Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jessica Steinberger is active.

Publication


Featured researches published by Jessica Steinberger.


integrated network management | 2015

How to exchange security events? Overview and evaluation of formats and protocols

Jessica Steinberger; Anna Sperotto; Mario Golling; Harald Baier

Network-based attacks pose a strong threat to the Internet landscape. Recent approaches to mitigate and resolve these threats focus on cooperation of Internet service providers and their exchange of security event information. A major benefit of a cooperation is that it might counteract a network-based attack at its root and provides the possibility to inform other cooperative partners about the occurrence of anomalous events as a proactive service. In this paper we provide a structured overview of existing exchange formats and protocols. We evaluate and compare the exchange formats and protocols in context of high-speed networks. In particular, we focus on flow data. In addition, we investigate the exchange of potentially sensitive data. For our overview, we review different exchange formats and protocols with respect to their use-case scenario, their interoperability with network flow-based data, their scalability in a high-speed network context and develop a classification.


2015 Ninth International Conference on IT Security Incident Management & IT Forensics | 2015

Towards Automated Incident Handling: How to Select an Appropriate Response against a Network-Based Attack?

Sven Ossenbühl; Jessica Steinberger; Harald Baier

The increasing amount of network-based attacks evolved to one of the top concerns responsible for network infrastructure and service outages. In order to counteract these threats, computer networks are monitored to detect malicious traffic and initiate suitable reactions. However, initiating a suitable reaction is a process of selecting an appropriate response related to the identified network-based attack. The process of selecting a response requires to take into account the economics of an reaction e.g., risks and benefits. The literature describes several response selection models, but they are not widely adopted. In addition, these models and their evaluation are often not reproducible due to closed testing data. In this paper, we introduce a new response selection model, called REASSESS, that allows to mitigate network-based attacks by incorporating an intuitive response selection process that evaluates negative and positive impacts associated with each countermeasure. We compare REASSESS with the response selection models of IE-IRS, ADEPTS, CS-IRS, and TVA and show that REASSESS is able to select the most appropriate response to an attack in consideration of the positive and negative impacts and thus reduces the effects caused by an network-based attack. Further, we show that REASSESS is aligned to the NIST incident life cycle. We expect REASSESS to help organizations to select the most appropriate response measure against a detected network-based attack, and hence contribute to mitigate them.


integrated network management | 2015

Collaborative attack mitigation and response: A survey

Jessica Steinberger; Anna Sperotto; Harald Baier; Aiko Pras

Over recent years, network-based attacks have become one of the top causes of network infrastructure and service outages. To counteract such attacks, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains unclear to what extent countermeasures are set up and which mitigation approaches are adopted by ISPs. The goal of this paper is to present the results of a survey that aims to gain insight into processes, structures and capabilities of ISPs to mitigate and respond to network-based attacks.


network operations and management symposium | 2016

Collaborative DDoS defense using flow-based security event information

Jessica Steinberger; Benjamin Kuhnert; Anna Sperotto; Harald Baier; Aiko Pras

Over recent years, network-based attacks evolved to the top concerns responsible for network infrastructure and service outages. To counteract such attacks, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). In addition, exchanging threat information among trusted partners is used to reduce the time needed to detect and respond to large-scale network-based attacks. However, exchanging threat information is currently done on an ad-hoc basis via email or telephone, and there is still no interoperable standard to exchange threat information among trusted partners. To facilitate the exchange of security event information in conjunction with widely adopted monitoring technologies, in particular network flows, we make use of the exchange format FLEX. The goal of this paper is to present a communication process that supports the dissemination of threat information based on FLEX in context of ISPs. We show that this communication process helps organizations to speed up their mitigation and response capabilities without the need to modify the current network infrastructure, and hence make it viable to use for network operators.


autonomous infrastructure management and security | 2016

In Whom Do We Trust - Sharing Security Events

Jessica Steinberger; Benjamin Kuhnert; Anna Sperotto; Harald Baier; Aiko Pras

Security event sharing is deemed of critical importance to counteract large-scale attacks at Internet service provider ISP networks as these attacks have become larger, more sophisticated and frequent. On the one hand, security event sharing is regarded to speed up organizations mitigation and response capabilities. On the other hand, it is currently done on an ad-hoc basis via email, member calls or in personal meetings only under the premise that participating partners are personally known to each other. As a consequence, mitigation and response actions are delayed and thus security events are not processed in time. One approach to reduce this delay and the time for manual processing is to disseminate security events among trusted partners. However, exchanging security events and semi-automatically deploying mitigation is currently not well established as a result of two shortcomings. First, the personal knowledge of each sharing partner to develop trust does not scale very well. Second, current exchange formats and protocols often are not able to use security mechanisms e.g., encryption and signature to ensure both confidentiality and integrity of the security event information and its remediation. The goal of this paper is to present a trust model that determines a trust and a knowledge level of a security event in order to deploy semi-automated remediations and facilitate the dissemination of security event information using the exchange format FLEX in the context of ISPs. We show that this trust model is scalable and helps to build a trust community in order to share information about threats and its remediation suggestions.


autonomous infrastructure management and security | 2013

Anomaly detection and mitigation at internet scale: a survey

Jessica Steinberger; Lisa Schehlmann; Sebastian Abt; Harald Baier


Archive | 2015

Exchanging security events of flow-based intrusion detection systems at internet scale

Jessica Steinberger; Anna Sperotto; Harald Baier; Aiko Pras


network operations and management symposium | 2018

DDoS defense using MTD and SDN

Jessica Steinberger; Benjamin Kuhnert; Christian Dietz; Lisa Ball; Anna Sperotto; Harald Baier; Aiko Pras; Gabi Dreo


autonomous infrastructure management and security | 2018

Botnet detection and prevention in anonymous networks

Katharina Kuhnert; Jessica Steinberger; Harald Baier


DSI Ph.D. Thesis Series | 2018

Distributed DDoS Defense - A collaborative Approach at Internet Scale

Jessica Steinberger

Collaboration


Dive into the Jessica Steinberger's collaboration.

Top Co-Authors

Avatar

Harald Baier

Darmstadt University of Applied Sciences

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Benjamin Kuhnert

Darmstadt University of Applied Sciences

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Katharina Kuhnert

Darmstadt University of Applied Sciences

View shared research outputs
Top Co-Authors

Avatar

Lisa Schehlmann

Darmstadt University of Applied Sciences

View shared research outputs
Researchain Logo
Decentralizing Knowledge