select replica numbers and target peers to address predicted future demands. With DSDR, k-random search can achieve better precision and recall than it can with a near-optimal non-semantic replication strategy. Further, this thesis introduces a functional automatic semantic service composition method, SPSC. Distinctively, it enables peers to jointly compose complex workflows with high cumulative recall but low network traffic overhead, using heuristic-based bidirectional haining and service memorization mechanisms. Its query branching method helps to handle dead-ends in a pruned search space. SPSC is proved to be sound and a lower bound of is completeness is given. Finally, this thesis presents iRep3D for semantic-index based 3D scene selection in P2P search. Its efficient retrieval scales to answer hybrid queries involving conceptual, functional and geometric aspects. iRep3D outperforms previous representative efforts in terms of search precision and efficiency.Diese Dissertation bearbeitet Forschungsfragen zur semantischen Suche und Komposition in unstrukturierten Peer-to-Peer Netzen(P2P). Die semantische Suchstrategie S2P2P verwendet eine neuartige Methode zur Anfrageweiterleitung basierend auf Pfadvorschl盲gen, welche den Stand der Wissenschaft 眉bertrifft. Sie bietet angemessene Balance zwischen Suchleistung und Kommunikationsbelastung im Netzwerk. Au脽erdem wird das erste semantische System zur Datenreplikation genannt DSDR vorgestellt, welche semantische Informationen ber眉cksichtigt vorhergesagten zuk眉nftigen Bedarf optimal im P2P zu decken. Hierdurch erzielt k-random-Suche bessere Pr盲zision und Ausbeute als mit nahezu optimaler nicht-semantischer Replikation. SPSC, ein automatisches Verfahren zur funktional korrekten Komposition semantischer Dienste, erm枚glicht es Peers, gemeinsam komplexe Ablaufpl盲ne zu komponieren. Mechanismen zur heuristischen bidirektionalen Verkettung und R眉ckstellung von Diensten erm枚glichen hohe Ausbeute bei geringer Belastung des Netzes. Eine Methode zur Anfrageverzweigung vermeidet das Feststecken in Sackgassen im beschnittenen Suchraum. Beweise zur Korrektheit und unteren Schranke der Vollst盲ndigkeit von SPSC sind gegeben. iRep3D ist ein neuer semantischer Selektionsmechanismus f眉r 3D-Modelle in P2P. iRep3D beantwortet effizient hybride Anfragen unter Ber眉cksichtigung konzeptioneller, funktionaler und geometrischer Aspekte. Der Ansatz 眉bertrifft vorherige Arbeiten bez眉glich Pr盲zision und Effizienz

    Attacks against intrusion detection networks: evasion, reverse engineering and optimal countermeasures

    Get PDF
    Intrusion Detection Networks (IDNs) constitute a primary element in current cyberdefense systems. IDNs are composed of different nodes distributed among a network infrastructure, performing functions such as local detection --mostly by Intrusion Detection Systems (IDS) --, information sharing with other nodes in the IDN, and aggregation and correlation of data from different sources. Overall, they are able to detect distributed attacks taking place at large scale or in different parts of the network simultaneously. IDNs have become themselves target of advanced cyberattacks aimed at bypassing the security barrier they offer and thus gaining control of the protected system. In order to guarantee the security and privacy of the systems being protected and the IDN itself, it is required to design resilient architectures for IDNs capable of maintaining a minimum level of functionality even when certain IDN nodes are bypassed, compromised, or rendered unusable. Research in this field has traditionally focused on designing robust detection algorithms for IDS. However, almost no attention has been paid to analyzing the security of the overall IDN and designing robust architectures for them. This Thesis provides various contributions in the research of resilient IDNs grouped into two main blocks. The first two contributions analyze the security of current proposals for IDS nodes against specific attacks, while the third and fourth contributions provide mechanisms to design IDN architectures that remain resilient in the presence of adversaries. In the first contribution, we propose evasion and reverse engineering attacks to anomaly detectors that use classification algorithms at the core of the detection engine. These algorithms have been widely studied in the anomaly detection field, as they generally are claimed to be both effective and efficient. However, such anomaly detectors do not consider potential behaviors incurred by adversaries to decrease the effectiveness and efficiency of the detection process. We demonstrate that using well-known classification algorithms for intrusion detection is vulnerable to reverse engineering and evasion attacks, which makes these algorithms inappropriate for real systems. The second contribution discusses the security of randomization as a countermeasure to evasion attacks against anomaly detectors. Recent works have proposed the use of secret (random) information to hide the detection surface, thus making evasion harder for an adversary. We propose a reverse engineering attack using a query-response analysis showing that randomization does not provide such security. We demonstrate our attack on Anagram, a popular application-layer anomaly detector based on randomized n-gram analysis. We show how an adversary can _rst discover the secret information used by the detector by querying it with carefully constructed payloads and then use this information to evade the detector. The difficulties found to properly address the security of nodes in an IDN motivate our research to protect cyberdefense systems globally, assuming the possibility of attacks against some nodes and devising ways of allocating countermeasures optimally. In order to do so, it is essential to model both IDN nodes and adversarial capabilities. In the third contribution of this Thesis, we provide a conceptual model for IDNs viewed as a network of nodes whose connections and internal components determine the architecture and functionality of the global defense network. Such a model is based on the analysis and abstraction of a number of existing proposals for IDNs. Furthermore, we also develop an adversarial model for IDNs that builds on classical attack capabilities for communication networks and allow to specify complex attacks against IDN nodes. Finally, the fourth contribution of this Thesis presents DEFIDNET, a framework to assess the vulnerabilities of IDNs, the threats to which they are exposed, and optimal countermeasures to minimize risk considering possible economic and operational constraints. The framework uses the system and adversarial models developed earlier in this Thesis, together with a risk rating procedure that evaluates the propagation of attacks against particular nodes throughout the entire IDN and estimates the impacts of such actions according to different attack strategies. This assessment is then used to search for countermeasures that are both optimal in terms of involved cost and amount of mitigated risk. This is done using multi-objective optimization algorithms, thus offering the analyst sets of solutions that could be applied in different operational scenarios. -------------------------------------------------------------Las Redes de Detecci贸n de Intrusiones (IDNs, por sus siglas en ingl茅s) constituyen un elemento primordial de los actuales sistemas de ciberdefensa. Una IDN est谩 compuesta por diferentes nodos distribuidos a lo largo de una infraestructura de red que realizan funciones de detecci贸n de ataques --fundamentalmente a trav茅s de Sistemas de Detecci贸n de Intrusiones, o IDS--, intercambio de informaci贸n con otros nodos de la IDN, y agregaci贸n y correlaci贸n de eventos procedentes de distintas fuentes. En conjunto, una IDN es capaz de detectar ataques distribuidos y de gran escala que se manifiestan en diferentes partes de la red simult谩neamente. Las IDNs se han convertido en objeto de ataques avanzados cuyo fin es evadir las funciones de seguridad que ofrecen y ganar as铆 control sobre los sistemas protegidos. Con objeto de garantizar la seguridad y privacidad de la infraestructura de red y de la IDN, es necesario dise帽ar arquitecturas resilientes para IDNs que sean capaces de mantener un nivel m铆nimo de funcionalidad incluso cuando ciertos nodos son evadidos, comprometidos o inutilizados. La investigaci贸n en este campo se ha centrado tradicionalmente en el dise帽o de algoritmos de detecci贸n robustos para IDS. Sin embargo, la seguridad global de la IDN ha recibido considerablemente menos atenci贸n, lo que ha resultado en una carencia de principios de dise帽o para arquitecturas de IDN resilientes. Esta Tesis Doctoral proporciona varias contribuciones en la investigaci贸n de IDN resilientes. La investigaci贸n aqu铆 presentada se agrupa en dos grandes bloques. Por un lado, las dos primeras contribuciones proporcionan t茅cnicas de an谩lisis de la seguridad de nodos IDS contra ataques deliberados. Por otro lado, las contribuciones tres y cuatro presentan mecanismos de dise帽o de arquitecturas IDS robustas frente a adversarios. En la primera contribuci贸n se proponen ataques de evasi贸n e ingenier铆a inversa sobre detectores de anomal铆aas que utilizan algoritmos de clasificaci贸n en el motor de detecci贸n. Estos algoritmos han sido ampliamente estudiados en el campo de la detecci贸n de anomal铆as y son generalmente considerados efectivos y eficientes. A pesar de esto, los detectores de anomal铆as no consideran el papel que un adversario puede desempe帽ar si persigue activamente decrementar la efectividad o la eficiencia del proceso de detecci贸n. En esta Tesis se demuestra que el uso de algoritmos de clasificaci贸n simples para la detecci贸n de anomal铆as es, en general, vulnerable a ataques de ingenier铆a inversa y evasi贸n, lo que convierte a estos algoritmos en inapropiados para sistemas reales. La segunda contribuci贸n analiza la seguridad de la aleatorizaci贸n como contramedida frente a los ataques de evasi贸n contra detectores de anomal铆as. Esta contramedida ha sido propuesta recientemente como mecanismo de ocultaci贸n de la superficie de decisi贸n, lo que supuestamente dificulta la tarea del adversario. En esta Tesis se propone un ataque de ingenier铆a inversa basado en un an谩lisis consulta-respuesta que demuestra que, en general, la aleatorizaci贸n no proporciona un nivel de seguridad sustancialmente superior. El ataque se demuestra contra Anagram, un detector de anomal铆as muy popular basado en el an谩lisis de n-gramas que opera en la capa de aplicaci贸n. El ataque permite a un adversario descubrir la informaci贸n secreta utilizada durante la aleatorizaci贸n mediante la construcci贸n de paquetes cuidadosamente dise帽ados. Tras la finalizaci贸n de este proceso, el adversario se encuentra en disposici贸n de lanzar un ataque de evasi贸n. Los trabajos descritos anteriormente motivan la investigaci贸n de t茅cnicas que permitan proteger sistemas de ciberdefensa tales como una IDN incluso cuando la seguridad de algunos de sus nodos se ve comprometida, as铆 como soluciones para la asignaci贸n 贸ptima de contramedidas. Para ello, resulta esencial disponer de modelos tanto de los nodos de una IDN como de las capacidades del adversario. En la tercera contribuci贸n de esta Tesis se proporcionan modelos conceptuales para ambos elementos. El modelo de sistema permite representar una IDN como una red de nodos cuyas conexiones y componentes internos determinan la arquitectura y funcionalidad de la red global de defensa. Este modelo se basa en el an谩lisis y abstracci贸n de diferentes arquitecturas para IDNs propuestas en los 煤ltimos a帽os. Asimismo, se desarrolla un modelo de adversario para IDNs basado en las capacidades cl谩sicas de un atacante en redes de comunicaciones que permite especificar ataques complejos contra nodos de una IDN. Finalmente, la cuarta y 煤ltima contribuci贸n de esta Tesis Doctoral describe DEFIDNET, un marco que permite evaluar las vulnerabilidades de una IDN, las amenazas a las que est谩n expuestas y las contramedidas que permiten minimizar el riesgo de manera 贸ptima considerando restricciones de naturaleza econ贸mica u operacional. DEFIDNET se basa en los modelos de sistema y adversario desarrollados anteriormente en esta Tesis, junto con un procedimiento de evaluaci贸n de riesgos que permite calcular la propagaci贸n a lo largo de la IDN de ataques contra nodos individuales y estimar el impacto de acuerdo a diversas estrategias de ataque. El resultado del an谩lisis de riesgos es utilizado para determinar contramedidas 贸ptimas tanto en t茅rminos de coste involucrado como de cantidad de riesgo mitigado. Este proceso hace uso de algoritmos de optimizaci贸n multiobjetivo y ofrece al analista varios conjuntos de soluciones que podr铆an aplicarse en distintos escenarios operacionales.Programa en Ciencia y Tecnolog铆a Inform谩ticaPresidente: Andr茅s Mar铆n L贸pez; Vocal: Sevil Sen; Secretario: David Camacho Fern谩nde

    COIN@AAMAS2015

    Get PDF
    COIN@AAMAS2015 is the nineteenth edition of the series and the fourteen papers included in these proceedings demonstrate the vitality of the community and will provide the grounds for a solid workshop program and what we expect will be a most enjoyable and enriching debate.Peer reviewe
    corecore