Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:46 PM
Dark Reading
Dark Reading
Products and Releases

Institute For Internet Security Offers Free Sensor

if(is) offers sensor technology to collect statistical raw data

Gelsenkirchen/San Francisco, 20th January 2009.- At RSA conference in San Francisco in April 2009, the Institute for Internet Security - if(is) - offers special sensor technology to collect and store statistical raw data for a long period of time. This technology is for free. It enables users to monitor their networks and evaluate its current state before using sensible services like online banking. This is an important step to turn the Internet into a more trustworthy and secure medium.

The Institute for Internet Security - if(is) - from the University of Applied Sciences Gelsenkirchen has developed a passive sensor technology that continuously collects statistical raw data with sensors, which are placed at selected spots of the Internet communication infrastructure. Nowadays if(is) has implemented sensors mainly in Germany to monitor the internal government network and the networks of Universities and Companies. In addition, if(is) found partners in Austria and Brazil. The intention is to create and analyze local and above all global perspectives in order to make the generation of a global view and the individual situation awareness of the Internet possible. The raw data is captured from header information of the passing network traffic, by counting the occurrence of currently 870.000 different parameters. This processing is to assure that all sensitive header information, like IP addresses and user data, is left out. Avoiding ethical, privacy, and legal challenges, the collected data are not privacy-sensitive.

The processing is designed to have very high performance and, using encryption, it allows to transfer the collected data frequently to a centralized database and to store it securely over a long period of time. This approach is different to Intrusion Detection Systems and to other monitoring systems that store highly confidential content or IP addresses. if(is) offers its technology to all interested researchers and other partners free of charge.

Unlike other systems sheltering critical assets, the Internet does not offer any overall facility to monitor its current status, health or development. Thus, an overlay monitoring layer is needed, which can be utilized to address a very important aspect for a more secure and trustworthy Internet. This information is needed by many stakeholders to make reliable decisions about their tasks.

This smart approach should utilize well proven global statistics, best practices and technical sensors. The stakeholders win knowledge and experience, which will help them to improve further decisions and actions. The benefit is mainly on the side of enterprises and governments: They will get an added value not just from early warnings, but also from inside information on the development of the Internet, like technology trends and bandwidth?s development. Internet Situation Awareness is a good start towards an integrative security and developing approach for the Internet. www.internet-sicherheit.de Institute for Internet Security if(is) at RSA Conference in San Francisco, 20st - 24th April 2009: Information Center and German Pavillon, Expo Booth 1332.

Contact: Markus Linnemann [email protected]

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS Build 20210202 and later Q...
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...