Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Christof Störmann is active.

Publication


Featured researches published by Christof Störmann.


critical information infrastructures security | 2009

Cyber-critical infrastructure protection using real-time payload-based anomaly detection

Patrick Düssel; Christian Gehl; Pavel Laskov; Jens-Uwe Dr. Bußer; Christof Störmann; Jan Kästner

With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical infrastructures are exposed to a multitude of serious threats that may give rise to severe damage for life and assets without the implementation of proper safeguards. Thus, we propose a method that is capable to reliably detect unknown, exploit-based attacks on cyber-critical infrastructures carried out over the network. We illustrate the effectiveness of the proposed method by conducting experiments on network traffic that can be found in modern industrial control systems. Moreover, we provide results of a throughput measuring which demonstrate the real-time capabilities of our system.


Integrated Computer-aided Engineering | 2011

Improving the accuracy of network intrusion detectors by input-dependent stacking

Clemens Otte; Christof Störmann

Network intrusion detectors analyze network traffic for detecting attacks in computer networks. Achieving a high detection accuracy and in particular a low number of false alarms is crucial for their practical use. In this paper a new stacking approach is suggested for improving the detection accuracy of anomaly and misuse detectors in network intrusion detection systems. Each detector gets a stacked module as a corrective element that is learned on training data. The stacked module shall raise the detector score in case of a true attack and lower the score in case of a normal connection. This is achieved by combining the detector score with context information (statistical features) about the respective connection, making it possible for example to learn in which context a certain detector is reliable and where it is not. The approach is empirically evaluated using real HTTP and FTP network traffic. The results show that the detectors enhanced by stacking typically are significantly better than the original detectors.


Parallel Computer Architectures: Theory, Hardware, Software, Applications | 1993

Methods for Exploitation of Fine-Grained Parallelism

Günter Böckle; Christof Störmann; Isolde Wildgruber

Fine-grained parallelism is offered by an increasing number of processors. This kind of parallelism increases performance for all kinds of applications, including general-purpose code; most promising is the combination with coarse-grained parallelism. Unlike coarse-grained parallelism it can be exploited by automatic parallelization. This paper presents program analysis and transformation methods for exploitation of fine-grained parallelism, based on global instruction scheduling.


Archive | 2010

Method for Detecting Anomalies in a Control Network

Jens-Uwe Busser; Jan Kästner; Michael Munzert; Christof Störmann


Archive | 2009

Method for recognising anomalies in a control network

Jens-Uwe Busser; Jan Kästner; Michael Munzert; Christof Störmann


Archive | 2007

Verfahren und Vorrichtung zur Erkennung von Spam over Internet Telephony-Nachrichten versendenden Teilnehmern, abgekürzt SPIT-Versender, in einem IP-Kommunikationsnetzwerk

Joachim Charzinski; Ralf Holynski; Norbert Huffschmid; Christof Störmann


Archive | 2013

Bearbeitung einer Datenmenge

Christof Störmann; Stefan Hagen Weber


Archive | 2011

Verfahren zum rechnergestützten Test eines technischen Systems

Jens-Uwe Dr. Bußer; Jan Kästner; Michael Munzert; Christof Störmann


Archive | 2010

Verfahren zur anomalie-erkennung in einem kontrollnetzwerk

Jens-Uwe Busser; Jan Kästner; Michael Munzert; Christof Störmann


Archive | 2007

Verfahren zum identifizieren von spit oder spam für voip

Joachim Charzinski; Christof Störmann; Volker Tresp; Stefan Hagen Weber; Kai Yu

Collaboration


Dive into the Christof Störmann's collaboration.

Researchain Logo
Decentralizing Knowledge