International audienceThe current landscape of security management solutions for large scale networks is limited by the lack of supporting approaches capable to deal with the huge number of alarms and events that are generated on current networks. In this paper we propose a security management architecture, capable to reconstruct causal dependencies from captured network and service alarms. The key idea is based on mapping events in semantic spaces, where a novel algorithm can determine such dependencies. We have implemented a prototype and tested it on a operational network within an outsourced security management suite protecting multiple networks
As critical infrastructures have become strategic targets for advanced cyber-attacks, we face the se...
Security Information and Event Management (SIEM) is a consolidated technology that relies on the cor...
We introduce a computational model for networks that is suitable for supporting the administrative s...
With the growing size and complexity of current ICT infrastructures, it becomes increasingly challen...
International audienceManaging and supervising security in large networks has become a challenging t...
With the growing deployment of host-based and network-based intrusion detection systems in increasin...
Preface on the 5th International Workshop on Traffic Measurements for Cybersecurity (10.1109/EuroSPW...
Organizations must protect their information systems from a variety of threats. Usually they employ ...
The pervasiveness of technology (e.g., the internet) is coupled with an expansion of the threat land...
This thesis concerns the need for a network-centric Security Information and Event Management (SIEM)...
International audienceNowadays, telecommunication systems are growing more and more complex, generat...
Part 1: AdministrationInternational audienceDiagnosing accidental and malicious events in an industr...
Cyber-physical systems (CPSs) are part of many critical infrastructures such as industrial automatio...
dissertationManaging networks in practice continues to be complex and fragile. This is largely due t...
The Internet today provides the environment for novel applications and processes which may evolve wa...
As critical infrastructures have become strategic targets for advanced cyber-attacks, we face the se...
Security Information and Event Management (SIEM) is a consolidated technology that relies on the cor...
We introduce a computational model for networks that is suitable for supporting the administrative s...
With the growing size and complexity of current ICT infrastructures, it becomes increasingly challen...
International audienceManaging and supervising security in large networks has become a challenging t...
With the growing deployment of host-based and network-based intrusion detection systems in increasin...
Preface on the 5th International Workshop on Traffic Measurements for Cybersecurity (10.1109/EuroSPW...
Organizations must protect their information systems from a variety of threats. Usually they employ ...
The pervasiveness of technology (e.g., the internet) is coupled with an expansion of the threat land...
This thesis concerns the need for a network-centric Security Information and Event Management (SIEM)...
International audienceNowadays, telecommunication systems are growing more and more complex, generat...
Part 1: AdministrationInternational audienceDiagnosing accidental and malicious events in an industr...
Cyber-physical systems (CPSs) are part of many critical infrastructures such as industrial automatio...
dissertationManaging networks in practice continues to be complex and fragile. This is largely due t...
The Internet today provides the environment for novel applications and processes which may evolve wa...
As critical infrastructures have become strategic targets for advanced cyber-attacks, we face the se...
Security Information and Event Management (SIEM) is a consolidated technology that relies on the cor...
We introduce a computational model for networks that is suitable for supporting the administrative s...