Organizations must protect their information systems from a variety of threats. Usually they employ isolated defenses such as firewalls, intrusion detection and fraud monitoring systems, without cooperating with the external world. Organizations belonging to the same markets (e.g., financial organizations, telco providers) typically suffer from the same cyber crimes. Sharing and correlating information could help them in early detecting those crimes and mitigating the damages.The paper discusses the Semantic Room (SR) abstraction which enables the development of collaborative event-based platforms, on the top of Internet, where data from different information systems are shared, in a controlled manner, and correlated to detect and timely re...
Until now, in most organizations, physical access systems and logical security systems have operated...
We present a prototype of an Intrusion Warning System for combining event message flows of multiple ...
International audienceThe current landscape of security management solutions for large scale network...
This paper introduces a new collaboration abstraction, called Semantic Room (SR), specifically targe...
In this paper, we take a distributed architecture called Semantic Room (SR) which is capable of corr...
The success of Internet-based attacks and frauds targeting financial institutions highlights their i...
We describe an Internet-based collaborative environment that protects geographically dispersed organ...
This chapter describes a distributed architecture for collaborative detection of cyber attacks and n...
Today, information technology and cyber-services have become the foundation pillars of every busines...
The constant increase of malware threats clearly shows that the present countermeasures are not suff...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
Ensuring a good level of cybersecurity of global IT systems requires that specific procedures and co...
In this paper we analyze the coordinated port scan attack where a single adversary coordinates a Gro...
Abstract. In this paper we introduce the notion of a detection framework to facilitate the reasoning...
The community and tools for illegal access are getting well organized and sophisticated. However, wi...
Until now, in most organizations, physical access systems and logical security systems have operated...
We present a prototype of an Intrusion Warning System for combining event message flows of multiple ...
International audienceThe current landscape of security management solutions for large scale network...
This paper introduces a new collaboration abstraction, called Semantic Room (SR), specifically targe...
In this paper, we take a distributed architecture called Semantic Room (SR) which is capable of corr...
The success of Internet-based attacks and frauds targeting financial institutions highlights their i...
We describe an Internet-based collaborative environment that protects geographically dispersed organ...
This chapter describes a distributed architecture for collaborative detection of cyber attacks and n...
Today, information technology and cyber-services have become the foundation pillars of every busines...
The constant increase of malware threats clearly shows that the present countermeasures are not suff...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
Ensuring a good level of cybersecurity of global IT systems requires that specific procedures and co...
In this paper we analyze the coordinated port scan attack where a single adversary coordinates a Gro...
Abstract. In this paper we introduce the notion of a detection framework to facilitate the reasoning...
The community and tools for illegal access are getting well organized and sophisticated. However, wi...
Until now, in most organizations, physical access systems and logical security systems have operated...
We present a prototype of an Intrusion Warning System for combining event message flows of multiple ...
International audienceThe current landscape of security management solutions for large scale network...