Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Christopher Krügel is active.

Publication


Featured researches published by Christopher Krügel.


acm symposium on applied computing | 2002

Service specific anomaly detection for network intrusion detection

Christopher Krügel; Thomas Toth; Engin Kirda

The constant increase of attacks against networks and their resources (as recently shown by the CodeRed worm) causes a necessity to protect these valuable assets. Firewalls are now a common installation to repel intrusion attempts in the first place. Intrusion detection systems (IDS), which try to detect malicious activities instead of preventing them, offer additional protection when the first defense perimeter has been penetrated. ID systems attempt to pin down attacks by comparing collected data to predefined signatures known to be malicious (signature based) or to a model of legal behavior (anomaly based).Anomaly based systems have the advantage of being able to detect previously unknown attacks but they suffer from the difficulty to build a solid model of acceptable behavior and the high number of alarms caused by unusual but authorized activities. We present an approach that utilizes application specific knowledge of the network services that should be protected. This information helps to extend current, simple network traffic models to form an application model that allows to detect malicious content hidden in single network packets. We describe the features of our proposed model and present experimental data that underlines the efficiency of our systems.


international conference on information security and cryptology | 2001

Decentralized Event Correlation for Intrusion Detection

Christopher Krügel; Thomas Toth; Clemens Kerer

Evidence of attacks against a network and its resources is often scattered over several hosts. Intrusion detection systems (IDS) which attempt to detect such attacks therefore have to collect and correlate information from different sources. We propose a completely decentralized approach to solve the task of event correlation and information fusing of data gathered from multiple points within the network.Our system models an intrusion as a pattern of events that can occur at different hosts and consists of collaborating sensors deployed at various locations throughout the protected network installation.We present a specification language to define intrusions as distributed patterns and a mechanism to specify their simple building blocks. The peer-to-peer algorithm to detect these patterns and its prototype implementation, called Quicksand, are described. Problems and their solutions involved in the management of such a system are discussed.


Lecture Notes in Computer Science | 2002

XGuide - A Practical Guide to XML-Based Web Engineering

Clemens Kerer; Engin Kirda; Christopher Krügel

Various approaches have been proposed in the field of Web engineering that attempt to exploit the advantages of XML/XSL technologies. Although a strict separation of presentation and content achieved through XML/XSL has many advantages, a considerable effort is involved in using these technologies to develop Web sites. The lack of experience in XML/XSL can be a major cause for the extra effort. In several XML/XSL-based Web projects, we felt the need for a methodology that systematically guides the developer in the field through the development process, while taking into account the limitations and strengths of XML. In this paper, we present XGuide, a practical guide for XML-based Web Engineering that focuses on parallel development. XGuide is a methodology for XML/XSL-based Web development that is tool-independent and hence, can be used with a broad range of development tools. We are currently using the XGuide approach in several Web projects.


Java-Informations-Tage | 1999

Jini — ein guter Geist für die Gebäudesystemtechnik

Wolfgang Kastner; Christopher Krügel; Heinrich Reiter

Die Anforderungen an die Elektroinstallation in Gebauden und Wohnhausern ist in den letzten Jahren dramatisch gestiegen. Da konventionelle Elektroinstallationen diesen Anspruchen nicht mehr ausreichend gerecht werden konnen, wird der Ruf nach modernen, busfahigen Varianten immer vehementer. Eine dieser Varianten ist der Europaische Installationsbus (EIB). Welche vielfaltigen neuen Moglichkeiten der Gebaudesystemtechnik und -automation offen stehen, wenn dieses Feldbussystem Jini-fahig gemacht wird (frei nach dem Motto: The Network is the Device!) und wie eine solche Integration funktionieren kann, soll dieser Artikel zeigen.


network and distributed system security symposium | 2007

Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis.

Philipp Vogt; Florian Nentwich; Nenad Jovanovic; Engin Kirda; Christopher Krügel; Giovanni Vigna


network and distributed system security symposium | 2008

Automatic network protocol analysis

Gilbert Wondracek; Paolo Milani Comparetti; Christopher Krügel; Engin Kirda


network and distributed system security symposium | 2006

Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks.

William K. Robertson; Giovanni Vigna; Christopher Krügel; Richard A. Kemmerer


Archive | 2001

Applying Mobile Agent Technology to Intrusion Detection

Christopher Krügel; Thomas Toth


network and distributed system security symposium | 2002

Distributed Pattern Detection for Intrusion Detection

Christopher Krügel; Thomas Toth


Archive | 2001

Flexible, Mobile Agent Based Intrusion Detection for Dynamic Networks

Christopher Krügel; Thomas Toth

Collaboration


Dive into the Christopher Krügel's collaboration.

Top Co-Authors

Avatar

Engin Kirda

Northeastern University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Giovanni Vigna

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Gilbert Wondracek

Vienna University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Florian Nentwich

Vienna University of Technology

View shared research outputs
Top Co-Authors

Avatar

Martin Szydlowski

Vienna University of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge