About
10
Publications
2,255
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
168
Citations
Citations since 2017
Introduction
Publications
Publications (10)
Android is an open software platform for mobile devices with a large market
share in the smartphone sector. The openness of the system as well as its wide
adoption lead to an increasing amount of malware developed for this platform.
ANANAS is an expandable and modular framework for analyzing Android
applications. It takes care of common needs for d...
We present an algorithm for learning a statistical representation of web application communication. The algorithm estimates the average probability of every observed web request. If the estimated probability deviates from recent observations, the web request is classified as anomalous. With every classification result, the statistical model paramet...
Detecting malicious connection attempts and attacks against web-based applications is one of many approaches to protect the World Wide Web and its users. In this paper, we present a generic method for detecting anomalous and potentially malicious web requests from the network's point of view without prior knowledge or training data of the web-based...
In recent years, much research focused on entropy as a metric describing the “chaos” inherent to network traffic. In particular, network entropy time series turned out to be a scalable technique to detect unexpected behavior in network traffic.
In this paper, we propose an algorithm capable of detecting abrupt changes in network entropy time series...
Zusammenfassung Seit Dekaden wird bereits an Anomalieerkennung in Computernetzen geforscht. Maßgebliche Erfolge blieben bis heute allerdings
aus. Zwar werden regelmäßig Verfahren publiziert, die auf dem Papier viel versprechende Ergebnisse bringen, doch kaum eines
schafft es, auch in der Praxis Einsatz zu finden. Der Beitrag zeigt die Gründe dafür...
Despite extensive research effort, ordinary anomaly detection systems still suffer from serious drawbacks such as high false alarm rates due to the enormous variety of network traffic. Also, increasingly fast network speeds pose performance problems to systems which base upon deep packet inspection. In this paper, we address these problems by propo...
In vielen Bereichen unseres Lebens wird versucht, mit Hilfe von Frühwarnsystemen die Auswirkungen von katastrophalen Ereignissen
wie Erdbeben, Tsunamis oder Seuchen zu begrenzen oder gänzlich zu vermeiden. Möglichst frühe Kenntnis und die Kommunikation
dieses Wissens an potentiell Betroffene sind dafür kritische Erfolgsfaktoren. Das Konzept der IT-...