TY - CHAP A1 - Schuba, Marko A1 - Höfken, Hans-Wilhelm A1 - Linzbach, Sophie T1 - An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants T2 - 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) N2 - Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed KW - Conpot KW - honeypot KW - honeynet KW - ICS KW - cybersecurity Y1 - 2022 SN - 978-1-6654-4231-2 SN - 978-1-6654-4232-9 U6 - https://doi.org/10.1109/ICECET52533.2021.9698746 N1 - 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET). 09-10 December 2021. Cape Town, South Africa. PB - IEEE ER - TY - CHAP A1 - Chajan, Eduard A1 - Schulte-Tigges, Joschua A1 - Reke, Michael A1 - Ferrein, Alexander A1 - Matheis, Dominik A1 - Walter, Thomas T1 - GPU based model-predictive path control for self-driving vehicles T2 - IEEE Intelligent Vehicles Symposium (IV) N2 - One central challenge for self-driving cars is a proper path-planning. Once a trajectory has been found, the next challenge is to accurately and safely follow the precalculated path. The model-predictive controller (MPC) is a common approach for the lateral control of autonomous vehicles. The MPC uses a vehicle dynamics model to predict the future states of the vehicle for a given prediction horizon. However, in order to achieve real-time path control, the computational load is usually large, which leads to short prediction horizons. To deal with the computational load, the control algorithm can be parallelized on the graphics processing unit (GPU). In contrast to the widely used stochastic methods, in this paper we propose a deterministic approach based on grid search. Our approach focuses on systematically discovering the search area with different levels of granularity. To achieve this, we split the optimization algorithm into multiple iterations. The best sequence of each iteration is then used as an initial solution to the next iteration. The granularity increases, resulting in smooth and predictable steering angle sequences. We present a novel GPU-based algorithm and show its accuracy and realtime abilities with a number of real-world experiments. KW - Heuristic algorithms KW - Computational modeling KW - model-predictive control KW - GPU KW - autonomous driving Y1 - 2021 SN - 978-1-7281-5394-0 U6 - https://doi.org/10.1109/IV48863.2021.9575619 N1 - 2021 IEEE Intelligent Vehicles Symposium (IV), July 11-17, 2021. Nagoya, Japan SP - 1243 EP - 1248 PB - IEEE CY - New York, NY ER - TY - CHAP A1 - Schwanke, Peter A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Security Analysis of the ADS Protocol of a Beckhoff CX2020 PLC N2 - ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER - TY - CHAP A1 - Stöbe, Rolf A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko A1 - Breuer, Michael T1 - Artificial ageing of mobile devices using a simulated GSM/GPRS network T2 - Eighth International Conference on Availability, Reliability and Security (ARES) : 2-6 Sept. 2013, Regensburg Y1 - 2013 SP - 493 EP - 497 PB - IEEE ER - TY - CHAP A1 - Reke, Michael A1 - Peter, Daniel A1 - Schulte-Tigges, Joschua A1 - Schiffer, Stefan A1 - Ferrein, Alexander A1 - Walter, Thomas A1 - Matheis, Dominik T1 - A Self-Driving Car Architecture in ROS2 T2 - 2020 International SAUPEC/RobMech/PRASA Conference, Cape Town, South Africa N2 - In this paper we report on an architecture for a self-driving car that is based on ROS2. Self-driving cars have to take decisions based on their sensory input in real-time, providing high reliability with a strong demand in functional safety. In principle, self-driving cars are robots. However, typical robot software, in general, and the previous version of the Robot Operating System (ROS), in particular, does not always meet these requirements. With the successor ROS2 the situation has changed and it might be considered as a solution for automated and autonomous driving. Existing robotic software based on ROS was not ready for safety critical applications like self-driving cars. We propose an architecture for using ROS2 for a self-driving car that enables safe and reliable real-time behaviour, but keeping the advantages of ROS such as a distributed architecture and standardised message types. First experiments with an automated real passenger car at lower and higher speed-levels show that our approach seems feasible for autonomous driving under the necessary real-time conditions. Y1 - 2020 SN - 978-1-7281-4162-6 U6 - https://doi.org/10.1109/SAUPEC/RobMech/PRASA48453.2020.9041020 N1 - 2020 International SAUPEC/RobMech/PRASA Conference, 29-31 Jan. 2020, Cape Town, South Africa SP - 1 EP - 6 PB - IEEE CY - New York, NY ER - TY - CHAP A1 - Schnell, Michael A1 - Brandes, Sinja A1 - Gligorevic, Snjezana A1 - Walter, Michael A1 - Rihacek, Christoph A1 - Sajatovic, Miodrag A1 - Haindl, Bernhard T1 - Interference mitigation for broadband L-DACS T2 - 27th IEEE/AIAA Digital Avionics Systems Conference : DASC 2008 : 26-30 Oct. 2008, St. Paul, Minn. Y1 - 2008 SN - 978-1-4244-2207-4 ; 978-1-4244-2208-1 SP - 2B2-1 EP - 2B2-12 ER - TY - CHAP A1 - Lindenlauf, Simon A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Cold Boot Attacks on DDR2 and DDR3 SDRAM T2 - 10th International Conference on Availability, Reliability and Security (ARES) 2015 Y1 - 2015 U6 - https://doi.org/10.1109/ARES.2015.28 SP - 287 EP - 292 ER - TY - CHAP A1 - Bonney, Gregor A1 - Höfken, Hans-Wilhelm A1 - Paffen, Benedikt A1 - Schuba, Marko T1 - ICS/SCADA Security - Analysis of a Beckhoff CX5020 PLC T2 - 1st International Conference on Information Systems Security and Privacy : ICISSP 2015 Y1 - 2015 SP - 1 EP - 6 ER - TY - CHAP A1 - Granat, Andreas A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Intrusion Detection of the ICS Protocol EtherCAT N2 - Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER - TY - CHAP A1 - Gligorevic, Snjezana A1 - Jost, T. A1 - Walter, Michael T1 - Scatterer based airport surface channel model T2 - IEEE/AIAA 28th Digital Avionics Systems Conference : DASC '09 ; 23 - 29 [i.e. 25 - 29] Oct. 2009, Orlando, Fla. Y1 - 2009 SN - 978-1-4244-4078-8 SP - 4C2-1 EP - 4C2-10 ER - TY - CHAP A1 - Braun, Sebastian A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko A1 - Breuer, Michael T1 - Forensische Sicherung von DSLRoutern T2 - Proceedings of D-A-CH Security 2015. St. Augustin 8. und 9. September 2015 Y1 - 2015 ER - TY - CHAP A1 - Schiffer, Stefan A1 - Ferrein, Alexander A1 - Lakemeyer, Gerhard T1 - Fuzzy representations and control for domestic service robots in Golog T2 - Intelligent robotics and applications : 4th International conference, ICIRA 2011, Aachen, Germany, December 6-8, 2011, proceedings, part I. (Lecture notes in computer science ; 7102) N2 - In the RoboCup@Home domestic service robot competition, complex tasks such as "get the cup from the kitchen and bring it to the living room" or "find me this and that object in the apartment" have to be accomplished. At these competitions the robots may only be instructed by natural language. As humans use qualitative concepts such as "near" or "far", the robot needs to cope with them, too. For our domestic robot, we use the robot programming and plan language Readylog, our variant of Golog. In previous work we extended the action language Golog, which was developed for the high-level control of agents and robots, with fuzzy concepts and showed how to embed fuzzy controllers in Golog. In this paper, we demonstrate how these notions can be fruitfully applied to two domestic service robotic scenarios. In the first application, we demonstrate how qualitative fluents based on a fuzzy set semantics can be deployed. In the second program, we show an example of a fuzzy controller for a follow-a-person task. Y1 - 2011 SN - 978-3-642-25486-4 U6 - https://doi.org/10.1007/978-3-642-25489-5_24 SP - 241 EP - 250 PB - ACM CY - New York ER - TY - CHAP A1 - Logen, Steffen A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Simplifying RAM Forensics : A GUI and Extensions for the Volatility Framework T2 - 2012 Seventh International Conference on Availability, Reliability and Security (ARES), 20-24 August 2012, Prague, Czech Republic N2 - The Volatility Framework is a collection of tools for the analysis of computer RAM. The framework offers a multitude of analysis options and is used by many investigators worldwide. Volatility currently comes with a command line interface only, which might be a hinderer for some investigators to use the tool. In this paper we present a GUI and extensions for the Volatility Framework, which on the one hand simplify the usage of the tool and on the other hand offer additional functionality like storage of results in a database, shortcuts for long Volatility Framework command sequences, and entirely new commands based on correlation of data stored in the database. Y1 - 2012 SN - 978-1-4673-2244-7 U6 - https://doi.org/10.1109/ARES.2012.12 SP - 620 EP - 624 PB - IEEE CY - New York ER - TY - CHAP A1 - Treuling, Clemens A1 - Czarnecki, Christian A1 - Wolf, Martin R. T1 - Projekt WiLMo – Wirtschaftsinformatik Lehr- und Lernmodule T2 - Angewandte Forschung in der Wirtschaftsinformatik 2023 : Tagungsband zur 36. AKWI-Jahrestagung N2 - Die potenziellen Auswirkungen der Digitalisierung auf die Lehre sind seit langem Gegenstand ausführlicher Diskussionen innerhalb der Wirtschaftsinformatik (WI) (z. B. in Auth et al. 2021, Barton et al. 2019, Klotz et al. 2019). Nicht zuletzt der in nahezu allen Wirtschaftszweigen bestehende Mangel an qualifizierten Fachkräften lenkt den Diskurs auf einen verbesserten Zugang zu Bildung und gleichen Bildungschancen. Aus dieser Vision heraus und dem Schub der Digitalisierung entstehen Bildungskonzepte wie Open Educational Resources (OER), die gesellschaftlichen Problemen, wie dem des Fachkräftemangels, entgegenwirken sollen. Im Rahmen dieses Kurzbeitrags wird das Projekt WiLMo - "Wirtschaftsinformatik Lehr- und Lernmodule" vorgestellt. WiLMo wird im Rahmen von OERContent.nrw unter Beteiligung von sechs Hochschulen entwickelt und gefördert. Alle Projektbeteiligten arbeiten gemeinsam daran, einheitliche digitale Lehr- und Lernmaterialien im OER-Format für die Kernmodule der Wirtschaftsinformatik zu entwickeln und in garantiert hoher Qualität zur Verfügung zu stellen. KW - Wirtschaftsinformatik KW - Open Educational Resources (OER) KW - WiLMo Y1 - 2023 N1 - 36. AKWI-Jahrestagung, 11.09.2023 bis 13.09.2023, ausgerichtet von der Technischen Hochschule Wildau SP - 161 EP - 169 ER - TY - CHAP A1 - Vladova, Gergana A1 - Ullrich, André A1 - Sultanow, Eldar A1 - Tobolla, Marinho A1 - Sebrak, Sebastian A1 - Czarnecki, Christian A1 - Brockmann, Carsten T1 - Visual analytics for knowledge management T2 - INFORMATIK 2023 - Designing Futures: Zukünfte gestalten N2 - The management of knowledge in organizations considers both established long-term processes and cooperation in agile project teams. Since knowledge can be both tacit and explicit, its transfer from the individual to the organizational knowledge base poses a challenge in organizations. This challenge increases when the fluctuation of knowledge carriers is exceptionally high. Especially in large projects in which external consultants are involved, there is a risk that critical, company-relevant knowledge generated in the project will leave the company with the external knowledge carrier and thus be lost. In this paper, we show the advantages of an early warning system for knowledge management to avoid this loss. In particular, the potential of visual analytics in the context of knowledge management systems is presented and discussed. We present a project for the development of a business-critical software system and discuss the first implementations and results. Y1 - 2023 SN - 978-3-88579-731-9 U6 - https://doi.org/10.18420/inf2023_187 SN - 1617-5468 N1 - INFORMATIK 2023, 26. - 29. September 2023, Berlin SP - 1851 EP - 1870 PB - GI - Gesellschaft für Informatik CY - Bonn ER - TY - CHAP A1 - Chircu, Alina A1 - Czarnecki, Christian A1 - Friedmann, Daniel A1 - Pomaskow, Johanna A1 - Sultanow, Eldar T1 - Towards a Digital Twin of Society T2 - Proceedings of the 56th Hawaii International Conference on System Sciences 2023 N2 - This paper describes the potential for developing a digital twin of society- a dynamic model that can be used to observe, analyze, and predict the evolution of various societal aspects. Such a digital twin can help governmental agencies and policy makers in interpreting trends, understanding challenges, and making decisions regarding investments or policies necessary to support societal development and ensure future prosperity. The paper reviews related work regarding the digital twin paradigm and its applications. The paper presents a motivating case study- an analysis of opportunities and challenges faced by the German federal employment agency, Bundesagentur f¨ur Arbeit (BA), proposes solutions using digital twins, and describes initial proofs of concept for such solutions. KW - Digital twin KW - Digital transformation KW - Prototype KW - Society KW - Stress testing Y1 - 2023 SN - 978-0-9981331-6-4 N1 - 56th Hawaii International Conference on System Sciences, HICSS 2023, Maui, Hawaii, USA, January 3-6, 2023 SP - 6748 EP - 6757 PB - University of Hawai'i CY - Honolulu ER - TY - CHAP A1 - Feuerriegel, Uwe A1 - Pook, Michael A1 - Wersch, Gregor A1 - Wittenhorst, Simon A1 - Becker, Jürgen A1 - Ecker, Markus A1 - Hoffmann, Ulrich A1 - Kunz, Ulrich T1 - Simulation von Wärmeübertragungsprozessen N2 - Mit freundlicher Genehmigung der Autoren und des Oldenbourg Industrieverlags https://www.oldenbourg-industrieverlag.de/de/9783835633223-33223 erschienen als Beitrag im Tagungsband zur AALE-Tagung 2012. 9. Fachkonferenz 4.-5. Mai 2012, Aachen, Fachhochschule. ISBN 9783835633223 S 5-1 S. 127-135 Es werden Ergebnisse unterschiedlicher Projekte aus dem Bereich der Simulation von Wärmeübertragungsprozessen mit Excel-VBA vorgestellt. - Thermische Behandlung hochviskoser Fruchtzubereitungen, verschiedene Projekte und Kooperationen mit der Zentis GmbH & Co. KG, Aachen (J. Becker, U. Feuerriegel, G. Wersch). - Untersuchung des dynamischen Verhaltens von dampfbeheizten Ethylen-Verdampfern. Projekt mit der TGE Gas Engineering GmbH, Bonn (M. Ecker, U. Feuerriegel, U. Hoffmann, S. Wittenhorst). - Dynamische Simulation des axialen Temperaturverlaufs von elektrisch beheizten Rohrreaktoren. Kooperation mit dem Institut für Chemische Verfahrenstechnik, TU Clausthal (U. Feuerriegel, U. Kunz, M. Pook, S. Wittenhorst). KW - Wärmeübertragung Y1 - 2012 ER - TY - CHAP A1 - Scholl, Ingrid A1 - Bartella, Alexander K. A1 - Moluluo, Cem A1 - Ertural, Berat A1 - Laing, Frederic A1 - Suder, Sebastian T1 - MedicVR : Acceleration and Enhancement Techniques for Direct Volume Rendering in Virtual Reality T2 - Bildverarbeitung für die Medizin 2019 : Algorithmen – Systeme – Anwendungen Y1 - 2019 SN - 978-3-658-25326-4 U6 - https://doi.org/10.1007/978-3-658-25326-4_32 SP - 152 EP - 157 PB - Springer Vieweg CY - Wiesbaden ER - TY - CHAP A1 - Broenner, Simon A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Streamlining extraction and analysis of android RAM images T2 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy - ICISSP N2 - The Android operating system powers the majority of the world’s mobile devices and has been becoming increasingly important in day-to-day digital forensics. Therefore, technicians and analysts are in need of reliable methods for extracting and analyzing memory images from live Android systems. This paper takes different existing, extraction methods and derives a universal, reproducible, reliably documented method for both extraction and analysis. In addition the VOLIX II front-end for the Volatility Framework is extended with additional functionality to make the analysis of Android memory images easier for technically non-adept users. Y1 - 2016 SN - 978-989-758-167-0 U6 - https://doi.org/10.5220/0005652802550264 SP - 255 EP - 264 PB - SciTePress CY - Setúbal ER - TY - CHAP A1 - Schütz, P. A1 - Breuer, M. A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Malware proof on mobile phone exhibits based on GSM/GPRS traces T2 - The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec 2013) : 04.03. - 06.03.2013, Kuala Lumpur, Malaysia Y1 - 2013 SN - 978-0-9853483-7-3 SP - 89 EP - 96 PB - The Society of Digital Information and Wireless Communication ER -