Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sven Dietrich is active.

Publication


Featured researches published by Sven Dietrich.


international conference on malicious and unwanted software | 2008

P2P as botnet command and control: A deeper insight

David Dittrich; Sven Dietrich

The research community is now focusing on the integration of peer-to-peer (P2P) concepts as incremental improvements to distributed malicious software networks (now generically referred to as botnets). While much research exists in the field of P2P in terms of protocols, scalability, and availability of content in P2P file sharing networks, less exists (until this last year) in terms of the shift in C&C from central C&C using clear-text protocols, such as IRC and HTTP, to distributed mechanisms for C&C where the botnet becomes the C&C, and is resilient to attempts to mitigate it. In this paper we review some of the recent work in understanding the newest botnets that employ P2P technology to increase their survivability, and to conceal the identities of their operators. We extend work done to date in explaining some of the features of the Nugache P2P botnet, and compare how current proposals for dealing with P2P botnets would or would not affect a pure-P2P botnet like Nugache. Our findings are based on a comprehensive 2-year study of this botnet.


annual computer security applications conference | 2010

Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts

Baris Coskun; Sven Dietrich; Nasir D. Memon

In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same network even before they exhibit any overtly malicious behavior. Detection is based on an analysis of connections made by the hosts in the network. It turns out that if bots select their peers randomly and independently (i.e. unstructured topology), any given pair of P2P bots in a network communicate with at least one mutual peer outside the network with a surprisingly high probability. This, along with the low probability of any other host communicating with this mutual peer, allows us to link local nodes within a P2P botnet together. We propose a simple method to identify potential members of an unstructured P2P botnet in a network starting from a known peer. We formulate the problem as a graph problem and mathematically analyze a solution using an iterative algorithm. The proposed scheme is simple and requires only flow records captured at network borders. We analyze the efficacy of the proposed scheme using real botnet data, including data obtained from both observing and crawling the Nugache botnet.


ieee symposium on security and privacy | 2011

Building an Active Computer Security Ethics Community

David Dittrich; Michael Bailey; Sven Dietrich

In spite of significant ethical challenges faced by researchers evaluating modern threats, the computer security field has yet to grow its own active ethics community to describe and evaluate the ethical implications of its work. Modern threats such as denial-of-service (DoS) attacks, worms, viruses, phishing, and botnets underscore the need for Internet security research in an increasingly networked and computationally reliant society. This research involves not only appropriate responses but also difficult issues of privacy and responsible disclosure of vulnerability information.


International Journal of Information Security | 2017

Detecting zero-day attacks using context-aware anomaly detection at the application-layer

Patrick Duessel; Christian Gehl; Ulrich Flegel; Sven Dietrich; Michael Meier

Anomaly detection allows for the identification of unknown and novel attacks in network traffic. However, current approaches for anomaly detection of network packet payloads are limited to the analysis of plain byte sequences. Experiments have shown that application-layer attacks become difficult to detect in the presence of attack obfuscation using payload customization. The ability to incorporate syntactic context into anomaly detection provides valuable information and increases detection accuracy. In this contribution, we address the issue of incorporating protocol context into payload-based anomaly detection. We present a new data representation, called


ieee symposium on security and privacy | 2017

Security Challenges and Opportunities of Software-Defined Networking

Marc Dacier; Hartmut König; Radoslaw Cwalinski; Frank Kargl; Sven Dietrich


financial cryptography | 2013

A Secure Submission System for Online Whistleblowing Platforms

Volker Roth; Benjamin Güldenring; Eleanor G. Rieffel; Sven Dietrich; Lars Ries

{c}_n


ieee symposium on security and privacy | 2018

Fingerprinting Cryptographic Protocols with Key Exchange Using an Entropy Measure

Shoufu Luo; Jeremy D. Seideman; Sven Dietrich


IEEE Computer | 2017

Cybersecurity and the Future

Sven Dietrich

cn-grams, that allows to integrate syntactic and sequential features of payloads in an unified feature space and provides the basis for context-aware detection of network intrusions. We conduct experiments on both text-based and binary application-layer protocols which demonstrate superior accuracy on the detection of various types of attacks over regular anomaly detection methods. Furthermore, we show how


financial cryptography | 2007

Erratum to: Financial Cryptography and Data Security

Sven Dietrich; Rachna Dhamija


Archive | 2004

Internet Denial of Service: Attack and Defense Mechanisms

Sven Dietrich; Peter Reiher; David Dittrich

{c}_n

Collaboration


Dive into the Sven Dietrich's collaboration.

Top Co-Authors

Avatar

David Dittrich

University of Washington

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Lenore D. Zuck

University of Illinois at Chicago

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

George Danezis

University College London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hartmut König

Brandenburg University of Technology

View shared research outputs
Top Co-Authors

Avatar

Marc Dacier

Qatar Computing Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge