Skip to main content

Showing 1–25 of 25 results for author: Antón, S D

.
  1. On Explainability in AI-Solutions: A Cross-Domain Survey

    Authors: Simon Daniel Duque Anton, Daniel Schneider, Hans Dieter Schotten

    Abstract: Artificial Intelligence (AI) increasingly shows its potential to outperform predicate logic algorithms and human control alike. In automatically deriving a system model, AI algorithms learn relations in data that are not detectable for humans. This great strength, however, also makes use of AI methods dubious. The more complex a model, the more difficult it is for a human to understand the reasoni… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

    Journal ref: SAFECOMP 2022 Workshops (2022) 235-246

  2. The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities around the World

    Authors: Simon Daniel Duque Anton, Daniel Fraunholz, Daniel Krohmer, Daniel Reti, Daniel Schneider, Hans Dieter Schotten

    Abstract: Operational Technology (OT)-networks and -devices, i.e. all components used in industrial environments, were not designed with security in mind. Efficiency and ease of use were the most important design characteristics. However, due to the digitisation of industry, an increasing number of devices and industrial networks is opened up to public networks. This is beneficial for administration and org… ▽ More

    Submitted 27 November, 2021; originally announced November 2021.

    Comments: IEEE Internet of Things Journal, May 2021

  3. Knowledge Rocks:Adding Knowledge Assistance to Visualization Systems

    Authors: Anna-Pia Lohfink, Simon D. Duque Anton, Heike Leitte, Christoph Garth

    Abstract: We present Knowledge Rocks, an implementation strategy and guideline for augmenting visualization systems to knowledge-assisted visualization systems, as defined by the KAVA model. Visualization systems become more and more sophisticated. Hence, it is increasingly important to support users with an integrated knowledge base in making constructive choices and drawing the right conclusions. We suppo… ▽ More

    Submitted 8 November, 2021; v1 submitted 23 July, 2021; originally announced July 2021.

    Comments: IEEE Vis 2021

    Journal ref: IEEE Transactions on Visualization and Computer Graphics 2021

  4. arXiv:2104.03666  [pdf, other

    cs.CR cs.NI

    Secure (S)Hell: Introducing an SSH Deception Proxy Framework

    Authors: Daniel Reti, David Klaaßen, Simon Duque Anton, Hans Dieter Schotten

    Abstract: Deceiving an attacker in the network security domain is a well established approach, mainly achieved through deployment of honeypots consisting of open network ports with the sole purpose of raising an alert on a connection. With attackers becoming more careful to avoid honeypots, other decoy elements on real host systems continue to create uncertainty for attackers. This uncertainty makes an atta… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.

  5. arXiv:2012.08811  [pdf, other

    cs.CR

    Investigating the Ecosystem of Offensive Information Security Tools

    Authors: Simon D Duque Anton, Daniel Fraunholz, Daniel Schneider

    Abstract: The internet landscape is growing and at the same time becoming more heterogeneous. Services are performed via computers and networks, critical data is stored digitally. This enables freedom for the user, and flexibility for operators. Data is easier to manage and distribute. However, every device connected to a network is potentially susceptible to cyber attacks. Security solutions, such as antiv… ▽ More

    Submitted 16 December, 2020; originally announced December 2020.

    Comments: Six pages, one figure, this work is a preprint of a paper accepted at the 1st Workshop on Next Generation Networks and Applications (NGNA-2020)

  6. Creating it from SCRATCh: A Practical Approach for Enhancing the Security of IoT-Systems in a DevOps-enabled Software Development Environment

    Authors: Simon D Duque Anton, Daniel Fraunholz, Daniel Krohmer, Daniel Reti, Hans D Schotten, Franklin Selgert, Marcell Marosvölgyi, Morten Larsen, Krishna Sudhakar, Tobias Koch, Till Witt, Cédric Bassem

    Abstract: DevOps describes a method to reorganize the way different disciplines in software engineering work together to speed up software delivery. However, the introduction of DevOps-methods to organisations is a complex task. A successful introduction results in a set of structured process descriptions. Despite the structure, this process leaves margin for error: Especially security issues are addressed… ▽ More

    Submitted 28 October, 2020; originally announced October 2020.

    Comments: Post print of a paper presented at the 1st USDAI workshop and published in the SAFECOMP 2020 Workshop proceedings

  7. arXiv:2007.08813  [pdf, other

    cs.CR

    Intrusion Detection in Binary Process Data: Introducing the Hamming-distance to Matrix Profiles

    Authors: Simon D Duque Anton, Hans Dieter Schotten

    Abstract: The digitisation of industry provides a plethora of novel applications that increase flexibility and reduce setup and maintenance time as well as cost. Furthermore, novel use cases are created by the digitisation of industry, commonly known as Industry 4.0 or the Industrial Internet of Things, applications make use of communication and computation technology that is becoming available. This enable… ▽ More

    Submitted 17 July, 2020; originally announced July 2020.

  8. Security in Process: Visually Supported Triage Analysis in Industrial Process Data

    Authors: Anna-Pia Lohfink, Simon D. Duque Anton, Hans Dieter Schotten, Heike Leitte, Christoph Garth

    Abstract: Operation technology networks, i.e. hard- and software used for monitoring and controlling physical/industrial processes, have been considered immune to cyber attacks for a long time. A recent increase of attacks in these networks proves this assumption wrong. Several technical constraints lead to approaches to detect attacks on industrial processes using available sensor data. This setting differ… ▽ More

    Submitted 23 July, 2021; v1 submitted 10 December, 2019; originally announced December 2019.

    Comments: VizSec 2019 Best Paper Award

    Journal ref: IEEE Transactions on Visualization and Computer Graphics, 2020 volume 26, number 4, pages 1638-1649

  9. Discussing the Feasibility of Acoustic Sensors for Side Channel-aided Industrial Intrusion Detection: An Essay

    Authors: Simon D. Duque Anton, Anna Pia Lohfink, Hans Dieter Schotten

    Abstract: The fourth industrial revolution leads to an increased use of embedded computation and intercommunication in an industrial environment. While reducing cost and effort for set up, operation and maintenance, and increasing the time to operation or market respectively as well as the efficiency, this also increases the attack surface of enterprises. Industrial enterprises have become targets of cyber… ▽ More

    Submitted 9 September, 2019; originally announced September 2019.

  10. Security in Process: Detecting Attacks in Industrial Process Data

    Authors: Simon D. Duque Anton, Anna Pia Lohfink, Christoph Garth, Hans Dieter Schotten

    Abstract: Due to the fourth industrial revolution, industrial applications make use of the progress in communication and embedded devices. This allows industrial users to increase efficiency and manageability while reducing cost and effort. Furthermore, the fourth industrial revolution, creating the so-called Industry 4.0, opens a variety of novel use and business cases in the industrial environment. Howeve… ▽ More

    Submitted 9 September, 2019; originally announced September 2019.

  11. arXiv:1907.10374  [pdf, other

    cs.CR

    Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests

    Authors: Simon D. Duque Anton, Sapna Sinha, Hans Dieter Schotten

    Abstract: Attacks on industrial enterprises are increasing in number as well as in effect. Since the introduction of industrial control systems in the 1970's, industrial networks have been the target of malicious actors. More recently, the political and warfare-aspects of attacks on industrial and critical infrastructure are becoming more relevant. In contrast to classic home and office IT systems, industri… ▽ More

    Submitted 24 July, 2019; originally announced July 2019.

    Comments: This is a work accepted but not yet published at the 2019 27th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)

  12. Using Temporal and Topological Features for Intrusion Detection in Operational Networks

    Authors: Simon D. Duque Anton, Daniel Fraunholz, Hans Dieter Schotten

    Abstract: Until two decades ago, industrial networks were deemed secure due to physical separation from public networks. An abundance of successful attacks proved that assumption wrong. Intrusion detection solutions for industrial application need to meet certain requirements that differ from home- and office-environments, such as working without feedback to the process and compatibility with legacy systems… ▽ More

    Submitted 9 July, 2019; originally announced July 2019.

    Comments: Preprint of a work accepted but not published yet at the ARES 2019

  13. arXiv:1906.03064  [pdf, other

    cs.CY cs.IR

    Highly Scalable and Flexible Model for Effective Aggregation of Context-based Data in Generic IIoT Scenarios

    Authors: Simon Duque Anton, Daniel Fraunholz, Janis Zemitis, Frederic Pohl, Hans Dieter Schotten

    Abstract: Interconnectivity of production machines is a key feature of the Industrial Internet of Things (IIoT). This feature allows for many advantages in producing. Configuration and maintenance gets easier, as access to the given production unit is not necessarily coupled to physical presence. Customized production of goods is easily possible, reducing production times and increasing throughput. There ar… ▽ More

    Submitted 28 May, 2019; originally announced June 2019.

  14. arXiv:1905.12443  [pdf

    cs.CR

    Implementing SCADA Scenarios and Introducing Attacks to Obtain Training Data for Intrusion Detection Methods

    Authors: Simon Duque Antón, Michael Gundall, Daniel Fraunholz, Hans Dieter Schotten

    Abstract: There are hardly any data sets publicly available that can be used to evaluate intrusion detection algorithms. The biggest threat for industrial applications arises from state-sponsored and criminal groups. Often, formerly unknown exploits are employed by these attackers, so-called 0-day exploits. They cannot be discovered with signature-based intrusion detection. Thus, statistical or machine lear… ▽ More

    Submitted 28 May, 2019; originally announced May 2019.

  15. Putting Things in Context: Securing Industrial Authentication with Context Information

    Authors: Simon Duque Anton, Daniel Fraunholz, Christoph Lipps, Khurshid Alam, Hans Dieter Schotten

    Abstract: The development in the area of wireless communication, mobile and embedded computing leads to significant changes in the application of devices. Over the last years, embedded devices were brought into the consumer area creating the Internet of Things. Furthermore, industrial applications increasingly rely on communication through trust boundaries. Networking is cheap and easily applicable while pr… ▽ More

    Submitted 29 May, 2019; originally announced May 2019.

    Comments: This is the preprint of a work published in the Intl. Journal on Cyber Situational Awareness (IJCSA)

  16. Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set

    Authors: Simon Duque Anton, Suneetha Kanoor, Daniel Fraunholz, Hans Dieter Schotten

    Abstract: In the context of the Industrial Internet of Things, communication technology, originally used in home and office environments, is introduced into industrial applications. Commercial off-the-shelf products, as well as unified and well-established communication protocols make this technology easy to integrate and use. Furthermore, productivity is increased in comparison to classic industrial contro… ▽ More

    Submitted 28 May, 2019; originally announced May 2019.

    Comments: This is a preprint of a work published in the Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018)

  17. The Dos and Don'ts of Industrial Network Simulation: A Field Report

    Authors: Simon Duque Anton, Daniel Fraunholz, Dennis Krummacker, Christoph Fischer, Michael Karrenbauer, Hans Dieter Schotten

    Abstract: Advances in industrial control lead to increasing incorporation of intercommunication technologies and embedded devices into the production environment. In addition to that, the rising complexity of automation tasks creates demand for extensive solutions. Standardised protocols and commercial off the shelf devices aid in providing these solutions. Still, setting up industrial communication network… ▽ More

    Submitted 28 May, 2019; originally announced May 2019.

    Comments: This is a preprint of a work published in the Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control (ISCSIC 2018)

  18. A Question of Context: Enhancing Intrusion Detection by Providing Context Information

    Authors: Simon Duque Anton, Daniel Fraunholz, Stephan Teuber, Hans Dieter Schotten

    Abstract: Due to the fourth industrial revolution, and the resulting increase in interconnectivity, industrial networks are more and more opened to publicly available networks. Apart from the huge benefit in manageability and flexibility, the openness also results in a larger attack surface for malicious adversaries. In comparison to office environments, industrial networks have very high volumes of data. I… ▽ More

    Submitted 28 May, 2019; originally announced May 2019.

    Comments: This is a preprint of a work published at the 2017 Internet of Things Business Models, Users, and Networks

  19. arXiv:1905.11701  [pdf

    cs.CR

    Putting Together the Pieces: A Concept for Holistic Industrial Intrusion Detection

    Authors: Simon D. Duque Antón, Hans Dieter Schotten

    Abstract: Besides the advantages derived from the ever present communication properties, it increases the attack surface of a network as well. As industrial protocols and systems were not designed with security in mind, spectacular attacks on industrial systems occurred over the last years. Most industrial communication protocols do not provide means to ensure authentication or encryption. This means attack… ▽ More

    Submitted 28 May, 2019; originally announced May 2019.

    Comments: This is the preprint of a work submitted to and accepted at the proceedings 2019 European Conference on Cyber Warfare and Security (ECCWS)

  20. arXiv:1905.10292  [pdf, other

    cs.CR cs.AI

    Devil in the Detail: Attack Scenarios in Industrial Applications

    Authors: Simon D. Duque Anton, Alexander Hafner, Hans Dieter Schotten

    Abstract: In the past years, industrial networks have become increasingly interconnected and opened to private or public networks. This leads to an increase in efficiency and manageability, but also increases the attack surface. Industrial networks often consist of legacy systems that have not been designed with security in mind. In the last decade, an increase in attacks on cyber-physical systems was obser… ▽ More

    Submitted 24 May, 2019; originally announced May 2019.

    Comments: Submitted and accepted at the 2019 IEEE Workshop on the Internet of Safe Things

  21. Two Decades of SCADA Exploitation: A Brief History

    Authors: Simon Duque Anton, Daniel Fraunholz, Christoph Lipps, Frederic Pohl, Marc Zimmermann, Hans D. Schotten

    Abstract: Since the early 1960, industrial process control has been applied by electric systems. In the mid 1970's, the term SCADA emerged, describing the automated control and data acquisition. Since most industrial and automation networks were physically isolated, security was not an issue. This changed, when in the early 2000's industrial networks were opened to the public internet. The reasons were mani… ▽ More

    Submitted 21 May, 2019; originally announced May 2019.

  22. arXiv:1905.05984  [pdf, other

    cs.CR cs.AI

    Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection

    Authors: Simon D. Duque Anton, Mathias Strufe, Hans Dieter Schotten

    Abstract: The concept of Industry 4.0 brings a disruption into the processing industry. It is characterised by a high degree of intercommunication, embedded computation, resulting in a decentralised and distributed handling of data. Additionally, cloud-storage and Software-as-a-Service (SaaS) approaches enhance a centralised storage and handling of data. This often takes place in third-party networks. Furth… ▽ More

    Submitted 16 May, 2019; v1 submitted 15 May, 2019; originally announced May 2019.

    Comments: PREPRINT, published in the proceedings of the 24th ITG Fachtagung Mobilkommunikation

  23. arXiv:1809.07500  [pdf, other

    cs.LG cs.CR stat.ML

    Time is of the Essence: Machine Learning-based Intrusion Detection in Industrial Time Series Data

    Authors: Simon Duque Anton, Lia Ahrens, Daniel Fraunholz, Hans Dieter Schotten

    Abstract: The Industrial Internet of Things drastically increases connectivity of devices in industrial applications. In addition to the benefits in efficiency, scalability and ease of use, this creates novel attack surfaces. Historically, industrial networks and protocols do not contain means of security, such as authentication and encryption, that are made necessary by this development. Thus, industrial I… ▽ More

    Submitted 20 September, 2018; originally announced September 2018.

    Comments: Extended version of a publication in the 2018 IEEE International Conference on Data Mining Workshops (ICDMW)

  24. arXiv:1804.06196  [pdf, other

    cs.CR

    Demystifying Deception Technology:A Survey

    Authors: Daniel Fraunholz, Simon Duque Anton, Christoph Lipps, Daniel Reti, Daniel Krohmer, Frederic Pohl, Matthias Tammen, Hans Dieter Schotten

    Abstract: Deception boosts security for systems and components by denial, deceit, misinformation, camouflage and obfuscation. In this work an extensive overview of the deception technology environment is presented. Taxonomies, theoretical backgrounds, psychological aspects as well as concepts, implementations, legal aspects and ethics are discussed and compared.

    Submitted 17 April, 2018; originally announced April 2018.

    Comments: 25 pages, 169 references

  25. arXiv:1709.09455  [pdf

    cs.NI cs.CR

    Angriffserkennung für industrielle Netzwerke innerhalb des Projektes IUNO

    Authors: Simon Duque Anton, Daniel Fraunholz, Hans Dieter Schotten

    Abstract: The increasing interconnectivity of industrial networks is one of the central current hot topics. It is adressed by research institutes, as well as industry. In order to perform the fourth industrial revolution, a full connectivity between production facilities is necessary. Due to this connectivity, however, an abundance of new attack vectors emerges. In the National Reference Project for Industr… ▽ More

    Submitted 21 November, 2017; v1 submitted 27 September, 2017; originally announced September 2017.

    Comments: Paper is written in German, presented on the 22. ITG Fachtagung Mobilkommunikation in Osnabrueck