Marko Jahnke


IT Security Consultant
Senior IT Security Officer
Email:
Phone:
Fax:
XING, LinkedIn


Current Activities


Earlier Topics


Short Bio

Marko Jahnke is a senior information and cyber security specialist with experiences as research scientist, system architect, analyst, consultant, and project manager since 1999. Currently, Dr. Jahnke is a senior cyber security specialist with a German federal agency.

Prior to this position, he worked for multiple German federal agencies in the cyber security domain as senior officer, analyst, and CERT/CSIRT (Computer Security Incident Response Team) manager. Earlier, he served as team leader and deputy head of the cyber defense research group of the Fraunhofer Research Institute for Communication, Information Processing, and Ergonomics (FKIE).

He is author and co-author of more than 35 scientific publications. He holds a Diploma (MSc) and a PhD degree in computer science, both from the University of Bonn, Germany.

His current focus is on operational security monitoring, i.e., IDS/IPS, SIEM, and real-time situation pictures for computer network defense.

Hosted/Co-Organized Events

  1. General chair of GI SIG SIDAR (IEEE supported) International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA2010) ,
    Bonn, Germany, Jul. 08-09, 2010.
  2. Organizing committee and TPC member of NATO/RTO/IST Research Specialists Meeting on Research Strategy for Information Security in NEC ,
    Brussels, Belgium, Apr. 16-17, 2007.
  3. Program chair of GI SIG SIDAR Workshop Sicherheit in komplexen, vernetzten Umgebungen (SKVU2005) ,
    Bonn, Germany, Sep. 22, 2005.
  4. Organizing committee and TPC member of NATO/RTO/IST Workshop on Information Security for Network Enabled Capabilities ,
    The Hague, The Netherlands, Apr. 26-28, 2005.
  5. Organizing committee and TPC member of NATO/RTO/IST Workshop on Inforensics and Incident Response ,
    The Hague, The Netherlands, Oct. 22-24, 2002.

Selected Publications

Books

Conference and Journal Contributions (Selection)

  1. Günther, H., M. Jahnke. Automatic Generation of Extended Dependency Graphs for Network Security. .
    Published in: Proc. of the 37th IEEE Conference on Local Computer Networks (LCN), Clearwater, Florida, USA, 2012.
  2. Günther, H., G. Klein, S. Hunke, M. Jahnke. m-CDSA: Model-based Cyber Defense Situational Awareness .
    Published in: "PIK" - Praxis der Informationsverarbeitung und Kommunikation, Band 35, Heft 1, ISSN 0930-5157, DeGruyter/K.G. Saur Verlag, München, 2012.
  3. Hunke, S., M. Jahnke. Modeling Availability in Tactical Mobile Ad hoc Networks for Situational Awareness .
    Published in: Proc. of the 2011 Annual Conference of the German Informatics Society (GI), Berlin, Germany, Oct. 2011.
  4. Hommen, J., G. Klein, H. Rogge, M. Jahnke, A. Grebe. Detection of IEEE 802.11 MAC-layer Frame Collisions in a MANET Emulation Environment .
    Published in: Proc. of the Military Communication Conference 2011 (MCC2011), Amsterdam, The Nederlands, Oct. 2011.
  5. Klein, H. Rogge, F. Schneider, M. Jahnke, J. Tölle, S. Karsch. Response Initiation for Distributed Intrusion Response Systems in Tactical MANETs .
    Published in: Proceedings of the European Conference on Computer Network Defense (EC2ND). Berlin, Germany, Oct. 2010.
  6. G. Klein, C. Ruckert, M. Kleiber, M. Jahnke, J. Tölle. Towards a Model-Based Cyber Defense Situational Awareness Visualization Environment .
    Published in: Proceedings of the RTO Workshop "Visualising Networks: Coping with Chance and Uncertainty". Rome, NY, USA, Oct. 2010.
  7. G. Klein, A. Ojamaa, P. Grigorenko, M. Jahnke, E. Tyugu. Enhancing Response Selection in Impact Estimation Approaches .
    Published in: Proceedings of the MCC2010 Military Communications and Information Systems Conference, Wroclaw, Poland, Sep. 2010.
  8. M. Jahnke, G. Klein, J. Tölle. Automatic Network Reconfiguration for Denial-of-Service Defense using Dynamic Impact Estimation .
    Published in: Proceedings of the Future Security Conference 2010. Berlin, Germany, Sep. 2010.
  9. M. Jahnke, J. Tölle, C. Thul, P. Martini. Validating GrADAR - Graph-based Automated Denial-of-Service Attack Response .
    Published in: Proceedings of the 34th Conference on Local Computer Networks (LCN 2009), Zurich, Switzerland, Oct. 2009.
  10. M. Jahnke, G. Klein, J. Tölle, P. Martini. Protecting Military Networks with GrADAR - An Approach for Graph-based Automated Denial-of-Service Attack Response .
    Published in: Proceedings of the International Military Communication Conference (MCC 2009), Prague, Czech Republic, Sep. 2009.
  11. H. Rogge, A. Wenzel, G. Klein, M. Jahnke. Improvement of IP-based MANET Emulation .
    Published in: Proceedings of the International Military Communication Conference (MCC 2009), Prague, Czech Republic, Sep. 2009.
  12. G. Klein, M. Jahnke, J. Tölle, P. Martini. Enhancing Graph-based Automated Denial-of-Service Attack Response .
    Published in: C. Czossek, K. Geers (Eds.), The Virtual Battlefield: Perspectives on Cyber Warfare, Cooperative Cyber Defense Center of Excellence, Tallinn, Estonia, Jun. 2009.
  13. M. Jahnke, G. Klein, D. Dahlberg, A. Wenzel, N. Aschenbruck, E. Gerhards-Padilla, P. Ebinger, S. Karsch. MITE - MANET Intrusion Detection for Tactical Environments .
    Published in: Proceedings of the NATO/RTO Research Symposium on "Information Assurance for Emerging and Future Military Systems" (RSY IST-076), Ljubljana, Slovenia, Oct. 2008 (BEST PAPER AWARD).
  14. M. Jahnke, C. Thul, P. Martini. Comparison and Improvement of Metrics for Selecting Intrusion Response Measures to DoS Attacks .
    Published in: Proceedings of the GI Sicherheit 2008 Conference, Saarbrücken, Germany, Apr. 2008.
  15. R. Kemmerer, R. Büschkes, A. Fessi, H. König, P. Herrmann, S. Wolthusen, M. Jahnke, H. Debar, R. Holz, T. Zseby, D. Haage. 08102 Outcome Working Group -- Situational Awareness .
    Published in: GI Dagstuhl Perspectives Workshop on Network Attack and Defense, Mar. 2008.
  16. M. Jahnke, A. Finkenbrink, A. Wenzel, J. Tölle. Methodologies and Frameworks for Testing IDS in Adhoc Networks .
    Published in: Proceedings of the 2nd ACM International Workshop on QoS and Security for Wireless and Mobile Networks, Crete, Greece, Oct. 2007.
  17. M. Jahnke, C. Thul, P. Martini. Graph based Metrics for Intrusion Response in Computer Networks .
    Published in: Proceedings of the 3rd IEEE LCN Workshop on Network Security. Held in conjunction w/ 32th IEEE Conference on Local Computer Networks, Dublin, Irland, Oct. 2007.
  18. E. Gerhards-Padilla, N. Aschenbruck, P. Martini, M. Jahnke, J. Tölle. Detecting Blackhole Attacks in Tactical MANETs using Topology Graphs .
    Published in: Proceedings of the 3rd IEEE LCN Workshop on Network Security. Held in conjunction w/ 32th IEEE Conference on Local Computer Networks, Dublin, Irland, Oct. 2007.
  19. G. Hallingstad, J. Obal, M. Jahnke. Coordinating Research .
    Published in: Proceedings of the NATO/RTO Research Specialist's Meeting on Research Strategy for Information Security in NEC, IST-073/RSM-003, Brussels, Belgium, Apr. 2007.
  20. M. Jahnke, A. Finkenbrink. Network Information Infrastructure Availability .
    Published in: Proceedings of the NATO/RTO Research Specialist's Meeting on Research Strategy for Information Security in NEC, IST-073/RSM-003, Brussels, Belgium, Apr. 2007.
  21. A. Wenzel, A. Finkenbrink, M. Jahnke, J. Tölle, S. Karsch. Verteiltes Packet-Sniffing als Sicherheitswerkzeug in MANETs .
    Published in: Proceedings of the D-A-CH Security 2007 Conference, Klagenfurt, Austria, Jul. 2007 (German).
  22. E. Gerhards-Padilla, M. Jahnke. Spezielle Sicherheitsrisiken für taktische mobile Adhoc-Netzwerke (MANETs) .
    Published in: IT-Report der Bundeswehr 2007, Report Verlag, Bonn, Mai 2007 (German).
  23. N. gentschen Felde, J. Tölle, M. Jahnke, P. Martini. Impact of Sanitized Message Flows in a Cooperative Intrusion Warning System .
    Published in: Proceedings of Military Communications Conference (MILCOM2006), Washington D.C., USA, Okt. 2007.
  24. T. Bucher, P. Ebinger, J. Tölle, M. Jahnke. Modellierung und Analyse von Angriffen auf das Routing in OLSR .
    Published in: Horster, Patrick (Hrsg.): D.A.CH Mobility. Proceedings 2006: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven. syssec, 2006, 156-172~(IT Security & IT Management), Oct. 2006 (German).
  25. M. Jahnke, J. Tölle, S. Lettgen, M. Bussmann, U. Weddige. A Robust SNMP based Infrastructure for Intrusion Detection and Response in Tactical MANETs .
    Published in: Proceedings of the GI/IEEE Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA2006), Berlin, Jul. 2006.
  26. K. Eckstein, M. Jahnke, Data Hiding in Journalling Filesystems .
    Published in: Proceedings of the Digital Forensics Research Workshop, New Orleans, USA, 2005 (BEST PAPER AWARD).
  27. M. Jahnke, J. Tölle. Zuverlässige Intrusion Detection für dynamische Koalitionsumgebungen .
    Published in: "PIK" - Praxis der Informationsverarbeitung und Kommunikation, Heft 2/2005, Jahrgang 28, K.G. Saur Verlag, München, Jun. 2005 (German).
  28. J. Tölle, M. Jahnke. Meta-IDS Environments: An Anomaly Detection Approach .
    Published in: Proceedings of IEEE International Workshop on Information Assurance, University of Maryland, USA, Apr. 2005.
  29. M. Antweiler, M. Jahnke, J. Tölle. Militärische Aspekte der Einbruchserkennung in Computernetzen .
    Published in: IT-Report 2005, Report-Verlag, Bonn, Apr. 2005 (German).
  30. F. Ausserlechner, M. Jahnke. Online-Erkennung von IDS-Ereigniskombinationen mittels XSLT .
    In: Proceedings of the 12th Workshop on Security in Networking Systems, DFN-CERT/PCA, Hamburg, Mar. 2005 (German).
  31. M. Jahnke, M. Lies, M. Bussmann, S. Henkel, J. Tölle. Komponenten für kooperative Intrusion Detection in dynamischen Koalitionsumgebungen .
    Published in: Proceedings of the GI/IEEE Workshop on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA2004), Dortmund, Jul. 2004 (German).
  32. M. Jahnke, J. Tölle, M. Bussmann, S. Henkel. Components for Cooperative Intrusion Detection in Dynamic Coalition Environments .
    Presented at: NATO/RTO Symposium on Adaptive Defence in Unclassified Networks, Toulouse, Apr. 2004.
  33. M. Lies, M. Jahnke, J. Tölle, M. Bussmann, S. Henkel. Ein Intrusion-Warning-System für dynamische Koalitionsumgebungen .
    Published in: Proceedings of the 11th Workshop on Security in Networking Systems, DFN-CERT/PCA, Hamburg, Feb. 2004 (German).
  34. M. Jahnke. Schutz von verteilten Intrusion-Detection-Systemen gegen Denial-of-Service-Angriffe .
    Published in: Proceedings of the 10th Workshop on Security in Networking Systems, DFN-CERT/PCA, Hamburg, Feb. 2003 (German).
  35. M. Jahnke. An Open and Secure Infrastructure for Distributed Intrusion Detection Systems .
    Published in: Proceedings of the NATO Regional Conference on Communication and Information Systems (RCMCIS02), Zegrze, Poland, Oct. 2002.
  36. K. Kansy, P. Wi▀kirchen, U. Behrens, T. Berlage, G. Grunst, M. Jahnke, R. Ratering, H. Schwarzmaier, F. Ulrich. LOCALITE - a Frameless Neuronavigation System for Interventional Magnetic Resonance Imaging Systems.
    Published in: Proceedings of Medical Image Computing and Computer-Assisted Intervention (MICCCAI99), Springer, 1999.
  37. U. Behrens, M. Bublat, M. Fieberg, G. Grunst, M. Jahnke, K. Kansy, R. Ratering, H. Schwarzmaier, P. Wisskirchen. Enabling Systems for Neurosurgery .
    Published in: Proceedings of CAR 98, Elsevier Science, 1998.

Ads



This page has been created in plain old HTML using vi and xemacs.
Last changed 2014-05-24. Subject to change without notice.