Resources News

Paper Accepted

Investigating the Nature of Routing Anomalies

April 17, 2015 || Dr. Johann Schlamp

Our paper has been accepted for publication by the 7th International Workshop on Traffic Monitoring and Analysis. We conducted a study on subprefix hijacking attacks in an effort to reduce false alarms commonly raised by state-of-the-art detection systems.

Paper Accepted

The Abandoned Side of the Internet

April 17, 2015 || Dr. Johann Schlamp

Our paper has been accepted for publication by the 7th International Workshop on Traffic Monitoring and Analysis. We contributed an evaluation of the the abandoned side of the Internet, in which attackers can hijack and abuse dormant networks in full anonymity.

Announcement

We are hiring!

January 07, 2015 || Leitwert HR

As an expanding technology company we are looking for new employees to add to our team. To complement our crew, we are currently seeking expert network engineers with advanced programming skills. Contact us if you are interested.

Paper Accepted

Malicious BGP hijacks can be deceiving

February 20, 2014 || Dr. Johann Schlamp

Our paper has been accepted for publication by the IEEE International Conference on Communications. In our practical study, we show that suspicious routing events not always evidence real hijacking incidents.

Paper Accepted

A Forensic Case Study on AS Hijacking

April 29, 2013 || Dr. Johann Schlamp

Our paper has been accepted for publication by the ACM SIGCOMM Computer Communication Review. We thoroughly studied a malicious AS hijacking incident to gain unique insight into the attacker's proceeding.