Event correlation is a widely-used data processing methodology, and is useful for the distributed monitoring of software faults and vulnerabilities. Most existing solutions have focused on “intra-organizational ” correlation; organizations typically employ privacy policies that prohibit the exchange of information outside of the organization. However, “inter-organizational ” Internet-scale correlation holds promise given its potential role in both software fault maintenance and vulnerability detection. In this thesis, I reconcile these opposing forces via the use of privacy preservation integrated into an event processing framework. I introduce the notion of event corroboration, a reduced yet flexible form of correlation, enabling collabora...
We present a prototype of an Intrusion Warning System for combining event message flows of multiple ...
In event processing systems, detected event patterns can revealprivacy-sensitive information. In thi...
Part 2: Control Systems SecurityInternational audienceSupervisory control and data acquisition (SCAD...
Event correlation is a widely-used data processing methodology for a broad variety of applications, ...
Organizations security becomes increasingly more difficult to obtain due to the fact that informatio...
International audienceOrganizations security becomes increasingly more difficultto obtain due to the...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
Recent trends in Internet computing have led to the popularization of many forms of virtual organiza...
Streaming databases and other distributed, event-based systems are very useful tools for business an...
International audienceManaging and supervising security in large networks has become a challenging t...
Despite the increased focus on security, complex networked systems remain vulnerable to attacks. Int...
Recent trends in Internet computing have led to the popularization of many forms of virtual organiza...
The purpose of this work is to improve intrusion detection techniques by developing a more general f...
We present a prototype of an Intrusion Warning System for combining event message flows of multiple ...
In event processing systems, detected event patterns can revealprivacy-sensitive information. In thi...
Part 2: Control Systems SecurityInternational audienceSupervisory control and data acquisition (SCAD...
Event correlation is a widely-used data processing methodology for a broad variety of applications, ...
Organizations security becomes increasingly more difficult to obtain due to the fact that informatio...
International audienceOrganizations security becomes increasingly more difficultto obtain due to the...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
Recent trends in Internet computing have led to the popularization of many forms of virtual organiza...
Streaming databases and other distributed, event-based systems are very useful tools for business an...
International audienceManaging and supervising security in large networks has become a challenging t...
Despite the increased focus on security, complex networked systems remain vulnerable to attacks. Int...
Recent trends in Internet computing have led to the popularization of many forms of virtual organiza...
The purpose of this work is to improve intrusion detection techniques by developing a more general f...
We present a prototype of an Intrusion Warning System for combining event message flows of multiple ...
In event processing systems, detected event patterns can revealprivacy-sensitive information. In thi...
Part 2: Control Systems SecurityInternational audienceSupervisory control and data acquisition (SCAD...