Skip to main content

Showing 1–12 of 12 results for author: Reti, D

.
  1. arXiv:2405.13670  [pdf, ps, other

    cs.SI cs.CR cs.LG

    GNN-based Anomaly Detection for Encoded Network Traffic

    Authors: Anasuya Chattopadhyay, Daniel Reti, Hans D. Schotten

    Abstract: The early research report explores the possibility of using Graph Neural Networks (GNNs) for anomaly detection in internet traffic data enriched with information. While recent studies have made significant progress in using GNNs for anomaly detection in finance, multivariate time-series, and biochemistry domains, there is limited research in the context of network flow data. In this report, we exp… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

  2. arXiv:2404.16118  [pdf, other

    cs.CR

    Act as a Honeytoken Generator! An Investigation into Honeytoken Generation with Large Language Models

    Authors: Daniel Reti, Norman Becker, Tillmann Angeli, Anasuya Chattopadhyay, Daniel Schneider, Sebastian Vollmer, Hans D. Schotten

    Abstract: With the increasing prevalence of security incidents, the adoption of deception-based defense strategies has become pivotal in cyber security. This work addresses the challenge of scalability in designing honeytokens, a key component of such defense mechanisms. The manual creation of honeytokens is a tedious task. Although automated generators exists, they often lack versatility, being specialized… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Comments: 12 pages

  3. Evaluating Deception and Moving Target Defense with Network Attack Simulation

    Authors: Daniel Reti, Karina Elzer, Daniel Fraunholz, Daniel Schneider, Hans-Dieter Schotten

    Abstract: In the field of network security, with the ongoing arms race between attackers, seeking new vulnerabilities to bypass defense mechanisms and defenders reinforcing their prevention, detection and response strategies, the novel concept of cyber deception has emerged. Starting from the well-known example of honeypots, many other deception strategies have been developed such as honeytokens and moving… ▽ More

    Submitted 25 January, 2023; originally announced January 2023.

  4. arXiv:2301.10502  [pdf, other

    cs.CR

    SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation

    Authors: Daniel Reti, Karina Elzer, Hans Dieter Schotten

    Abstract: Every attack begins with gathering information about the target. The entry point for network breaches are often vulnerabilities in internet facing websites, which often rely on an off-the-shelf Content Management System (CMS). Bot networks and human attackers alike rely on automated scanners to gather information about the CMS software installed and potential vulnerabilities. To increase the secur… ▽ More

    Submitted 25 January, 2023; originally announced January 2023.

    Comments: 8 pages, 1 figure, 2 tables, ICISSP 2023 https://icissp.scitevents.org/

  5. arXiv:2207.14400  [pdf, other

    math-ph math.CO

    Robustness of Excitations in the Random Dimer Model

    Authors: Daniel Reti

    Abstract: The ground state solution of the random dimer model is at a critical point after, which has been shown with random link excitations. In this paper we test the robustness of the random dimer model to the random link excitation by imposing the maximum weight excitation. We numerically compute the scaling exponents of the curves arising in the model as well as the fractal dimension. Although strong f… ▽ More

    Submitted 16 April, 2024; v1 submitted 26 July, 2022; originally announced July 2022.

    Comments: Submitted as MSc Thesis project at King's College London

  6. The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities around the World

    Authors: Simon Daniel Duque Anton, Daniel Fraunholz, Daniel Krohmer, Daniel Reti, Daniel Schneider, Hans Dieter Schotten

    Abstract: Operational Technology (OT)-networks and -devices, i.e. all components used in industrial environments, were not designed with security in mind. Efficiency and ease of use were the most important design characteristics. However, due to the digitisation of industry, an increasing number of devices and industrial networks is opened up to public networks. This is beneficial for administration and org… ▽ More

    Submitted 27 November, 2021; originally announced November 2021.

    Comments: IEEE Internet of Things Journal, May 2021

  7. arXiv:2104.03666  [pdf, other

    cs.CR cs.NI

    Secure (S)Hell: Introducing an SSH Deception Proxy Framework

    Authors: Daniel Reti, David Klaaßen, Simon Duque Anton, Hans Dieter Schotten

    Abstract: Deceiving an attacker in the network security domain is a well established approach, mainly achieved through deployment of honeypots consisting of open network ports with the sole purpose of raising an alert on a connection. With attackers becoming more careful to avoid honeypots, other decoy elements on real host systems continue to create uncertainty for attackers. This uncertainty makes an atta… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.

  8. arXiv:2104.03651  [pdf, other

    cs.CR cs.NI

    Escape the Fake: Introducing Simulated Container-Escapes for Honeypots

    Authors: Daniel Reti, Norman Becker

    Abstract: In the field of network security, the concept of honeypots is well established in research as well as in production. Honeypots are used to imitate a legitimate target on the network and to raise an alert on any interaction. This does not only help learning about a breach, but also allows researchers to study the techniques of an attacker. With the rise of cloud computing, container-based virtualiz… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.

    Journal ref: 2020 Workshop on Next Generation Networks and Applications (NGNA)

  9. Deep Down the Rabbit Hole: On References in Networks of Decoy Elements

    Authors: Daniel Reti, Daniel Fraunholz, Janis Zemitis, Daniel Schneider, Hans Dieter Schotten

    Abstract: Deception technology has proven to be a sound approach against threats to information systems. Aside from well-established honeypots, decoy elements, also known as honeytokens, are an excellent method to address various types of threats. Decoy elements are causing distraction and uncertainty to an attacker and help detecting malicious activity. Deception is meant to be complementing firewalls and… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.

    Journal ref: 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)

  10. arXiv:2011.07804  [pdf, other

    cs.NI

    Application of Virtualization Technologies in Novel Industrial Automation: Catalyst or Show-Stopper?

    Authors: Michael Gundall, Daniel Reti, Hans D. Schotten

    Abstract: Industry 4.0 describes an adaptive and changeable production, where its factory cells have to be reconfigured at very short intervals, e.g. after each workpiece. Furthermore, this scenario cannot be realized with traditional devices, such as programmable logic controllers. Here the use of well-proven technologies of the information technology are conquering the production hall (IT-OT convergence).… ▽ More

    Submitted 16 November, 2020; originally announced November 2020.

  11. Creating it from SCRATCh: A Practical Approach for Enhancing the Security of IoT-Systems in a DevOps-enabled Software Development Environment

    Authors: Simon D Duque Anton, Daniel Fraunholz, Daniel Krohmer, Daniel Reti, Hans D Schotten, Franklin Selgert, Marcell Marosvölgyi, Morten Larsen, Krishna Sudhakar, Tobias Koch, Till Witt, Cédric Bassem

    Abstract: DevOps describes a method to reorganize the way different disciplines in software engineering work together to speed up software delivery. However, the introduction of DevOps-methods to organisations is a complex task. A successful introduction results in a set of structured process descriptions. Despite the structure, this process leaves margin for error: Especially security issues are addressed… ▽ More

    Submitted 28 October, 2020; originally announced October 2020.

    Comments: Post print of a paper presented at the 1st USDAI workshop and published in the SAFECOMP 2020 Workshop proceedings

  12. arXiv:1804.06196  [pdf, other

    cs.CR

    Demystifying Deception Technology:A Survey

    Authors: Daniel Fraunholz, Simon Duque Anton, Christoph Lipps, Daniel Reti, Daniel Krohmer, Frederic Pohl, Matthias Tammen, Hans Dieter Schotten

    Abstract: Deception boosts security for systems and components by denial, deceit, misinformation, camouflage and obfuscation. In this work an extensive overview of the deception technology environment is presented. Taxonomies, theoretical backgrounds, psychological aspects as well as concepts, implementations, legal aspects and ethics are discussed and compared.

    Submitted 17 April, 2018; originally announced April 2018.

    Comments: 25 pages, 169 references