Contact Details

nameCarlos Garcia Cordero
positionPhD at GRK Privacy and Trust for mobile Users
email

garcia (AT) tk(DOT)tu-darmstadt(DOT)de

phone+49 (6151) 16 - 23205
fax+49 (6151) 16 - 23202
officeS2|02 A 316
postal addressTU Darmstadt - FB 20
FG Telekooperation
Hochschulstraße 10
D-64289 Darmstadt
Germany

Research Interests

  • Machine learning

    • Anomaly Detection
    • Bayesian Networks
    • Deep Learning

  • Network Intrusion Detection

    • Collaborative Intrusion Detection
    • Distributed Intrusion Detection

Short Biography

Carlos García Cordero is a scientist, systems engineer, mathematician, musician and thinker.

Carlos' research experience and interests are wide and cover diverse topics such as cybersecurity, artificial intelligence, programming languages, compilers, machine learning and computer graphics, among others. 

Carlos is currently studying a PhD in Cyber Security and Distributed Machine Learning at TU Darmstadt. He has an MSc in Artificial Intelligence from The University of Edinburgh and a BSc in Computer Systems Engineering from the ITESM CSF in Mexico, both achieved with the highest honours.

Publications

Probe-response attacks on collaborative intrusion detection systems: effectiveness and countermeasures

Author Emmanouil Vasilomanolakis, Michael Stahn, Carlos Garcia Cordero, Max Mühlhäuser
Date September 2015
Kind Inproceedings
PublisherIEEE
Book titleIEEE Conference on Communications and Network Security (CNS)
Pages699 - 700
LocationFlorence, Italy
ISBN978-1-4673-7876-5
DOI10.1109/CNS.2015.7346892
KeyTUD-CS-2015-1182
Research Areas CASED, Telecooperation, - SSI - Area Secure Smart Infrastructures, Secure Services
Abstract Over the last years the number of cyber-attacks has been constantly increasing. Since isolated Intrusion Detection Systems (IDSs) cannot cope with the number and sophistication of attacks, collaboration among the defenders is required. Collaborative IDSs (CIDSs) work by exchanging alert traffic to construct a holistic view of the monitored network. However, an adversary can utilize probe-response attacks to successfully detect CIDS's monitoring sensors. We discuss the practicability of such attacks, suggest improvements, and also propose novel techniques to reduce the effects of such attacks. Moreover, we present preliminary results in the applicability of the attacks and hints on performing such attacks in a well known CIDS.
Full paper (pdf)
[Export this entry to BibTeX]

Important Copyright Notice:

The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

Theses

1 Entries found


On the Analysis & Generation of Synthetic Attacks for Intrusion Detection Systems

Master Thesis

finished


Intrusion Detection Systems (IDS) have established themselves as a mandatory line of defense for critical infrastructure. One main aspect during the development of an IDS is the evaluation and optimization of the detection algorithms. Currently there is no standardized model for the evaluation of the detection efficiency. A common approach has been the use of static datasets, but the publicly available datasets have flaws in many regards, like their actuality and the absence of up-to-date attacks.This creates challenges in terms of the reproducibility and the comparison of results.


A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang