Laufende Studien- und Abschlussarbeiten

22 Einträge gefunden


Cyber attacks are becoming increasingly sophisticated and coordinated. Isolated intrusion detection systems can sometimes not detect coordinated attacks in time. Therefore, collaboration between intrusion detection systems in needed, in the form of alert exchange. However, beneficial collaboration between mutually untrusted peers (some may be controlled by attackers already) is a problem of its own. To address this problem, we have introduced TRIDEnT, a blockchain-based Collaborative Intrusion Detection System (CIDS).

This thesis involves continuing the development of TRIDEnT with theoretical and practical contributions. Prototypes will be built using Hyperledger Fabric and will be evaluated in simulated, as well as in real-world settings.

Aus aufgezeichneten Eventlogs aus IT-Systemen und Maschinen kann mittels Process Mining Discovery Algorithmen der tatsächliche IST-Ablauf visuell rekonstruiert werden. Hieraus lassen sich interessante Erkenntnisse gewinnen, z.B. wie sich die Durchlaufzeit bestimmter Aktivitäten verhält oder ob alle notwendigen Aktivitäten überhaupt ausgeführt werden. Durch die Zunahme an Komplexität von Geschäftsprozessen werden rekonstruierte Prozessmodelle immer unübersichtlicher und lassen sich somit nur schwer analysieren. Aktuelle Process Mining Tools zeigen alle Daten auf einmal an, sodass ein Analyst nur mit Schwierigkeiten die wichtigen Erkenntnisse extrahieren kann.

Checking certain business rules in process models (e.g. petri-nets, BPMN or flow graphs) is usually done using a model checker or an automata. Increasing models and the increasing amount of rules lead to long computation times. The Taint Flow Analysis operates on graphs to determine certain flows (source to sink). With a neat conversion of rules we can check business rules on flow graphs very efficiently. However, the current approach is limited.

The latest trend in computing world is the cloud computing which is Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. There are numbers of cloud providers that provide different services, e.g. Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), to users. Users need to select the most trustworthy service provider that they can totally rely upon to fulfil their demands. For this purpose, trust calculation plays an important role. Because the limited Web interfaces do not allow users to identify the trustworthiness of service providers like typical face-to-face interaction. Users can find the trustworthiness of a service provider in cloud reputation services, e.g. TaaS4Cloud.  The functionality of this web service can be enhanced by users’ ratings and recommendations to make it more user-centric. So that users can select the appropriate provider they need. In this case, trustworthiness of the users should also be considered to get more dependable recommendations. We can fulfil these requirements of users to select the most trustworthy providers by implementing a trust-oriented recommender system for cloud reputation services.


Trust in Collaborative Intrusion Detection


In Bearbeitung


Anomaly Detection in Business Processes Using LSTMs


In Bearbeitung


Cloudlet Coverage in Urban Spaces


In Bearbeitung

The new paradigm of edge computing has proposed Cloudlets to offload data and computations from mobile, resource-constrained devices. In the context of future smart city applications, Cloudlets can offer a unique opportunity to provide locally available, low-latency services. However, deploying new infrastructures to host cloudlets for their widespread coverage is costly. This thesis will explore how existing access points in an urban area can be leveraged for the deployment of Cloudlets on a city-wide scale.






Datenbanken und Verteilte Systeme
Embedded Sensing Systems
Graphisch-Interaktive Systeme
Information Systems
Knowledge Engineering
Knowledge Mining and Assessment
Peer-to-Peer Netzwerke
Security, Usability and Society
Ubiquitous Knowledge Processing
Zuverlässige Eingebettete Softwaresysteme


- ALW - Area Ambient Learning & Knowledge Work
- ALW: Algorithm Animation
- ALW: Digital Lecture Hall (DLH)
- ALW: Learning Strategies
- MDI - Area Model Driven Interaction
- NDS - Former Area Networks and Distributed Systems
- NDS: FormerProjects
- P2P - Area Peer-to-Peer Systems
- P2P: IPTV2.0
- P2P: Online social networks
- P2P: QuaP2P (jointly with SCS)
- SCS (Smart Civil Security)
- SE - Area Smart Environments
- SE: Mundo
- SE: MundoCore
- SE: Service Composition
- SE: Talking Assistant
- SI - Area Smart Interaction
- SI : Augur (finished)
- SPIN: Smart Protection in Infrastructures and Networks
- SSI - Area Secure Smart Infrastructures
- SST - Area Smart Security and Trust
- SST: Past Projects
- SUN - Smart Urban Networks
- TI - Area Tangible Interaction
- TI: Interactive Surfaces
- TNT - Area Talk and Touch Interaction
- TNT: Mundo Speech API
- TnT: UI Blind Meeting
Mobile Networking
Peer-to-Peer Networking
Secure Services
Secure Things
Security, Usability and Society
Ubiquitous Computing
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang