Loading...
/PUBLICATIONS & DELIVERABLES
PUBLICATIONS & DELIVERABLES 2019-09-18T16:03:43+00:00

PUBLICATIONS & DELIVERABLES

Below you can find DiSIEM-related documents produced by the members of the DiSIEM consortium.

PUBLICATIONS

DELIVERABLES

DiSIEM project leaflet

DOWNLOAD

 
The DiSIEM Consortium. DiSIEM Project Overview. September 2016.

DOWNLOAD

 
Secure Long-term Archival and Sharing of Critical Data leaflet

DOWNLOAD

 
OSINT Threat Detector leaflet

DOWNLOAD

 
Multi-level Risk Manager leaflet

DOWNLOAD

 
Skeptic II Framework leaflet

DOWNLOAD

 
Phong H. Nguyen, Cagatay Turkay, Gennady Andrienko, Natalia Andrienko and Olivier Thonnard, A Visual Analytics Approach for User Behaviour Understanding through Action Sequence Analysis, EuroVA 2017, June 12-13, 2017, Barcelona, Spain.

DOWNLOAD

 
João Alves, Ana Respício, Ivo Rosa, Pedro Rodrigues, Threat Intelligence – Improving SIEM cybercriminality awareness using information from IP blacklists, eCrime2017.EU – APWG.EU Symposium on Electronic Crime Research, October 24-26, 2017, Porto, Portugal.

DOWNLOAD

 
Eduardo Viegas, Altair Santin, Nuno Neves, Alysson Bessani, Vilmar Abreu. A Resilient Stream Learning Intrusion Detection Mechanism for Real-time Analysis of Network Traffic. Proc. of the IEEE Global Communications Conference – Globecom 2017. Singapore, December 2017.

DOWNLOAD

 
Phong H. Nguyen, Cagatay Turkay, Gennady Andrienko, Natalia Andrienko, Olivier Thonnard, Jihane Zouaoui. Understanding User Behaviour through Action Sequences: from the Usual to the Unusual. IEEE Transactions on Visualization and Computer Graphics. Accepted for publication. July 2018. (doi: 10.1109/TVCG.2018.2859969)

DOWNLOAD

 
Henrique Mendes, Ibéria Medeiros, Nuno Neves. Validating and Securing DLMS/COSEM Implementations with the ValiDLMS Framework. Proc of the 3rd Workshop on Security and Dependability of Critical Embedded Real-Time Systems – CERTS’18 (together with IEEE/IFIP DSN’18). Luxembourg. July 2018.

DOWNLOAD

 
P. Marques, Z. Dabbabi, M-M Mironescu, O. Thonnard, A. Bessani, F. Buontempo, I. Gashi. Using Diverse Detectors for Detecting Malicious Web Scraping Activity. Fast Abstract at the IEEE/IFIP International Conference on Dependable Systems and Networks – DSN’18. Luxembourg. July 2018.

LINK

 
Gustavo Gonzalez-Granadillo, Susana Gonzalez-Zarzosa, Mario Faiella. Towards an Enhanced Security Data Analytic Platform. Proc. of the 15th International Conference on Security and Cryptography – SECRYPT’18. Porto, Portugal. July 2018.

DOWNLOAD

 
Luis Sacramento, Ibéria Medeiros, João Bota, Miguel Correia. FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data using Network Flows. Proc. of the 17th IEEE International Conference On Trust, Security, and Privacy In Computing And Communications – TrustCom’18. New York, USA. July 2018.

DOWNLOAD

 
Y. Movahedi, M. Cukier, A. Andongabo, I. Gashi. Cluster-based Vulnerability Assessment of Operating Systems and Web Browsers. Computing. September 2018 (doi: 10.1007/s00607-018-0663-0)

LINK

 
I. Gashi, H. Asad. Diversity in Open Source Intrusion Detection Systems. Proc. of the 37th International Conference on Computer Safety, Reliability,  and Security – SAFECOMP 2018. Västerås, Sweden. September 2018.

LINK

 
Ivo Vacas, Ibéria Medeiros, Nuno Neves. Detecting Network Threats using OSINT Knowledge-based IDS. Proc. of the 14th European Dependable Computing Conference – EDCC’18. Iasi, Romania. September 2018.

DOWNLOAD

 
Rui Azevedo, Iberia Medeiros, Alysson Bessani. Automated Solution for Enrichment and Quality IoC Creation from OSINT. Inforum 2018. Coimbra, Portugal. September 2018.

DOWNLOAD


Siming Chen, Shuai Chen, Natalia Andrienko, Gennady Andrienko, Phong H. Nguyen, Cagatay Turkay, Olivier Thonnard, Xiaoru Yuan. User Behavior Map: Visual Exploration for Cyber Security Session Data. Proceedings of 2018 IEEE Symposium on Visualization for Cyber Security – VizSec’18, Berlin, Germany, October 2018.

DOWNLOAD

 
Phong H. Nguyen, Siming Chen, Natalia Andrienko, Michael Kamp, Linara Adilova, Gennady Andrienko, Olivier Thonnard, Alysson Bessani, Cagatay Turkay. Designing Visualisation Enhancements for SIEM Systems. Poster paper at 15th IEEE Symposium on Visualization for Cyber Security – VizSec 2018. Berlin, Germany. October 2018.

DOWNLOAD

 
Phong H. Nguyen, Siming Chen, Natalia Andrienko, Gennady Andrienko, Olivier Thonnard, Cagatay Turkay. Doing User Behaviour Analytics through Interactive Visual User Profiles. Poster paper at 15th IEEE Symposium on Visualization for Cyber Security – VizSec 2018. Berlin, Germany. October 2018.

DOWNLOAD

 
Olivier Thonnard, Zayani Dabbabi, Miruna Mironescu, Damien Fontanes. SKEPTIC: Reinforcing Application Security through User Behavioural Analysis. CESAR 2018. November 2018.

DOWNLOAD

 
P. Marques, Z. Dabbabi, M-M Mironescu, O. Thonnard, A. Bessani, F. Buontempo, I. Gashi. Detecting Malicious Web Scraping Activity: a Study with Diverse Detectors. Proc. of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing – PRDC’18. Taipei, Taiwan. December 2018.

LINK

 
Siming Chen, Natalia Andrienko, Gennady Andrienko, Linara Adilova, Jeremie Barlet, Joerg Kindermann, Phong Hai Nguyen, Olivier Thonnard, Cagatay Turkay. LDA Ensembles for Interactive Exploration and Categorization of Behaviors. IEEE Transactions on Visualization and Computer Graphics. Accepted for publication. March 2019. (doi: 10.1109/TVCG.2019.2904069)

COMING SOON

 
Movahedi, Y., Cukier, M., Andongabo, A. and Gashi, I. Cluster-based Vulnerability Assessment of Operating Systems and Web Browsers. Computing 101:2. February 2019.

LINK

 
Eduardo Viegas, Altair Santin, Alysson Bessani, Nuno Neves. BigFlow: Real-time and Reliable Anomaly-based Intrusion Detection for High-Speed Networks. Future Generation Computer Systems 93. April 2019.

DOWNLOAD

 
Fernando Alves, Aurélien Bettini, Pedro M. Ferreira, Alysson Bessani. Processing Tweets for Cybersecurity Threat Awareness. Technical Report arXiv:1904.02072. April 2019.

LINK

 
Ricardo Mendes, Tiago Oliveira, Vinicius Cogo, Nuno Neves, Alysson Bessani. Charon: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data. IEEE Transactions on Cloud Computing. Accepted in May 2019. (doi: 10.1109/TCC.2019.2916856)

COMING SOON

 
Fernando Alves, André Correia, Aurélien Bettini, Pedro M. Ferreira and Alysson Bessani. Design of a Classification Model for a Twitter-based Streaming Threat Monitor. Workshop on Data-Centric Dependability and Security – DCDS 2019 (co-located with IEEE/IFIP DSN 2019), Portland, USA. June 2019.

COMING SOON

 
Cláudio Martins, Ibéria Medeiros. Generating Threat Intelligence by Classification and Association of Security Events (research statement). Workshop on Data-Centric Dependability and Security – DCDS 2019 (co-located with IEEE/IFIP DSN 2019), Portland, USA. June 2019.

COMING SOON

 
G. Gonzalez-Granadillo, M. Faiella, I. Medeiros, R. Azevedo, S. Gonzalez-Zarzosa. Enhancing Information Sharing and Visualization Capabilities in Security Data Analytic PlatformsWorkshop on Data-Centric Dependability and Security – DCDS 2019 (co-located with IEEE/IFIP DSN 2019), Portland, USA. June 2019.

COMING SOON

 
Linara Adilova, Livin Natious, Siming Chen, Olivier Thonnard and Michael Kamp. System Misuse Detection via Informed Behavior Clustering and Modeling. Workshop on Data-Centric Dependability and Security – DCDS 2019 (co-located with IEEE/IFIP DSN 2019), Portland, USA. June 2019.

COMING SOON

 
M. Faiella, G. Gonzalez-Granadillo, I. Medeiros, R. Azevedo, S. Gonzalez-Zarzosa. Enriching Threat Intelligence Platforms Capabilities. Proc. of the 16th International Conference on Security and Cryptography – SECRYPT’19. July 2019.

COMING SOON

 
G. Gonzalez Granadillo, R. Diaz, I. Medeiros, S. Gonzalez-Zarzosa, D. Machnicki, LADS: A Live Anomaly Detection System based on Machine Learning Methods, Conference on Security and Cryptography, SECRYPT, Czech Republic. July 2019.

LINK

 
Nuno Dionísio, Fernando Alves, Pedro M Ferreira, Alysson Bessani. Cyberthreat Detection from Twitter using Deep Neural Networks. International Joint Conference on Neural Networks – IJCNN 2019. July 2019.

LINK

 
Rui Azevedo, Ibéria Medeiros, Alysson Bessani. PURE: Generating Quality Threat Intelligence by Clustering and Correlating OSINT. Proc. of the 18th IEEE International Conference On Trust, Security, and Privacy In Computing And Communications – TrustCom’19. Rotorua, New Zealand. August 2019

COMING SOON

 

Luís Sacramento, Ibéria Medeiros, João Bota, Miguel Correia. Detecting Botnets and Unknown Network Attacks in Big Traffic Data. In Botnets: Architectures, Countermeasures, and Challenges. Book chapter accepted on July 2019.

COMING SOON

 
Phong H Nguyen, Rafael Henkin, Siming Chen, Natalia Andrienko, Gennady Andrienko, Olivier Thonnard, Cagatay Turkay. VASABI: Hierarchical User Profiles for Interactive Visual User Behaviour Analytics. IEEE Transactions on Visualization and Computer Graphics. Accepted for publication. August 2019. (doi: 10.1109/TVCG.2019.2934609)

LINK

 
Adriano Serckumecka, Ibéria Medeiros, Bernardo Ferreira, Alysson Bessani. A Cost-Effective Cloud Event Archival for SIEMs. Proc. of the 1st Workshop on Distributed and Reliable Storage Systems – DRSS’19 (together with SRDS 2019), Lyon, France, October 2019.

COMING SOON

 
Yazdan Movahedi, Michel Cukier, Ilir Gashi. Vulnerability prediction capability: A comparison between vulnerability discovery models and neural network models. Computers & Security, Volume 87, November 2019. (doi.org/10.1016/j.cose.2019.101596)

COMING SOON

 
Adriano Serckumecka, Ibéria Medeiros, Bernardo Ferreira, Alysson Bessani. SLiCER: Safe Long-term Cloud Event Archival. Proc. of the 24th IEEE Pacific Rim International Symposium on Dependable Computing – PRDC 2019. December 2019.

COMING SOON

 
Miguel Garcia, Nuno Neves, Alysson Bessani. Lazarus: Automatic Management of Diversity in BFT Systems. Proc. of the ACM/IFIP International Middleware Conference – Middleware’19. Davis, USA. December 2019.

COMING SOON

D2.1 – In-depth analysis of SIEMs extensibility

DOWNLOAD

 
D2.2 – Reference architecture and integration plan

DOWNLOAD

 
D3.1 – Security metrics and measurements

DOWNLOAD

 
D3.2 – Probabilistic Modelling of Diversity for Security and Security Trends

DOWNLOAD

 
D3.3 – Refinements of the models and metrics based on pilot deployments

DOWNLOAD

 
D4.1 – Techniques and tools for OSINT-based threat analysis

DOWNLOAD

 
D4.2 – OSINT data fusion and analysis architecture

DOWNLOAD

 
D4.3 – OSINT threat preditors prototype

CONFIDENTIAL

 
D4.4 – OSINT threat preditors final

CONFIDENTIAL

 
D5.1 – Visualization system infrastructure and requirement analysis

DOWNLOAD

 
D5.2 – Early-stage prototypes

DOWNLOAD

 
D5.3 – Fully operating, integrated visualisation system with diverse SIEMs

DOWNLOAD

 
D6.1 – Preliminary architecture and service model of infrastructure enhancements

DOWNLOAD

 
D6.2 – Early stage of the prototype of the components

CONFIDENTIAL

 
D6.3 – Final prototype of the components

CONFIDENTIAL

 
D7.1 – Validation plan

DOWNLOAD

 
D7.2 – Use-case demonstrators

CONFIDENTIAL

 
D7.3 – Validation results

CONFIDENTIAL

 
D8.1 – Internal and External IT Communication Infrastructure

DOWNLOAD

 
D8.2 – Data Management Plan

DOWNLOAD

 
D8.3 – Intermediate business plan and exploitation report

CONFIDENTIAL

 
D8.4 – Business plan and exploitation report

CONFIDENTIAL

 
D8.5 – Results of the competition on machine learning for security

DOWNLOAD


D9.1 – Project Quality Plan

DOWNLOAD


D9.2 – Risk Assessment Plan

DOWNLOAD