Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Rainer Bye is active.

Publication


Featured researches published by Rainer Bye.


international conference on communications | 2009

Static Analysis of Executables for Collaborative Malware Detection on Android

Aubrey-Derrick Schmidt; Rainer Bye; Hans-Gunther Schmidt; Jan Hendrik Clausen; Osman Kiraz; Kamer Ali Yüksel; Seyit A. Camtepe; Sahin Albayrak

Smartphones are getting increasingly popular and several malwares appeared targeting these devices. General countermeasures to smartphone malwares are currently limited to signature-based antivirus scanners which efficiently detect known malwares, but they have serious shortcomings with new and unknown malwares creating a window of opportunity for attackers. As smartphones become host for sensitive data and applications, extended malware detection mechanisms are necessary complying with the corresponding resource constraints. The contribution of this paper is twofold. First, we perform static analysis on the executables to extract their function calls in Android environment using the command readelf. Function call lists are compared with malware executables for classifying them with PART, Prism and Nearest Neighbor Algorithms. Second, we present a collaborative malware detection approach to extend these results. Corresponding simulation results are presented.


Simulation | 2010

Application-level Simulation for Network Security

Stephan Schmidt; Rainer Bye; Joël Chinnow; Karsten Bsufka; Ahmet Camtepe; Sahin Albayrak

NeSSi (network security simulator) is a novel network simulation tool which incorporates a variety of features relevant to network security distinguishing it from general-purpose network simulators. Its capabilities such as profile-based automated attack generation, traffic analysis and support for detection algorithm plug-ins allow it to be used for security research and evaluation purposes. NeSSi has been successfully used for testing intrusion detection algorithms, conducting network security analysis and developing overlay security frameworks. NeSSi is built upon the agent framework JIAC, resulting in a distributed and extensible architecture. In this paper, we provide an overview of the NeSSi architecture as well as its distinguishing features and briefly demonstrate its application to current security research projects.


international conference on communications | 2007

A Cooperative AIS Framework for Intrusion Detection

Katja Luther; Rainer Bye; Tansu Alpcan; Achim Müller; Sahin Albayrak

We present a cooperative intrusion detection approach inspired by biological immune system principles and P2P communication techniques to develop a distributed anomaly detection scheme. We utilize dynamic collaboration between individual artificial immune system (AIS) agents to address the well-known false positive problem in anomaly detection. The AIS agents use a set of detectors obtained through negative selection during a training phase and exchange status information and detectors on a periodical and event-driven basis, respectively. This cooperation scheme follows peer-to-peer communication principles in order to avoid a single point of failure and increase the robustness of the system. We illustrate our approach by means of two specific example scenarios in a novel network security simulator.


simulation tools and techniques for communications networks and system | 2008

Application-level simulation for network security

Rainer Bye; Stephan Schmidt; Katja Luther; Sahin Albayrak

We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distinguishing it from general-purpose network simulators. Its capabilities such as profilebased automated attack generation, traffic analysis and interface support for the plug-in of detection algorithms allow it to be used for security research and evaluation purposes. NeSSi has been utilized for testing intrusion detection algorithms, conducting network security analysis, and developing distributed security frameworks at the application level. NeSSi is built upon the agent component-ware framework JIAC [5], resulting in a distributed and easy-to-extend architecture. In this paper, we provide an overview of the NeSSi architecture and briefly demonstrate its usage in three example security research projects. These projects comprise of evaluation of stand-alone detection unit performance, detection device deployment at central nodes in the network and comparison of different detection algorithms.


international conference on stabilization safety and security of distributed systems | 2007

Decentralized detector generation in cooperative intrusion detection systems

Rainer Bye; Katja Luther; Seyit A. Camtepe; Tansu Alpcan; Şahin Albayrak; Bülent Yener

We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay network. The AIS uses the negative selection algorithm for the selection of detectors (e.g., vectors of features such as CPU utilization, memory usage and network activity). For better detection performance, selection of all possible detectors for a node is desirable but it may not be feasible due to storage and computational overheads. Limiting the number of detectors on the other hand comes with the danger of missing attacks. We present a scheme for the controlled and decentralized division of detector sets where each IDS is assigned to a region of the feature space. We investigate the trade-off between scalability and robustness of detector sets. We address the problem of self-organization in CIDS so that each node generates a distinct set of the detectors to maximize the coverage of the feature space while pairs of nodes exchange their detector sets to provide a controlled level of redundancy. Our contribution is twofold. First, we use Symmetric Balanced Incomplete Block Design, Generalized Quadrangles and Ramanujan Expander Graph based deterministic techniques from combinatorial design theory and graph theory to decide how many and which detectors are exchanged between which pair of IDS nodes. Second, we use a classical epidemic model (SIR model) to show how properties from deterministic techniques can help us to reduce the attack spread rate.


simulation tools and techniques for communications, networks and system | 2010

Optimization and early-warning in DSL access networks based on simulation

Rainer Bye; Joël Chinnow; Jan Hendrik Clausen; Karsten Bsufka; Sahin Albayrak

Network providers operate large DSL-based access networks to offer customers Broadband Internet. These networks are observed and managed by Performance Management Systems (PMS), that capture the actual situation to support network administration. In this regard, the administrator can cope with incidents such as link failures or congestion. We present an application for optimization and forecast of traffic distributions in DSL networks as an addition to an existing PMS. This application makes heavy use of simulation. In this way, we give a description of traffic models based on real network performance data reflecting: (I) individual subscribers and (II) an aggregated model for multiple subscribers. Then, we introduce the overall simulation approach based on the Network Security Simulator NeSSi2. The evaluation takes place by a use case for simulation-based verification of applied optimization strategies and a use case for continuous forecast to predict upcoming link congestion.


School of Electrical Engineering & Computer Science; Information Security Institute; Science & Engineering Faculty | 2010

Collaborative intrusion detection framework : characteristics, adversarial opportunities and countermeasures

Rainer Bye; Seyit A. Camtepe; Sahin Albayrak


School of Electrical Engineering & Computer Science; Information Security Institute; Science & Engineering Faculty | 2007

Decentralized detector generation in cooperative intrusion detection system

Rainer Bye; Katja Luther; Seyit A. Camtepe; Tansu Alpcan; Sahin Albayrak; Bülent Yener


CollSec'10 Proceedings of the 2010 international conference on Collaborative methods for security and privacy | 2010

Collaborative intrusion detection framework: characteristics, adversarial opportunities and countermeasures

Rainer Bye; Seyit A. Camtepe; Sahin Albayrak


School of Electrical Engineering & Computer Science; Information Security Institute; Science & Engineering Faculty | 2008

Monitoring Android for Collaborative Anomaly Detection: A First Architectural Draft

Aubrey-Derrick Schmidt; Rainer Bye; Hans-Gunther Schmidt; Kamer Ali Yüksel; Osman Kiraz; Jan Hendrik Clausen; Karsten Raddatz; Seyit A. Camtepe; Sahin Albayrak

Collaboration


Dive into the Rainer Bye's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Seyit A. Camtepe

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Joël Chinnow

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Karsten Bsufka

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Katja Luther

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Stephan Schmidt

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Tansu Alpcan

University of Melbourne

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jan Hendrik Clausen

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Ahmet Camtepe

Technical University of Berlin

View shared research outputs
Researchain Logo
Decentralizing Knowledge