Karsten Bsufka
Technical University of Berlin
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Karsten Bsufka.
Communications of The ACM | 2001
Stefan Fricke; Karsten Bsufka; Jan Keiser; Torge Schmidt; Ralf Sesseler; Sahin Albayrak
he telecommunications market is expanding rapidly and players in that market are facing increasingly stiff competition. The key to commercial success in the telecommunications market will be the provisioning of adequate services, the focus shifting from a purely technological one to one of convenience and usefulness. An important prerequisite is the effective management of basic telecommunications infrastructure supporting the rapid deployment of new services. These future services will determine the market shares to be gained. Not only must their time to market be reduced, but also other requirements need to be fulfilled, for example, dynamic service development and configuration. Due to a demand for permanent availability the motto to be followed is “information anywhere, anytime.” Service maintenance must not interfere with continuous service usage; future services must allow for personalization, meet security demands, and provide management functionality. Furthermore, asynchronous service usage has to be supported as well as demand-driven service combination and integration. Not the least, services must allow for access independent of specific technologies and terminal equipment. Next to the technical requirements, new business models must be developed reflecting the fact that various actors in new roles, for example, content provider or application service provider, will need to cooperate and coordinate in order to provide these future services. Companies will provide integrated solutions with their own and third-party services being bundled on their platforms. These platforms will realize required infrastructure functionality and enable various means of access by addressing influencing factors and developments of the future telecommunications market such as consumer devices (mobile phones, Internet phones, PDAs), networks (GPRS, UMTS), languages and software technologies (Java, Jini), consumer demands and trends like convenience of use, mobility, and ubiquitous computing. Each role participating in the future telecommunications world will have specific requirements to such service platforms. These demands differ in the extent of infrastructure being needed for service usage and provisioning, according to different necessities regarding aspects such as security, personalization, asynchronous usage, mobility, device-independency, and supporting tools.
Simulation | 2010
Stephan Schmidt; Rainer Bye; Joël Chinnow; Karsten Bsufka; Ahmet Camtepe; Sahin Albayrak
NeSSi (network security simulator) is a novel network simulation tool which incorporates a variety of features relevant to network security distinguishing it from general-purpose network simulators. Its capabilities such as profile-based automated attack generation, traffic analysis and support for detection algorithm plug-ins allow it to be used for security research and evaluation purposes. NeSSi has been successfully used for testing intrusion detection algorithms, conducting network security analysis and developing overlay security frameworks. NeSSi is built upon the agent framework JIAC, resulting in a distributed and extensible architecture. In this paper, we provide an overview of the NeSSi architecture as well as its distinguishing features and briefly demonstrate its application to current security research projects.
critical information infrastructures security | 2006
Karsten Bsufka; Olaf Kroll-Peters; Sahin Albayrak
In this paper we present an approach for an agent-based early warning system (A-EWS) for critical infrastructures. In our approach we combine existing security infrastructures, e.g. firewalls or intrusion detection systems, with new detection approaches to create a global view and to determine the current threat state.
intelligent agents | 1999
Karsten Bsufka; Stefan Holst; Torge Schmidt
Security issues are key factors for the deployment and acceptance of agent based systems in the telecommunication area. This fact is most obvious in electronic commerce applications, where security services have to be offered. These services are needed to ensure secure communication, fair exchange of goods and payment. Public key cryptography techniques are an often employed mechanism. Keys are distributed by using a certificate to store them and to provably associate them to a principal. This document deals with the design of an agent-based certificate authority (CA) and key distribution center (KDC).
simulation tools and techniques for communications, networks and system | 2010
Rainer Bye; Joël Chinnow; Jan Hendrik Clausen; Karsten Bsufka; Sahin Albayrak
Network providers operate large DSL-based access networks to offer customers Broadband Internet. These networks are observed and managed by Performance Management Systems (PMS), that capture the actual situation to support network administration. In this regard, the administrator can cope with incidents such as link failures or congestion. We present an application for optimization and forecast of traffic distributions in DSL networks as an addition to an existing PMS. This application makes heavy use of simulation. In this way, we give a description of traffic models based on real network performance data reflecting: (I) individual subscribers and (II) an aggregated model for multiple subscribers. Then, we introduce the overall simulation approach based on the Network Security Simulator NeSSi2. The evaluation takes place by a use case for simulation-based verification of applied optimization strategies and a use case for continuous forecast to predict upcoming link congestion.
International Workshop on Smart Grid Security | 2012
Joël Chinnow; Jakob Tonn; Karsten Bsufka; Thomas Konnerth; Sahin Albayrak
Fluctuating energy resources and security flaws in ICT used for power networks threaten the stability of the system. This requires an in-depth analysis of smart grid technologies which are used for balancing out supply and demand. We present a tool set that supports the analysis and evaluation of various smart grid scenarios with respect to their security relevance.
Praxis Der Informationsverarbeitung Und Kommunikation | 2012
Seyit A. Camtepe; Karsten Bsufka; Leonhard Hennig; Cihan Simsek; Sahin Albayrak
Due to increased complexity, scale, and functionality of information and telecommunication (IT) infrastructures, every day new exploits and vulnerabilities are discovered. These vulnerabilities are most of the time used by ma¬licious people to penetrate these IT infrastructures for mainly disrupting business or stealing intellectual pro¬perties. Current incidents prove that it is not sufficient anymore to perform manual security tests of the IT infra¬structure based on sporadic security audits. Instead net¬works should be continuously tested against possible attacks. In this paper we present current results and challenges towards realizing automated and scalable solutions to identify possible attack scenarios in an IT in¬frastructure. Namely, we define an extensible frame¬work which uses public vulnerability databases to identify pro¬bable multi-step attacks in an IT infrastructure, and pro¬vide recommendations in the form of patching strategies, topology changes, and configuration updates.
Archive | 2007
Robert Wetzker; Christian Scheel; Katja Luther; Audrey-Derrick Schmidt; Volker Eckert; Karsten Bsufka; Joël Chinnow; Marcus Lagemann
adaptive agents and multi agents systems | 2011
Dennis Grunewald; Marco Lützenberger; Joël Chinnow; Rainer Bye; Karsten Bsufka; Sahin Albayrak
innovative applications of artificial intelligence | 2010
Karsten Bsufka; Rainer Bye; Joël Chinnow; Stephan Schmidt; Leonid Batyuk