Dipl.-Inform. Rafael Uetz

Researcher at Fraunhofer FKIE

Contact
Phone: +49 228 50212-593
Fax: +49 228 73-4571
Email: rafael.uetz@REMOVETHISPART.fkie.fraunhofer.de
   
Address
  Institute of Computer Science 4
Friedrich-Ebert-Allee 144
53113 Bonn
Germany
Room: Zanderstr. 5, 2.18
 

Research Interests

  • Detection of Network Breaches
  • Machine Learning and Anomaly Detection
  • Log Management / SIEM Systems
  • Event / Alert Correlation
  • Incident Response and Digital Forensics

Teaching

Supervised Theses

  • "Spam Detection with Machine Learning", Master's Thesis, WT 2016/2017.
  • "Streaming Algorithms for Flow-based Data Exfiltration Detection", Master's Thesis, WT 2016/2017.
  • "Design, Implementation and Evaluation of a Statistical Approach for Network Anomaly Detection", Master's Thesis, WT 2015/2016.
  • "Conception, Implementation and Evaluation of a Secure Deletion Mechanism for Sensitive User Data in Main Memory", Master's Thesis, ST 2014.
  • "Simulation of an Enterprise Network with Realistic User Behavior", Master's Thesis, ST 2014.
  • "Forensische Untersuchung der Firefox-History durch Analyse gelöschter SQLite-WAL-Dateien", Bachelor Thesis, ST 2013.
  • "Parallel File Carving for Fragmented JPEG Files", Master's Thesis, ST 2012.

Supervised Labs, Seminars, and Project Groups

  • "Log Clustering with Adaptable Patterns", Lab, WT 2016/2017.
  • "Log Event Correlation", Seminar, WT 2016/2017.
  • "A Framework for the Simulation of Targeted Attacks", Lab, WT 2015/2016.
  • "A taxonomy and evaluation of selected targeted attacks focussed on the current APT landscape and the Intrusion Kill Chain", Seminar, WT 2015/2016.
  • "Detection of Targeted Attacks", Lab, ST 2015.
  • "SIEM Analysis Against Targeted Attacks", Lab, WT 2014/2015.
  • "IT-Sicherheitsvorfälle in der Praxis", Project Group, WT 2014/2015.
  • "Browsing Privacy", Seminar, ST 2014.
  • "SSD Forensics", Seminar, WT 2013/2014.
  • "A Forensic Analysis of Firefox Private Browsing Artifacts in Main Memory", Lab, ST 2013.
  • "A Forensic Analysis of Private Browsing Artifacts", Seminar, ST 2013.
  • "Host-based Intrusion Detection/Prevention Systems", Seminar, WT 2012/2013.
  • "Implementierung eines Programms zur Wiederherstellung gelöschter Dateien aus einer FAT32-Partition", Project Group, WT 2012/2013.
  • "Implementation of a File Carver for Fragmented JPEGs", Lab, WT 2011/2012.

Lectures

  • Exercises for the lecture "Network Security", ST 2015.
  • Exercises for the lecture "Network Security", ST 2014.
  • Exercises for the lecture "Network Security", ST 2013.

Other

  • "Security Awareness Game", Student Internship, WT 2013/2014.
  • "Malicious Mouse", Student Internship, WT 2011/2012.