Skip to main content

Showing 1–10 of 10 results for author: Reti, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.16118  [pdf, other

    cs.CR

    Act as a Honeytoken Generator! An Investigation into Honeytoken Generation with Large Language Models

    Authors: Daniel Reti, Norman Becker, Tillmann Angeli, Anasuya Chattopadhyay, Daniel Schneider, Sebastian Vollmer, Hans D. Schotten

    Abstract: With the increasing prevalence of security incidents, the adoption of deception-based defense strategies has become pivotal in cyber security. This work addresses the challenge of scalability in designing honeytokens, a key component of such defense mechanisms. The manual creation of honeytokens is a tedious task. Although automated generators exists, they often lack versatility, being specialized… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Comments: 12 pages

  2. Evaluating Deception and Moving Target Defense with Network Attack Simulation

    Authors: Daniel Reti, Karina Elzer, Daniel Fraunholz, Daniel Schneider, Hans-Dieter Schotten

    Abstract: In the field of network security, with the ongoing arms race between attackers, seeking new vulnerabilities to bypass defense mechanisms and defenders reinforcing their prevention, detection and response strategies, the novel concept of cyber deception has emerged. Starting from the well-known example of honeypots, many other deception strategies have been developed such as honeytokens and moving… ▽ More

    Submitted 25 January, 2023; originally announced January 2023.

  3. arXiv:2301.10502  [pdf, other

    cs.CR

    SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation

    Authors: Daniel Reti, Karina Elzer, Hans Dieter Schotten

    Abstract: Every attack begins with gathering information about the target. The entry point for network breaches are often vulnerabilities in internet facing websites, which often rely on an off-the-shelf Content Management System (CMS). Bot networks and human attackers alike rely on automated scanners to gather information about the CMS software installed and potential vulnerabilities. To increase the secur… ▽ More

    Submitted 25 January, 2023; originally announced January 2023.

    Comments: 8 pages, 1 figure, 2 tables, ICISSP 2023 https://icissp.scitevents.org/

  4. The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities around the World

    Authors: Simon Daniel Duque Anton, Daniel Fraunholz, Daniel Krohmer, Daniel Reti, Daniel Schneider, Hans Dieter Schotten

    Abstract: Operational Technology (OT)-networks and -devices, i.e. all components used in industrial environments, were not designed with security in mind. Efficiency and ease of use were the most important design characteristics. However, due to the digitisation of industry, an increasing number of devices and industrial networks is opened up to public networks. This is beneficial for administration and org… ▽ More

    Submitted 27 November, 2021; originally announced November 2021.

    Comments: IEEE Internet of Things Journal, May 2021

  5. arXiv:2104.03666  [pdf, other

    cs.CR cs.NI

    Secure (S)Hell: Introducing an SSH Deception Proxy Framework

    Authors: Daniel Reti, David Klaaßen, Simon Duque Anton, Hans Dieter Schotten

    Abstract: Deceiving an attacker in the network security domain is a well established approach, mainly achieved through deployment of honeypots consisting of open network ports with the sole purpose of raising an alert on a connection. With attackers becoming more careful to avoid honeypots, other decoy elements on real host systems continue to create uncertainty for attackers. This uncertainty makes an atta… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.

  6. arXiv:2104.03651  [pdf, other

    cs.CR cs.NI

    Escape the Fake: Introducing Simulated Container-Escapes for Honeypots

    Authors: Daniel Reti, Norman Becker

    Abstract: In the field of network security, the concept of honeypots is well established in research as well as in production. Honeypots are used to imitate a legitimate target on the network and to raise an alert on any interaction. This does not only help learning about a breach, but also allows researchers to study the techniques of an attacker. With the rise of cloud computing, container-based virtualiz… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.

    Journal ref: 2020 Workshop on Next Generation Networks and Applications (NGNA)

  7. Deep Down the Rabbit Hole: On References in Networks of Decoy Elements

    Authors: Daniel Reti, Daniel Fraunholz, Janis Zemitis, Daniel Schneider, Hans Dieter Schotten

    Abstract: Deception technology has proven to be a sound approach against threats to information systems. Aside from well-established honeypots, decoy elements, also known as honeytokens, are an excellent method to address various types of threats. Decoy elements are causing distraction and uncertainty to an attacker and help detecting malicious activity. Deception is meant to be complementing firewalls and… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.

    Journal ref: 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)

  8. arXiv:2011.07804  [pdf, other

    cs.NI

    Application of Virtualization Technologies in Novel Industrial Automation: Catalyst or Show-Stopper?

    Authors: Michael Gundall, Daniel Reti, Hans D. Schotten

    Abstract: Industry 4.0 describes an adaptive and changeable production, where its factory cells have to be reconfigured at very short intervals, e.g. after each workpiece. Furthermore, this scenario cannot be realized with traditional devices, such as programmable logic controllers. Here the use of well-proven technologies of the information technology are conquering the production hall (IT-OT convergence).… ▽ More

    Submitted 16 November, 2020; originally announced November 2020.

  9. Creating it from SCRATCh: A Practical Approach for Enhancing the Security of IoT-Systems in a DevOps-enabled Software Development Environment

    Authors: Simon D Duque Anton, Daniel Fraunholz, Daniel Krohmer, Daniel Reti, Hans D Schotten, Franklin Selgert, Marcell Marosvölgyi, Morten Larsen, Krishna Sudhakar, Tobias Koch, Till Witt, Cédric Bassem

    Abstract: DevOps describes a method to reorganize the way different disciplines in software engineering work together to speed up software delivery. However, the introduction of DevOps-methods to organisations is a complex task. A successful introduction results in a set of structured process descriptions. Despite the structure, this process leaves margin for error: Especially security issues are addressed… ▽ More

    Submitted 28 October, 2020; originally announced October 2020.

    Comments: Post print of a paper presented at the 1st USDAI workshop and published in the SAFECOMP 2020 Workshop proceedings

  10. arXiv:1804.06196  [pdf, other

    cs.CR

    Demystifying Deception Technology:A Survey

    Authors: Daniel Fraunholz, Simon Duque Anton, Christoph Lipps, Daniel Reti, Daniel Krohmer, Frederic Pohl, Matthias Tammen, Hans Dieter Schotten

    Abstract: Deception boosts security for systems and components by denial, deceit, misinformation, camouflage and obfuscation. In this work an extensive overview of the deception technology environment is presented. Taxonomies, theoretical backgrounds, psychological aspects as well as concepts, implementations, legal aspects and ethics are discussed and compared.

    Submitted 17 April, 2018; originally announced April 2018.

    Comments: 25 pages, 169 references