TF

T. Fiebig

8 records found

Certificate transparency (CT) is a system that publishes all issued certificates so that they can be audited and monitored by any party. This allows to detect mis­issued certificates quickly and catch the misbehaving certificate authorities. CT makes the certificate ecosystem mor ...
Security misconfigurations and neglected updates commonly lead to systems being vulnerable. Ranging from default passwords to unpatched software, many systems, such as websites or databases, are being compromised due to these pitfalls. Often stemming from human error, it is diffi ...

The Root Cause of Data Breaches

Investigating security misconfigurations as the root cause of data breaches

In the past decade, the world has experienced numerous severe and impactful data breaches, without indications of this development slowing down. Even worse, research has shown data breaches are still waiting to happen. The occurrence of a data breach has consequences for several ...
Since the start of the 21st century, the amount of captured data has been continuously increasing in this digital age. With almost 2.5 quintillion bytes of data being generated and captured every day (Liang et al., 2018), researchers and companies have a strong interest in explor ...

Enabling Data Marketplaces with Multi-Party Computation (MPC)

An Exploratory Study investigating the Implication of the Maturation of Multi-Party Computation (MPC) technology to the Architecture and the Threat Landscape of the Data Marketplaces

The emergence of the Data Marketplaces is the latest iteration in the phenomenon of data-driven transformation of the world. Data marketplaces have emerged as a new form of data-driven business models which enable trading of data between the data owners/providers and data consume ...
In this study, a analysis was performed to analyze why there are differences in port configuration between IPv4 and IPv6. For this, the current state of adoption and implantation processes of IPv6 were researched. Currently, 4,8% of all dual-stack hosts have a different configura ...

CAML-IDS

A framework for the correct assessment of machine learning-based intrusion detection systems

The Internet is a relatively new technology that the world has become immensely dependent on. It is a tool that makes it possible to simplify our lives and better our society. But as with many things, there are people who with to exploit this tool we have for their own malicious ...

The Network Predictors

Monitoring Network Measurements To Predict Corporate Performance Before It Is Public Knowledge

Network measurments are mostly used to studynetwork topology, performance and security. The thesis uses network measurements in relation to large Internet corporations like Salesforce, Netflix and Snapchat. The thesis attempts to verify whether it is possible to predict company p ...