PUBLICATIONS & DELIVERABLES
Below you can find DiSIEM-related documents produced by the members of the DiSIEM consortium.
PUBLICATIONS
DELIVERABLES
DiSIEM project leaflet
The DiSIEM Consortium. DiSIEM Project Overview. September 2016.
Secure Long-term Archival and Sharing of Critical Data leaflet
OSINT Threat Detector leaflet
Multi-level Risk Manager leaflet
Skeptic II Framework leaflet
Phong H. Nguyen, Cagatay Turkay, Gennady Andrienko, Natalia Andrienko and Olivier Thonnard, A Visual Analytics Approach for User Behaviour Understanding through Action Sequence Analysis, EuroVA 2017, June 12-13, 2017, Barcelona, Spain.
João Alves, Ana Respício, Ivo Rosa, Pedro Rodrigues, Threat Intelligence – Improving SIEM cybercriminality awareness using information from IP blacklists, eCrime2017.EU – APWG.EU Symposium on Electronic Crime Research, October 24-26, 2017, Porto, Portugal.
Eduardo Viegas, Altair Santin, Nuno Neves, Alysson Bessani, Vilmar Abreu. A Resilient Stream Learning Intrusion Detection Mechanism for Real-time Analysis of Network Traffic. Proc. of the IEEE Global Communications Conference – Globecom 2017. Singapore, December 2017.
Phong H. Nguyen, Cagatay Turkay, Gennady Andrienko, Natalia Andrienko, Olivier Thonnard, Jihane Zouaoui. Understanding User Behaviour through Action Sequences: from the Usual to the Unusual. IEEE Transactions on Visualization and Computer Graphics. Accepted for publication. July 2018. (doi: 10.1109/TVCG.2018.2859969)
Henrique Mendes, Ibéria Medeiros, Nuno Neves. Validating and Securing DLMS/COSEM Implementations with the ValiDLMS Framework. Proc of the 3rd Workshop on Security and Dependability of Critical Embedded Real-Time Systems – CERTS’18 (together with IEEE/IFIP DSN’18). Luxembourg. July 2018.
P. Marques, Z. Dabbabi, M-M Mironescu, O. Thonnard, A. Bessani, F. Buontempo, I. Gashi. Using Diverse Detectors for Detecting Malicious Web Scraping Activity. Fast Abstract at the IEEE/IFIP International Conference on Dependable Systems and Networks – DSN’18. Luxembourg. July 2018.
Gustavo Gonzalez-Granadillo, Susana Gonzalez-Zarzosa, Mario Faiella. Towards an Enhanced Security Data Analytic Platform. Proc. of the 15th International Conference on Security and Cryptography – SECRYPT’18. Porto, Portugal. July 2018.
Luis Sacramento, Ibéria Medeiros, João Bota, Miguel Correia. FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data using Network Flows. Proc. of the 17th IEEE International Conference On Trust, Security, and Privacy In Computing And Communications – TrustCom’18. New York, USA. July 2018.
I. Gashi, H. Asad. Diversity in Open Source Intrusion Detection Systems. Proc. of the 37th International Conference on Computer Safety, Reliability, and Security – SAFECOMP 2018. Västerås, Sweden. September 2018.
Ivo Vacas, Ibéria Medeiros, Nuno Neves. Detecting Network Threats using OSINT Knowledge-based IDS. Proc. of the 14th European Dependable Computing Conference – EDCC’18. Iasi, Romania. September 2018.
Rui Azevedo, Iberia Medeiros, Alysson Bessani. Automated Solution for Enrichment and Quality IoC Creation from OSINT. Inforum 2018. Coimbra, Portugal. September 2018.
Siming Chen, Shuai Chen, Natalia Andrienko, Gennady Andrienko, Phong H. Nguyen, Cagatay Turkay, Olivier Thonnard, Xiaoru Yuan. User Behavior Map: Visual Exploration for Cyber Security Session Data. Proceedings of 2018 IEEE Symposium on Visualization for Cyber Security – VizSec’18, Berlin, Germany, October 2018.
Phong H. Nguyen, Siming Chen, Natalia Andrienko, Michael Kamp, Linara Adilova, Gennady Andrienko, Olivier Thonnard, Alysson Bessani, Cagatay Turkay. Designing Visualisation Enhancements for SIEM Systems. Poster paper at 15th IEEE Symposium on Visualization for Cyber Security – VizSec 2018. Berlin, Germany. October 2018.
Phong H. Nguyen, Siming Chen, Natalia Andrienko, Gennady Andrienko, Olivier Thonnard, Cagatay Turkay. Doing User Behaviour Analytics through Interactive Visual User Profiles. Poster paper at 15th IEEE Symposium on Visualization for Cyber Security – VizSec 2018. Berlin, Germany. October 2018.
Alysson Bessani. Cybersecurity monitoring: a critical concern. Open Access Government. ISSN 2516-3817. October 2018.
Olivier Thonnard, Zayani Dabbabi, Miruna Mironescu, Damien Fontanes. SKEPTIC: Reinforcing Application Security through User Behavioural Analysis. CESAR 2018. November 2018.
P. Marques, Z. Dabbabi, M-M Mironescu, O. Thonnard, A. Bessani, F. Buontempo, I. Gashi. Detecting Malicious Web Scraping Activity: a Study with Diverse Detectors. Proc. of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing – PRDC’18. Taipei, Taiwan. December 2018.
Alysson Bessani. Automaticaly Finding New Cybersecurity Threats with Open Source Intelligence. Open Access Government. ISSN 2516-3817. January 2019.
Siming Chen, Natalia Andrienko, Gennady Andrienko, Linara Adilova, Jeremie Barlet, Joerg Kindermann, Phong Hai Nguyen, Olivier Thonnard, Cagatay Turkay. LDA Ensembles for Interactive Exploration and Categorization of Behaviors. IEEE Transactions on Visualization and Computer Graphics. Accepted for publication. March 2019. (doi: 10.1109/TVCG.2019.2904069)
Y. Movahedi, M. Cukier, A. Andongabo, I. Gashi. Cluster-based Vulnerability Assessment of Operating Systems and Web Browsers. Computing 101:2. February 2019.
Eduardo Viegas, Altair Santin, Alysson Bessani, Nuno Neves. BigFlow: Real-time and Reliable Anomaly-based Intrusion Detection for High-Speed Networks. Future Generation Computer Systems 93. April 2019.
Ricardo Mendes, Tiago Oliveira, Vinicius Cogo, Nuno Neves, Alysson Bessani. Charon: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data. IEEE Transactions on Cloud Computing. Accepted in May 2019. (doi: 10.1109/TCC.2019.2916856)
Fernando Alves, André Correia, Aurélien Bettini, Pedro M. Ferreira and Alysson Bessani. Design of a Classification Model for a Twitter-based Streaming Threat Monitor. Workshop on Data-Centric Dependability and Security – DCDS 2019 (co-located with IEEE/IFIP DSN 2019), Portland, USA. June 2019.
Cláudio Martins, Ibéria Medeiros. Generating Threat Intelligence by Classification and Association of Security Events (research statement). Workshop on Data-Centric Dependability and Security – DCDS 2019 (co-located with IEEE/IFIP DSN 2019), Portland, USA. June 2019.
G. Gonzalez-Granadillo, M. Faiella, I. Medeiros, R. Azevedo, S. Gonzalez-Zarzosa. Enhancing Information Sharing and Visualization Capabilities in Security Data Analytic Platforms. Workshop on Data-Centric Dependability and Security – DCDS 2019 (co-located with IEEE/IFIP DSN 2019), Portland, USA. June 2019.
Linara Adilova, Livin Natious, Siming Chen, Olivier Thonnard and Michael Kamp. System Misuse Detection via Informed Behavior Clustering and Modeling. Workshop on Data-Centric Dependability and Security – DCDS 2019 (co-located with IEEE/IFIP DSN 2019), Portland, USA. June 2019.
M. Faiella, G. Gonzalez-Granadillo, I. Medeiros, R. Azevedo, S. Gonzalez-Zarzosa. Enriching Threat Intelligence Platforms Capabilities. Proc. of the 16th International Conference on Security and Cryptography – SECRYPT’19. July 2019.
G. Gonzalez Granadillo, R. Diaz, I. Medeiros, S. Gonzalez-Zarzosa, D. Machnicki. LADS: A Live Anomaly Detection System based on Machine Learning Methods. Proc. of the 16th International Conference on Security and Cryptography – SECRYPT’19. July 2019.
Nuno Dionísio, Fernando Alves, Pedro M Ferreira, Alysson Bessani. Cyberthreat Detection from Twitter using Deep Neural Networks. International Joint Conference on Neural Networks – IJCNN 2019. July 2019.
Rui Azevedo, Ibéria Medeiros, Alysson Bessani. PURE: Generating Quality Threat Intelligence by Clustering and Correlating OSINT. Proc. of the 18th IEEE International Conference On Trust, Security, and Privacy In Computing And Communications – TrustCom’19. Rotorua, New Zealand. August 2019
Luís Sacramento, Ibéria Medeiros, João Bota, Miguel Correia. Detecting Botnets and Unknown Network Attacks in Big Traffic Data. In Botnets: Architectures, Countermeasures, and Challenges. Book chapter accepted on July 2019.
Phong H Nguyen, Rafael Henkin, Siming Chen, Natalia Andrienko, Gennady Andrienko, Olivier Thonnard, Cagatay Turkay. VASABI: Hierarchical User Profiles for Interactive Visual User Behaviour Analytics. IEEE Transactions on Visualization and Computer Graphics. Accepted for publication. August 2019. (doi: 10.1109/TVCG.2019.2934609)
Adriano Serckumecka, Ibéria Medeiros, Bernardo Ferreira, Alysson Bessani. A Cost-Effective Cloud Event Archival for SIEMs. Proc. of the 1st Workshop on Distributed and Reliable Storage Systems – DRSS’19 (together with SRDS 2019), Lyon, France, October 2019.
Yazdan Movahedi, Michel Cukier, Ilir Gashi. Vulnerability prediction capability: A comparison between vulnerability discovery models and neural network models. Computers & Security, Volume 87, November 2019. (doi.org/10.1016/j.cose.2019.101596)
Adriano Serckumecka, Ibéria Medeiros, Bernardo Ferreira, Alysson Bessani. SLiCER: Safe Long-term Cloud Event Archival. Proc. of the 24th IEEE Pacific Rim International Symposium on Dependable Computing – PRDC 2019. December 2019.
Miguel Garcia, Nuno Neves, Alysson Bessani. Lazarus: Automatic Management of Diversity in BFT Systems. Proc. of the ACM/IFIP International Middleware Conference – Middleware’19. Davis, USA. December 2019. Best Student Paper Award.
Fernando Alves, Aurélien Bettini, Pedro M. Ferreira, Alysson Bessani. Processing Tweets for Cybersecurity Threat Awareness. Information Systems. Available online. July 2020. (preprint also available on arXiv:1904.02072)
Nuno Dionísio, Fernando Alves, Pedro M Ferreira, Alysson Bessani. Towards end-to-end Cyberthreat Detection from Twitter using Multi-Task Learning. International Joint Conference on Neural Networks – IJCNN 2020. July 2020.
Fernando Alves, Ambrose Andongabo, Ilir Gashi, Pedro M Ferreira, Alysson Bessani. Follow the blue bird: A study on threat data published on Twitter. European Symposium on Research in Computer Security – ESORICS 2020. September 2020.
D2.1 – In-depth analysis of SIEMs extensibility
D2.2 – Reference architecture and integration plan
D3.1 – Security metrics and measurements
D3.2 – Probabilistic Modelling of Diversity for Security and Security Trends
D3.3 – Refinements of the models and metrics based on pilot deployments
D4.1 – Techniques and tools for OSINT-based threat analysis
D4.2 – OSINT data fusion and analysis architecture
D4.3 – OSINT threat preditors prototype
D4.4 – OSINT threat preditors final
D5.1 – Visualization system infrastructure and requirement analysis
D5.2 – Early-stage prototypes
D5.3 – Fully operating, integrated visualisation system with diverse SIEMs
D6.1 – Preliminary architecture and service model of infrastructure enhancements
D6.2 – Early stage of the prototype of the components
D6.3 – Final prototype of the components
D7.1 – Validation plan
D7.2 – Use-case demonstrators
D7.3 – Validation results
D8.1 – Internal and External IT Communication Infrastructure
D8.2 – Data Management Plan
D8.3 – Intermediate business plan and exploitation report
D8.4 – Business plan and exploitation report
D8.5 – Results of the competition on machine learning for security
D9.1 – Project Quality Plan
D9.2 – Risk Assessment Plan