Aggregation von Schwachstellen auf Basis von CVSS

Alexander Beck | 10.12.2015 | 15:00 Uhr | HS 4

Kurzfassung

IT-Systeme sind stark zusammenhängende komplexe Strukturen, so dass eine Fokussierung auf das IT-System im Ganzen nur eine bedingt effiziente Sicherheitsbewertung gewährleistet. Die Sicherheit dieser komplexen Systemlandschaften stets aktualisiert unter Berücksichtigung aller Wechselbeziehungen zwischen Komponenten dieser Systemlandschaften darzustellen, gestaltet sich mangels geeigneter Modelle schwierig. Neben diesen Modellen bilden Schwachstellenbewertungen die Grundlage für die Bewertung der Sicherheit und werden durch aufwändige Betrachtungen interpretiert, um eine Gesamtbewertung zu ermitteln. Will man dieses Vorgehen automatisieren, muss zunächst eine gemeinsame Repräsentation von Schwachstellenbewertungen vereinbart werden. Das dazu geeignete Common Vulnerability Scoring System (CVSS) ermöglicht die Bewertung einzelner Schwachstellen hinsichtlich verschiedenster Fragestellungen. Um eine Darstellung der Gesamtsicherheit zu erreichen, müssen diese Schwachstellen aggregiert werden. Unter einer Aggregation ist dabei die gemeinsame Interpretation aller im Fokus stehenden Schwachstellen zur Erreichung einer Gesamtbewertung zu verstehen, welche auf Basis eines neuronalen Netzwerkes erfolgt. Das neuronale Netz ist ein lernfähiges Konzept der Informatik, mit dem es möglich ist auf Basis definierter Eingabeparameter ein definiertes Ergebnis zu modellieren. Dabei wird das Netz trainiert und die Ergebnisse mit Ergebnissen der bisherigen manuellen Bewertungsverfahren verglichen, bis eine entsprechende Qualität der automatisch ermittelten Ergebnisse gesichert ist.

Alexander Beck ist seit 2011 bei der Volkswagen AG tätig. Zuvor studierte er Informatik an Hochschule Harz und Otto-von-Guericke-Universität Magdeburg unter anderem mit den Schwerpunkten Datenintensive Systeme und Sicherheit. Im Rahmen seiner Dissertation erforscht er Verfahren zur automatisierten Sicherheitsbewertung von komplexen heterogenen IT-Infrastrukturen auf Basis neuronaler Netze.
Beruflich war er mehrere Jahre in der Informationssicherheit im Volkswagen Konzern tätig und beschäftigte sich mit den Themen Authentifizierung und Verschlüsselung. Aktuell arbeitet er im Bereich IT Projekt- und Programmmanagement der Volkwagen Financial Services AG und verantwortet IT Projekte im In- und Ausland.

Posted in TEWI-Kolloquium | Kommentare deaktiviert für Aggregation von Schwachstellen auf Basis von CVSS

Einladung zur Generalversammlung 2015

Der Förderverein Technische Fakultät an der Universität Klagenfurt lädt Sie hiermit herzlich zur Generalversammlung ein.

Wann: Freitag, 27. November 2015, 16:00 Uhr

Wo: Alpen-Adria Universität Klagenfurt, Raum E.2.69, Universitätsstrasse 65-67, 9020 Klagenfurt

Tagesordnung:

  1. Begrüßung
  2. Genehmigung der Tagesordnung
  3. Genehmigung des Protokolls der letzten Generalversammlung
  4. Bericht des Obmanns
  5. Bericht des Geschäftsführers
  6. Bericht der Rechnungsprüfer
  7. Wahl der Rechnungsprüfer
  8. Entlastung des Vorstands
  9. Budget 2016
  10. Allfälliges

Mit freundlichen Grüßen

Christian Inzko (Obmann)
Christian Timmerer (Geschäftsführer)

P.S.: Das Protokoll der vorjährigen Generalversammlung finden Sie hier.

Posted in Veranstaltungen | Kommentare deaktiviert für Einladung zur Generalversammlung 2015

Multimedia Data Analysis with Gradient-based Signatures

Dr. Christian Beecks | 24.11.2015 | 16:00 Uhr | E.2.42

Abstract

With the advent of social networks and the advancement of powerful internet-enabled mobile devices, millions of users are able to easily generate, process, and share multimedia data at billion-scale every single day. The resulting multitude and versatility of multimedia data made available in the Internet challenge todays’ data management and analysis algorithms. In many research and application areas including information retrieval, data mining, and computer vision, users are no longer satisfied with keyword-based access but want to search, browse, explore, and analyze multimedia data according to content-based characteristics. One fundamental operation underlying many data analysis algorithms is similarity search which aims at retrieving the most similar multimedia objects with respect to a query. In order to carry out similarity search for query-like multimedia objects, the way of modeling similarity is of major significance due to its impact on efficiency and effectiveness.

In this talk, I will present my ongoing research in this fascinating field and highlight future research directions. More specifically, I will show how to approach similarity between multimedia data objects by means of gradient-based signatures in order to facilitate data analysis with high efficiency and efficacy.

Beecks

 

Christian Beecks is a postdoctoral researcher in the data management and data exploration group at RWTH Aachen University, Germany. His research interests include efficient and adaptive multimedia data analysis, distance-based multimedia indexing and query processing, and real-time data management.

 

Posted in TEWI-Kolloquium | Kommentare deaktiviert für Multimedia Data Analysis with Gradient-based Signatures

Non stationary Continuous Time Bayesian Networks

Prof. Fabio Stella | 11.11.2015 | 10:00 Uhr | E.1.42

Abstract

Non stationary continuous time Bayesian networks are presented and described. They allow to model systems where conditional independence relationships are allowed to change over time at discrete points in time. They build on the main blocks of continuous time Bayesian networks and non stationary dynamic Bayesian networks. The seminar presents the problem of non-stationary structural learning for such probabilistic graphical models and describes solution algorithms for three different settings. Furthermore, we present preliminary results of non stationary structural learning of Continuous Time Bayesian Networks on the following biological datasets; drosophila saccharomyces cerevisiae and songbird.

StellaFabio Stella is an associate professor at the Dipartimento di Informatica, Sistemistica e Comunicazione of the Università degli Studi di Milano-Bicocca. His research focuses on models and algorithms for data analysis and decision making under uncertainty in the areas of Business Intelligence, Data and Text Mining and Computational Finance. In the winter term 2015/16 he is giving the course 625.605 – Business Intelligence in Klagenfurt for the second time.

Posted in TEWI-Kolloquium | Kommentare deaktiviert für Non stationary Continuous Time Bayesian Networks

Jobs at JOANNEUM RESEARCH in Klagenfurt

JOANNEUM RESEARCH Forschungsgesellschaft mbH (JOANNEUM RESEARCH) is a business oriented leader of innovation and a technology provider. It is linked to a worldwide network and has provided cutting-edge re-search according to the highest international standard for over thirty years. With a focus on applied research and technology development, JOANNEUM RESEARCH plays a key role in transfer of technology and know-how. Our newly established ROBOTICS institute focuses primarily on human-robot collaboration for innovative production processes, as well as on robot safety.

For our new location at the Lakeside Science & Technology Park in Klagenfurt, Austria, we are seeking highly motivated

Posted in Stellenausschreibungen | Kommentare deaktiviert für Jobs at JOANNEUM RESEARCH in Klagenfurt

15th Central European Conference on Cryptology (CECC) successfully hosted at Alpen-Adria-Universität Klagenfurt

The Department of Mathematics and the System Security Research group jointly organized the 15th Central European Conference on Cryptology (CECC) from 8th until 10th of July 2015. The conference featured invited lectures by Andrey Bogdanov (from Technical University of Denmark) on Symmetric-Key Cryptography in Untrusted Environments, Keith Martin (from Royal Holloway, University of London), giving an exciting lecture on bridging the gap between (cryptographic) theory and practice, Vincent Rijmen (from Katholieke Universiteit Leuven, Belgium), talking about the currently hot topic of threshold implementations against side-channel information leakage, and Daniel Genkin (from Tel Aviv University, Israel), impressing people with a live demonstration on how easy it is to drain information from a seemingly secure computer.

The conference brought together researchers of various subfields of security, engaging themselves in interesting and fruitful discussions on recent advances in many aspects of cryptology, such as cryptanalysis, cryptographic applications in information security, design of cryptographic systems and many more.

cecc2015-group

Stay tuned for the upcoming instance of the Central European Conference on Cryptology, to be held in Hotel Magnolia, Piestany, Slovakia, June 22 – 24, 2016, where new results from this year’s newly created joint research alliances will be presented.

The CECC15 book of abstracts is available.

Posted in Veranstaltungen | Kommentare deaktiviert für 15th Central European Conference on Cryptology (CECC) successfully hosted at Alpen-Adria-Universität Klagenfurt

The new index structure for sequential pattern-based aggregate queries

Prof. Tadeusz Morzy | 23.10.2015 | 14:00 Uhr | E.2.69

Abstract

Many applications require processing and analyzing sequential data. Examples include the analysis of passenger traveling histories, stock market prices, purchases of customers over time, meteorological events, workflow and RFID logs, etc. Recently, issues related to warehousing and analytical processing (OLAP) of sequential data have received growing attention. Particularly, the concept of Sequence OLAP (SOLAP) has been proposed that support OLAP processing of different kinds of aggregate queries on sequential data. The main feature distinguishing SOLAP from traditional OLAP is that data sequences managed by an SOLAP system are characterized by subsequence patterns they possess. The SOLAP systems allow to group data sequences based on patterns they possess and apply aggregate functions to each group. This kind of SOLAP queries are called a sequential pattern-based aggregate (PBA) queries. The processing of PBA queries is expensive due to the fact that they require full scan of all stored sequences. The natural question is how to efficiently evaluate this kind of queries?

The talk focuses on the new index structure supporting processing of sequential pattern-based aggregate queries. The structure of the index will be presented as well as classes of pattern-based aggregate queries supported by the index will be discussed. Finally, the performance of PBA queries using the proposed index will be presented.

morzyTadeusz Morzy is a professor in the Computing Science Department of Poznan University of Technology. He received his M. Sc., Ph. D. and Polish Habilitation from the Technical University of Poznań, Poland. He has held visiting positions at the Loyola University, New Orleans, Klagenfurt University Austria, University La Sapienza Italy, and Free University Amsterdam. He has authored and coauthored over 100 papers on databases, data mining, and data warehousing. He is co-author of a book on „Concurrency Control in Distributed Database Systems“ by North-Holland, editor and coauthor of “Handbook on Data Management” by Springer, and author of “Data Mining: Methods and Algorithms” (in Polish). He served as General Chair of the 2nd and 16th ADBIS Conferences (1998, 2012), and has served/serves on numerous program committees of international conferences and workshops. His research interests include data mining, data warehousing, transaction processing in database and data warehouse systems, access methods and query processing for databases, database optimization and performance evaluation.

Posted in TEWI-Kolloquium | Kommentare deaktiviert für The new index structure for sequential pattern-based aggregate queries

Rückblick: Current Directions in Behavioral Energy Economics [Slides]

Der Rückblick zum TEWI-Kolloquium von Laurens Rook am 17.7.2015 beinhaltet die Folien:

Abstract:

In recent years many times sustainability and renewable energy consumption have been set on the agenda. However, the pressing issue how to make people reduce their amount of energy consumed – or their switching  towards green alternatives – has received far less research attention. The academic discipline of behavioral economics has much to offer to this debate. In the presentation we will summarize prior research on the role of individual differences and various pricing and framing techniques that have proven to be helpful in making people switch to green energy. We will also address challenges and future directions in behavioral energy economics.

Bio:image001

Laurens Rook is Assistant Professor at Delft University of Technology, the Netherlands. He received his Ph.D. from the Erasmus University Rotterdam (in 2008), and his bachelor and master’s degrees from the  University of Amsterdam, the Netherlands (in 2001; MA Thesis on Mass Psychology in Fine Art and Advertising).  His research focuses on herd and imitative behavior in creative context, and is published in the Creativity Research Journal.  His second focus is on behavioral informatics. Laurens collaborates with the Learning Agents Research Group at Erasmus (LARGE). A recent paper on using social media apps to make people consume green energy  (together with University of Connecticut, USA) was awarded best poster  award (2nd prize, the 2014 Conference on Information Systems and Technology).  He lectures on Research Methodology,   Statistics, and Group Dynamics, but also is a graduated professional artist (Academy of Arts Rotterdam, 1997) with collected work in the Municipal Archives of Rotterdam, the Netherlands, and the National Art Collection of Ireland.

Posted in TEWI-Kolloquium | Kommentare deaktiviert für Rückblick: Current Directions in Behavioral Energy Economics [Slides]

12. Österreichischer IT-Sicherheitstag

SITAG15. Oktober 2015 | Messegelände Klagenfurt

  • Security-Awareness – The Human Firewall
  • Bezahlen im Webshop – Neue Möglichkeiten und neue Fragen
  • Aktuelle Sicherheitsbedrohungen

Drei exemplarische Vortragstitel aus dem diesjährigen Programm des Sicherheitstages.

Die Schwerpunkte der heurigen Tagung werden in den Sessions

  • Awareness & Zertifizierung
  • Live Hacking & Demos
  • Rechtliche Aspekte
  • Technisches

zusammengefasst.

Das vollständige Programm des 12. Österreichischen IT-Sicherheitstages finden Sie hier:

http://www.syssec.at/sitag2015prog

Der heurige Standort der Veranstaltung im Rahmen des IKT Kongresses IT-Carinthia spricht eine interessante Zielgruppe in Südösterreich und im Alpen-Adria-Raum an und bietet eine ideale Gelegenheit, um neue Kontakte zu knüpfen.

Die Anmeldung erfolgt über: http://www.syssec.at/sitag2015anmeldung

Die Teilnahmegebühr für diese Veranstaltung beträgt € 79,00, für Frühbucher bis zum 19.09.2015 € 63,00.

Dr. Peter Schartner
Veranstalter

Die Österreichischen IT-Sicherheitstage werden veranstaltet von der Universität Klagenfurt | Institute für Informatik – Forschungsgruppe Systemsicherheit (syssec). Der 12. Österreichische IT-Sicherheitstag findet begleitend zur IT Carinthia, der IKT-Kongress-Messe für Südösterreich und den Alpen-Adria Raum, statt.

Posted in Veranstaltungen | Kommentare deaktiviert für 12. Österreichischer IT-Sicherheitstag

Graph-Based User Modeling: Make the most out of (freely available) personal data

Prof. Tsvi Kuflik | 8th October 2015 | 16:00 | E.1.42

Abstract:
Over the years, the area of user modeling (and later on recommendation systems) produced a variety of user modeling techniques. These techniques were developed for modeling and representing the users in order to better understand their needs and provide them with personalized services. The common techniques in use are collaborative filtering and content/feature based, while in specific domains we can find also case-based, demographic and overlay approaches. However, the knowledge represented by these techniques is quite limited. In recent years, with the advent of web 2.0 and the social and semantic web, personal information becomes widely available online in various forms. This poses opportunities as well as major challenges for the classical user modeling approaches – how to make use of this information to enhance user modeling? As a potential solution to the problem, we are exploring the idea of graph-based user modeling representation, as an integrative framework that enables standard and simple representation of users‘ characteristics, not limited to a specific technique. In various studies we demonstrated the potential benefits of this approach and it’s possible contribution to user modeling and recommender systems. The talk will briefly present the general idea of graph-based user modeling as well as research results that demonstrate its contribution to a variety of domains and scenarios.

Short c.v.
Prof. Tsvi DSCF4369Kuflik heads the Information Systems Dept. at The University of Haifa. Over the past ten years, the focus of his work was on ubiquitous user modeling applied to cultural heritage. In the course of his work, a “Living Lab” has been developed at the University of Haifa – a museum visitors’ guide system was developed for the Hecht museum. It is available for visitors on a daily basis and serves also as a test bed for experimenting with novel technologies in the museum. Currently, the system is being used for research on Social Signal Processing where signals transmitted by devices carried by the visitors are used for modeling group behavior, in order to reason about the state of the group visit. Another research direction focusses on the use of intelligent user interfaces in ubiquitous computing within the “living lab”. Where issues like interaction with large, situated displays; interrupt management; navigation support; temporal and lifelong aspects of ubiquitous user modeling are studied. Tsvi got BSc. and MSc. In computer science and PhD. In information systems from Ben-Gurion University of the Negev, Israel. Over the years Tsvi collaborated with local and international researchers, supervised graduate students working with him on this research, organized the PATCH workshops series (Personal Access To Cultural Heritage) and published about 200 scientific papers, out of them 30 papers about this specific research. Tsvi is also a distinguished ACM scientist and a senior IEEE member.

Posted in TEWI-Kolloquium | Kommentare deaktiviert für Graph-Based User Modeling: Make the most out of (freely available) personal data
RSS
EMAIL