TY - JOUR A1 - Schuba, Marko A1 - Reichl, Peter A1 - Kesdogan, Dogan A1 - Junghärtchen, Klaus T1 - Simulative Performance Evaluation of the Temporary Pseudonym Method for Protecting Location Information in GSM Networks / Reichl, P. ; Kesdogan, D. ; Junghärtchen, K. ; Schuba, M. JF - Computer Performance Evaluation - Modelling Techniques and Tools / Puigjaner, Ramon (eds.) Y1 - 1998 SN - 3-540-64949-2 N1 - Lecture notes in computer science ; 1469 SP - 105 EP - 116 PB - Springer CY - Berlin ER - TY - JOUR A1 - Schuba, Marko A1 - Reichl, Peter A1 - Hoff, Simon T1 - How to Model Complex Periodic Traffic with TES / Reichl, Peter ; Schuba, Marko ; Hoff, Simon JF - Proc. of 13th United Kingdom Workshop on Performance Engineering, Edinburgh, UK, July 1997 Y1 - 1997 SP - 17/1 EP - 17/11 ER - TY - JOUR A1 - Schuba, Marko A1 - Reichl, Peter T1 - How to Place Connectionless Servers in ATM Networks / Schuba, Marko ; Reichl, Peter JF - Proc. of Fourth IFIP Workshop on Performance Modelling and Evaluation of ATM Networks Y1 - 1996 N1 - Fourth IFIP Workshop on Performance Modelling and Evaluation of ATM Networks, Ilkley, West Yorkshire, U.K., July 1996 SP - 09/1 EP - 09/10 ER - TY - JOUR A1 - Schuba, Marko A1 - Reichl, Peter T1 - On large-scale reliable multicast protocols / Schuba, M. ; Reichl, P. JF - 6th IEE Conference on Telecommunications Y1 - 1998 SN - 0-85296-700-4 N1 - Conf. Publ. No. 451 SP - 133 EP - 137 ER - TY - JOUR A1 - Schuba, Marko A1 - Reichl, Peter T1 - An Analysis of Retransmission Strategies for Reliable Multicast Protocols / Schuba, M. ; Reichl, P. JF - Performance of information and communication systems : IFIP TC 6,WG 6.3 Seventh International Conference on Performance of Information and Communication Systems (PICS '98), 25 - 28 May, Lund, Sweden / ed. by Ulf Körner ... Y1 - 1998 SN - 0-412-83730-7 SP - 1 EP - 12 PB - Chapman Hall CY - London ER - TY - BOOK A1 - Schuba, Marko A1 - Linnhoff-Popien, Claudia A1 - Reichl, Peter A1 - Schuba, Marko T1 - Systemprogrammierung : Skript zur Vorlesung an der RWTH Aachen / Otto Spaniol ... Y1 - 1996 SN - 3-86073-470-9 N1 - Aachener Beiträge zur Informatik ; 14 PB - Verl. der Augustinus-Buchh. CY - Aachen ER - TY - CHAP A1 - Schuba, Marko A1 - Höfken, Hans-Wilhelm A1 - Linzbach, Sophie T1 - An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants T2 - 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) N2 - Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed KW - Conpot KW - honeypot KW - honeynet KW - ICS KW - cybersecurity Y1 - 2022 SN - 978-1-6654-4231-2 SN - 978-1-6654-4232-9 U6 - http://dx.doi.org/10.1109/ICECET52533.2021.9698746 N1 - 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET). 09-10 December 2021. Cape Town, South Africa. PB - IEEE ER - TY - CHAP A1 - Schuba, Marko A1 - Höfken, Hans-Wilhelm T1 - Cybersicherheit in Produktion, Automotive und intelligenten Gebäuden T2 - IT-Sicherheit - Technologien und Best Practices für die Umsetzung im Unternehmen Y1 - 2022 SN - 978-3-446-47223-5 SN - 978-3-446-47347-8 U6 - http://dx.doi.org/10.3139/9783446473478.012 SP - 193 EP - 218 PB - Carl Hanser Verlag CY - München ER - TY - JOUR A1 - Schuba, Marko A1 - Höfken, Hans T1 - Backtrack5: Datensammlung und Reporterstellung für Pentester mit MagicTree / Höfken, Hans ; Schuba, Marko JF - Hakin9. 73 (2012), H. 3 Y1 - 2012 SN - 1733-7186 SP - 12 EP - 16 PB - - ER - TY - JOUR A1 - Schuba, Marko A1 - Höfken, H. A1 - Schaefer, T. T1 - Smartphone Forensik JF - Hakin9 : Practical Protection (2012) Y1 - 2012 SN - 1733-7186 SP - 10 EP - 20 PB - - ER -