Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Matthias Vallentin is active.

Publication


Featured researches published by Matthias Vallentin.


recent advances in intrusion detection | 2007

The NIDS cluster: scalable, stateful network intrusion detection on commodity hardware

Matthias Vallentin; Robin Sommer; Jason Lee; Craig Leres; Vern Paxson; Brian Tierney

In this work we present a NIDS cluster as a scalable solution for realizing high-performance, stateful network intrusion detection on commodity hardware. The design addresses three challenges: (i) distributing traffic evenly across an extensible set of analysis nodes in a fashion that minimizes the communication required for coordination, (ii) adapting the NIDSs operation to support coordinating its low-level analysis rather than just aggregating alerts; and (iii) validating that the cluster produces sound results. Prototypes of our NIDS cluster now operate at the Lawrence Berkeley National Laboratory and the University of California at Berkeley. In both environments the clusters greatly enhance the power of the network security monitoring.


annual computer security applications conference | 2013

No attack necessary: the surprising dynamics of SSL trust relationships

Bernhard Amann; Robin Sommer; Matthias Vallentin; Seth Hall

Much of the Internets end-to-end security relies on the SSL/TLS protocol along with its underlying X.509 certificate infrastructure. However, the system remains quite brittle due to its liberal delegation of signing authority: a single compromised certification authority undermines trust globally. Several recent high-profile incidents have demonstrated this shortcoming convincingly. Over time, the security community has proposed a number of counter measures to increase the security of the certificate ecosystem; many of these efforts monitor for what they consider tell-tale signs of man-in-the-middle attacks. In this work we set out to understand to which degree benign changes to the certificate ecosystem share structural properties with attacks, based on a large-scale data set of more than 17 billion SSL sessions. We find that common intuition falls short in assessing the maliciousness of an unknown certificate, since their typical artifacts routinely occur in benign contexts as well. We also discuss what impact our observations have on proposals aiming to improve the security of the SSL ecosystem.


acm workshop on networked systems for developing regions | 2011

Computing security in the developing world: a case for multidisciplinary research

Yahel Ben-David; Shaddi Hasan; Joyojeet Pal; Matthias Vallentin; Saurabh Panjwani; Philipp Gutheim; Jay Chen; Eric A. Brewer

Technology users in the developing world face a varied and complex set of computer security concerns. These challenges are deeply tied to a range of contextual factors including poor infrastructure, non-traditional usage patterns, and different attitudes towards security, which make simply importing security solutions from industrialized nations inadequate. Recognizing this, we describe some of the specific security risks in developing regions and their relationships with technical, political, social, and economic factors. We present concrete examples of how these factors affect the security of individuals, groups, and key applications such as mobile banking. Our analysis highlights the urgency of the concerns that need attention and presents an important intellectual challenge for the research community.


internet measurement conference | 2014

HILTI: an Abstract Execution Environment for Deep, Stateful Network Traffic Analysis

Robin Sommer; Matthias Vallentin; Lorenzo De Carli; Vern Paxson

When developing networking systems such as firewalls, routers, and intrusion detection systems, one faces a striking gap between the ease with which one can often describe a desired analysis in high-level terms, and the tremendous amount of low-level implementation details that one must still grapple with to come to a robust solution. We present HILTI, a platform that bridges this divide by providing to application developers much of the low-level functionality, without tying it to a specific analysis structure. HILTI consists of two parts: (1) an abstract machine model that we tailor specifically to the networking domain, directly supporting the fields common abstractions and idioms in its instruction set; and (2) a compilation strategy for turning programs written for the abstract machine into optimized, natively executable code. We have developed a prototype of the HILTI compiler toolchain that fully implements the designs functionality, and ported exemplars of networking applications to the HILTI model to demonstrate the aptness of its abstractions. Our evaluation of HILTIs functionality and performance confirms its potential to become a powerful platform for future application development.


acm special interest group on data communication | 2015

Native actors: how to scale network forensics

Matthias Vallentin; Dominik Charousset; Thomas C. Schmidt; Vern Paxson; Matthias Wählisch

When an organization detects a security breach, it undertakes a forensic analysis to figure out what happened. This investigation involves inspecting a wide range of heterogeneous data sources spanning over a long period of time. The iterative nature of the analysis procedure requires an interactive experience with the data. However, the distributed processing paradigms we find in practice today fail to provide this requirement: the batch-oriented nature of MapReduce cannot deliver sub-second round-trip times, and distributed in-memory processing cannot store the terabytes of activity logs needed to inspect during an incident. We present the design and implementation of Visibility Across Space and Time (VAST), a distributed database to support interactive network forensics, and libcppa, its exceptionally scalable messaging core. The extended actor framework libcppa enables VAST to distribute lightweight tasks at negligible overhead. In our live demo, we showcase how VAST enables security analysts to grapple with the huge amounts of data often associated with incident investigations.


international world wide web conferences | 2013

Here's my cert, so trust me, maybe?: understanding TLS errors on the web

Devdatta Akhawe; Bernhard Amann; Matthias Vallentin; Robin Sommer


international conference on detection of intrusions and malware and vulnerability assessment | 2011

An assessment of overt malicious activity manifest in residential networks

Gregor Maier; Anja Feldmann; Vern Paxson; Robin Sommer; Matthias Vallentin


acm workshop on networked systems for developing regions | 2010

JaldiMAC: taking the distance further

Yahel Ben-David; Matthias Vallentin; Seth Fowler; Eric A. Brewer


networked systems design and implementation | 2016

VAST: a unified platform for interactive network forensics

Matthias Vallentin; Vern Paxson; Robin Sommer


TinyToCS | 2015

To Trust, or not to Trust, that is the Question: Structural Properties of X.509 Certificates.

Johanna Amann; Robin Sommer; Matthias Vallentin; Seth Hall

Collaboration


Dive into the Matthias Vallentin's collaboration.

Top Co-Authors

Avatar

Robin Sommer

International Computer Science Institute

View shared research outputs
Top Co-Authors

Avatar

Vern Paxson

University of California

View shared research outputs
Top Co-Authors

Avatar

Bernhard Amann

International Computer Science Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Eric A. Brewer

University of California

View shared research outputs
Top Co-Authors

Avatar

Seth Hall

International Computer Science Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Brian Tierney

Lawrence Berkeley National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Craig Leres

Lawrence Berkeley National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Gregor Maier

International Computer Science Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge