Research Area - Secure Smart Infrastructures (Overview)

Over the last years, the Internet has evolved to more and more areas of our daily lives, e.g., financia transactions are communicated via the Internet and a convergence of the classical fixed line telephone network with the Internet to Voice Over IP (VoIP) communication has taken place. Thus, our society has become more vulnerable from attacks on the availability of the Internet. Denial of Service (DoS) attacks are a severe threat and besides much more sophisticated and targeted attacks on companies and governmental institutions can be observed.
To make it worse, as a new trend at the moment, the interconnection of the Internet with cyber physical systems takes place. Such systems, e.g., the energy network (smart grid), transportation systems and large industrial facilities, are critical infrastructures with severe results in case of their failure. Thus, the Internet that interconnects these systems has evolved to a critical infrastructure itself. While a cyber attack on a web server may only lead to a disruption of an offered service for a certain time, a cyber attack on the smart grid in worst-case may even results in the loss of human lives.

Deriving from this scenario, the main research goal of the Secure Smart Infrastructures (SSI) group lies in maintaining the availability of critical infrastructures and services during cyber attacks. Resilience-enhancing techniques can be generally classified in proactive and reactive methods. Proactive techniques are redundancy and compartmentalization. Redundancy allows to tolerate attacks to a certain extent, while compartmentalization attempts to restrict the attack locally and preventing its expansion across the whole system. Both techniques are essential to enable a graceful degradation of the overall system in the presence of attacks. Reactive techniques follow a three step approach:

  • Detection: The detection of attacks requires a monitoring of the system and thus falls into
    the research area of intrusion and anomaly detection systems.
  • Mitigation: The impact of the attack has to be restricted and graceful degradation of the
    system has to be ensured.
  • Healing: The impact of the attack has to be healed and normal system operation has to be

Research Topics

  • Resilient Networks and Services
  • Resilience in Cyberphysical Systems, e.g., in Smart [Grid, City, Transport], and Industrial Facilities
  • Secure Group Communication
  • Intrusion Detection in Large Network Infrastructures
  • P2P Networks
  • Botnet Monitoring

Current Projects:

HosTaGe: Honeypot-To-Go

HosTaGe is a lightweight, low-interaction, portable, and generic honeypot for Android operating system devices that aim on the detection of malicious, wireless network environments. As most malware propagate over the network via specific protocols, a low-interaction honeypot located at a mobile device can check wireless networks for actively propagating malware.

TraCINg : TUD Cyber Incident Monitor

TraCINg stands for “TUD Cyber Incident moNitor” and as the name implies it is a centralized cyber incident monitor based (mostly) on honeypots. The primary goal of this project is to enhance security awareness of ordinary users by demonstrating how fast are malware propagating over the Internet. This is accompanied by human-friendly visualizations, replay capabilities, useful information and statistics.

Past Projects:

Twitterize: Anonymize Twitter

Twitterize is a user friendly solution for confidential and anonymous communication via Twitter. Find out more.

Open Positions

If you are interested to join as for a Bachelor, Diploma, or Master thesis, please check our open theses. Most of the time we are also looking for motivated student workers (HiWis).

News SSI


Best Paper Award in 2ND IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies

The paper "Towards the creation of synthetic, yet realistic, intrusion detection datasets" (written by Emmanouil Vasilomanolakis, Carlos Garcia Cordero, Nikolay Milanov and Max Mühlhäuser) from the SSI group of the... [more]

Category: Allgemeine News, Forschung, Preise und Auszeichnungen


2 papers accepted in IEEE/IFIP DISSECT

2 papers of the SSI group of the Telecooperation lab were accepted in IEEE/IFIP DISSECT. [more]

Category: Allgemeine News, Forschung


Article published in journal Elsevier ComCom

Our article "AnonPubSub: Anonymous publish-subscribe overlays" has been published in Elsevier ComCom. [more]

Category: Allgemeine News, Forschung


Telecooperation shows 5 posters as IEEE CNS 2015

The SSI group of the Telecooperation lab contributed 5 out of 40 posters at this years IEEE Conference on Communications and Network Security (CNS) in Florence: The posters... [more]

Category: Allgemeine News, Forschung


Full Paper Accepted At IEEE ICDCS 2015

Title "ZeusMilker: Circumventing The P2P Zeus Neighbor List Restriction Mechanism", authored by Shankar Karuppayah, Stefanie Roos, Christian Rossow, Max Mühlhäuser, and Mathias Fischer.  [more]

Category: Allgemeine News


HosTaGe goes live in Google Play

Our project titled 'HosTaGe' is now available in Google Play.   [more]


Full Paper Accepted IEEE ICC 2014

Title "On Advanced Monitoring in Resilient and Unstructured P2P Botnets", authored by Shankar Karuppayah, Mathias Fischer, Christian Rossow, and Max Mühlhäuser  [more]

Category: Allgemeine News

Displaying 1 to 7 of 9
<< First < Previous 1-7 8-9 Next > Last >>
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang