Survey on Network Attack Detection and Mitigation

Sebastian Abt — Nov 29, 2012 03:35 PM
Filed under:
The Biometrics and Internet Security Research Group at the University Darmstadt is conducting a survey on network attack detection and mitigation in order to gain a deeper insight in processes, procedures and settings typically found in ISP networks.

Network-based attacks pose a strong threat to the Internet landscape. We are undertaking research on network attack detection and mitigation. This research is publicly funded by the German Federal Ministry of Education and Research and tightly linked with the combined eco and DE-CIX competence group security.

Our work focuses on innovative approaches to network based attack detection which shall operate at ISP level. One primary goal is the detection of botnet command and control channels. We would like to better understand possibilities and issues in commercial networks. Therefore, we created a survey to gain a deeper insight in processes, procedures and settings typically found in ISP networks.

This survey aims at gaining insight in real-world processes, structures and capabilities of IT companies and the computer networks they run. This survey is conducted in context of different publicly funded research projects of the da/sec Biometrics and Internet Security research group [1], as well as work done in the combined eco e.V. and DE-CIX competence group security. Results of this survey shall frame future research and community activities in the area of Internet security.

The survey is targeted at companies of all size and colour running a computer network. Questions within this survey address some organisational aspects, as well as processes, techniques and tools you may have employed in order to perform network attack detection and mitigation. Filling the survey should not last longer than 5 - 10 minutes.

Please note that the survey closes on 4 December 2012.

Thank you all for your help to advance Internet security research!


Add comment

You can add a comment by filling out the form below. Only plain text is possible. Web and email addresses will be transformed into clickable links. Comments are moderated so they won't appear immediately.

Related Items
NTP Reflections

After the recent amplification attacks involving NTP servers, John Kristoff, a researcher with Team ...

Report on IPv6 Security Test Methodology

The Dutch Institute for Applied Scientific Research (TNO) and a number of Dutch security companies ...

Introducing ENISA: Securing European Networks

ENISA, the European Union Agency for Network & Information Security, is an independent body of ...

Call for Input: RPKI Browser

The RPKI Browser is a graphical user interface to the objects of the distributed RPKI repository. ...

Preparing K-root for a Signed Root Zone

Earlier this year, ICANN and VeriSign announced plans to sign the DNS root zone, using DNSSEC. ...

more ...