Anomaly Management using Complex Event Processing. Bastian Hoßbach and Bernhard Seeger

Size: px
Start display at page:

Download "Anomaly Management using Complex Event Processing. Bastian Hoßbach and Bernhard Seeger"

Transcription

1 Anomaly Management using Complex Processing Bastian Hoßbach and Bernhard Seeger Int l Conference on Extending Database Technology Genoa, Italy March 19, 2013

2 Agenda Introduction Enhanced complex event processing Conclusion Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 1

3 Why Complex Processing? Impact Situation of Interest! Time Reaction Costs Options Benefit In order to be able to react on situations of interest (SOI) optimally, continuous monitoring in (near) real-time is necessary Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 2

4 State of the Art: Static Complex Processing Static event processing agents () support: Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 3

5 State of the Art: Static Complex Processing Static event processing agents () support: Signature-based monitoring Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 3

6 State of the Art: Static Complex Processing Static event processing agents () support: Signature-based monitoring Anomaly-based monitoring Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 3

7 Motivation What if there are billions of SOI? What if there are unknown SOI? What if there are context-sensitive SOI? Signatures do not work Anomaly management is needed! Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 4

8 Motivation: Patient Monitoring Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 5

9 Motivation: Logistics Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 6

10 Motivation: Cyber Defense Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 7

11 Flexible, Dynamic and Reactive CEP Infrastructures Input Matchmaker D Model D D D Simulator Output Matchmaker Action Framework Dynamic event processing agents (D) support: Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 8

12 Flexible, Dynamic and Reactive CEP Infrastructures Input Matchmaker D Model D D D Simulator Output Matchmaker Action Framework Dynamic event processing agents (D) support: Signature-based monitoring Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 8

13 Flexible, Dynamic and Reactive CEP Infrastructures Input Matchmaker D Model D D D Simulator Output Matchmaker Action Framework Dynamic event processing agents (D) support: Signature-based monitoring Anomaly-based monitoring Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 8

14 Matchmakers Input Matchmaker Output Matchmaker Flexible routing and transformation of events / independence Changes of event sources do not require adjustments of /sink independence Changes of do not require adjustments of event sinks Inter- independence Changes of do not require adjustments of the other Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 9

15 Input Matchmaker Output Matchmaker High-performance database to record and index events Optimized for fast writes and scalability Efficient support of temporal queries On-demand secondary indexes Fast garbage collection and compression of tenured events Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 10

16 Model Input Matchmaker Model Output Matchmaker Management of models that describe normal behavior of monitored objects with respect to a certain context Models are selected, created and maintained on the basis of historical data from the event store Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 11

17 Dynamic Input Matchmaker D Model D D D Output Matchmaker Models are used to create and maintain dynamic (D) that search for abnormalities in live event streams All detected anomalies are classified as potential situations of interest and forwarded to the output Because of fast and unpredictable context switches and updates of models, D have to be able to be updated fast Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 12

18 Simulator Input Matchmaker D Model D D D Simulator Output Matchmaker Isolated execution environment for testing, debugging and evaluating D as well as models Real data is taken from the event store What-if analyses and continuous evaluations incrementally increase quality of D Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 13

19 Action Framework Input Matchmaker D Model D D D Simulator Output Matchmaker Action Framework Current CEP infrastructures are not reactive Detected situations of interest are just reported Reactive CEP infrastructures need an action framework that allows to create actions and to define how they are triggered Provenance becomes very important Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 14

20 Conclusion State of the art CEP technology has multiple shortcomings Not applicable in some important application domains Many existing CEP-based monitoring systems can not develop their full potential CEP technology has to be improved and extended Flexibility Matchmakers Dynamics Dynamic Reactivity Action Framework Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 15

21 Ongoing Work We are working on the outlined dynamic CEP infrastructure Target use-case: IT-security Detection of SQL injections Detection of intruders in post-exploitation phase Other active research projects are related to dynamic CEP Active CEP Semantic CEP Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 16

22 Thanks Dieter Gawlick for great discussions BMBF for funding ACCEPT Bastian Hoßbach, Bernhard Seeger Anomaly Management using CEP 17

How To Create An Integrated Visualization For A Network Security System (For A Free Download)

How To Create An Integrated Visualization For A Network Security System (For A Free Download) Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources Bastian Hellmann Trust@HsH Research Group University of Applied Sciences and Arts in Hanover July 13th 2015 GraMSec

More information

Intrusion Detection for Mobile Ad Hoc Networks

Intrusion Detection for Mobile Ad Hoc Networks Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems

More information

CLOUD BASED SEMANTIC EVENT PROCESSING FOR

CLOUD BASED SEMANTIC EVENT PROCESSING FOR CLOUD BASED SEMANTIC EVENT PROCESSING FOR MONITORING AND MANAGEMENT OF SUPPLY CHAINS A VLTN White Paper Dr. Bill Karakostas [email protected] Executive Summary Supply chain visibility is essential

More information

Building Heavy Load Messaging System

Building Heavy Load Messaging System CASE STUDY Building Heavy Load Messaging System About IntelliSMS Intelli Messaging simplifies mobile communication methods so you can cost effectively build mobile communication into your business processes;

More information

USING COMPLEX EVENT PROCESSING TO MANAGE PATTERNS IN DISTRIBUTION NETWORKS

USING COMPLEX EVENT PROCESSING TO MANAGE PATTERNS IN DISTRIBUTION NETWORKS USING COMPLEX EVENT PROCESSING TO MANAGE PATTERNS IN DISTRIBUTION NETWORKS Foued BAROUNI Eaton Canada [email protected] Bernard MOULIN Laval University Canada [email protected] ABSTRACT

More information

How To Prevent Hacker Attacks With Network Behavior Analysis

How To Prevent Hacker Attacks With Network Behavior Analysis E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal

More information

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic

More information

SIMATIC IT Value Added Services. Siemens AG 2011. All Rights Reserved.

SIMATIC IT Value Added Services. Siemens AG 2011. All Rights Reserved. Value Added Services Siemens AG 2011. All Rights Reserved. Value Added Services (VAS) A broad concept of Customer Care Value Added Services Maintenance Program A comprehensive Maintenance Offering for

More information

Accelerating Hadoop MapReduce Using an In-Memory Data Grid

Accelerating Hadoop MapReduce Using an In-Memory Data Grid Accelerating Hadoop MapReduce Using an In-Memory Data Grid By David L. Brinker and William L. Bain, ScaleOut Software, Inc. 2013 ScaleOut Software, Inc. 12/27/2012 H adoop has been widely embraced for

More information

Taxonomy of Intrusion Detection System

Taxonomy of Intrusion Detection System Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use

More information

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts

More information

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION 18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK

More information

Enterprise Energy Management with JouleX and Cisco EnergyWise

Enterprise Energy Management with JouleX and Cisco EnergyWise Enterprise Energy Management with JouleX and Cisco EnergyWise Introduction Corporate sustainability and enterprise energy management are pressing initiatives for organizations dealing with rising energy

More information

Middleware support for the Internet of Things

Middleware support for the Internet of Things Middleware support for the Internet of Things Karl Aberer, Manfred Hauswirth, Ali Salehi School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL) CH-1015 Lausanne,

More information

High End Information Security Services

High End Information Security Services High End Information Security Services Welcome Trion Logics Security Solutions was established after understanding the market's need for a high end - End to end security integration and consulting company.

More information

Software as a Service (SaaS) Testing Challenges- An Indepth

Software as a Service (SaaS) Testing Challenges- An Indepth www.ijcsi.org 506 Software as a Service (SaaS) Testing Challenges- An Indepth Analysis Prakash.V Ravikumar Ramadoss Gopalakrishnan.S Assistant Professor Department of Computer Applications, SASTRA University,

More information

CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS

CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 66 CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 5.1 INTRODUCTION In this research work, two new techniques have been proposed for addressing the problem of SQL injection attacks, one

More information

Huawei Network Edge Security Solution

Huawei Network Edge Security Solution Huawei Network Edge Security Huawei Network Edge Security Solution Enterprise Campus Network HUAWEI TECHNOLOGIES CO., LTD. Huawei Network Edge Security Solution Huawei Network Edge Security 1 Overview

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics

More information

Complex, true real-time analytics on massive, changing datasets.

Complex, true real-time analytics on massive, changing datasets. Complex, true real-time analytics on massive, changing datasets. A NoSQL, all in-memory enabling platform technology from: Better Questions Come Before Better Answers FinchDB is a NoSQL, all in-memory

More information

Supply Chain Optimization for Logistics Service Providers. White Paper

Supply Chain Optimization for Logistics Service Providers. White Paper Supply Chain Optimization for Logistics Service Providers White Paper Table of contents Solving The Big Data Challenge Executive Summary The Data Management Challenge In-Memory Analytics for Big Data Management

More information

Test Data Management Best Practice

Test Data Management Best Practice Test Data Management Best Practice, Inc. 5210 Belfort Parkway, Suite 400 Author: Stephanie Chace Quality Practice Lead [email protected], Inc. 2011 www.meridiantechnologies.net Table of

More information

Complex Event Processing (CEP) Why and How. Richard Hallgren BUGS 2013-05-30

Complex Event Processing (CEP) Why and How. Richard Hallgren BUGS 2013-05-30 Complex Event Processing (CEP) Why and How Richard Hallgren BUGS 2013-05-30 Objectives Understand why and how CEP is important for modern business processes Concepts within a CEP solution Overview of StreamInsight

More information

Applying SDN to Network Management Problems. Nick Feamster University of Maryland

Applying SDN to Network Management Problems. Nick Feamster University of Maryland Applying SDN to Network Management Problems Nick Feamster University of Maryland 1 Addressing the Challenges of Network Management Challenge Approach System Frequent Changes Event-Based Network Control

More information

Case Study: Real-time Analytics With Druid. Salil Kalia, Tech Lead, TO THE NEW Digital

Case Study: Real-time Analytics With Druid. Salil Kalia, Tech Lead, TO THE NEW Digital Case Study: Real-time Analytics With Druid Salil Kalia, Tech Lead, TO THE NEW Digital Agenda Understanding the use-case Ad workflow Our use case Experiments with technologies Redis Cassandra Introduction

More information

The Devils Behind Web Application Vulnerabilities

The Devils Behind Web Application Vulnerabilities The Devils Behind Web Application Vulnerabilities Defending against Web Application Vulnerabilities IEEE Computer, February 2012 Nuno Antunes, Marco Vieira {nmsa, mvieira}@dei.uc.pt Postgrad Colloquium

More information

Smart cyber security for smart cities

Smart cyber security for smart cities Competence Series Smart cyber security for smart cities 1 IT Security made in Europe Cities are becoming smarter Population growth, urbanisation trends and climate change are driving a process of continuous

More information

Solution Overview. Vitria Technology s Cyber Security Solution

Solution Overview. Vitria Technology s Cyber Security Solution Solution Overview > Vitria Technology s Cyber Security Solution 1 Table of Contents 1 Executive Overview 2 Value of Vitria s Real-Time Cyber Security Solution 3 Vitria s Cyber Security Solution Software

More information

The Power of Risk, Compliance & Security Management in SAP S/4HANA

The Power of Risk, Compliance & Security Management in SAP S/4HANA The Power of Risk, Compliance & Security Management in SAP S/4HANA OUR AGENDA Key Learnings Observations on Risk & Compliance Management Current State Current Challenges The SAP GRC and Security Solution

More information

Security Model for Multi-Tier Web Application by Using Double Guard

Security Model for Multi-Tier Web Application by Using Double Guard Security Model for Multi-Tier Web Application by Using Double Guard SnehalKhedkar 1, Mangal Vetal 2, Surekha Kotkar 3, R. S. Tambe 4 1,2,3 B.E. Computer, 4 M.E.Computer, P.R.E.C. Loni Abstract- The use

More information

A B S T R A C T. Index Terms: DoubleGuard; database server; intruder; web server I INTRODUCTION

A B S T R A C T. Index Terms: DoubleGuard; database server; intruder; web server I INTRODUCTION Intervention Detection System Using DoubleGuard Technique Web Application. Prof.P.M.Bhujbal, Prof.S.V.Gumaste, Mr.N.S.Jadhav, Mr.S.N.Dhage Department Of Computer Engineering Jaihind College Of Engineering,

More information

WHITE PAPER ON. Operational Analytics. HTC Global Services Inc. Do not copy or distribute. www.htcinc.com

WHITE PAPER ON. Operational Analytics. HTC Global Services Inc. Do not copy or distribute. www.htcinc.com WHITE PAPER ON Operational Analytics www.htcinc.com Contents Introduction... 2 Industry 4.0 Standard... 3 Data Streams... 3 Big Data Age... 4 Analytics... 5 Operational Analytics... 6 IT Operations Analytics...

More information

Emerging Geospatial Trends The Convergence of Technologies. Jim Steiner Vice President, Product Management

Emerging Geospatial Trends The Convergence of Technologies. Jim Steiner Vice President, Product Management Emerging Geospatial Trends The Convergence of Technologies Jim Steiner Vice President, Product Management United Nation Analysis Initiative on Global GeoSpatial Information Management Future Trends Technology

More information

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee

More information

Complexity and Scalability in Semantic Graph Analysis Semantic Days 2013

Complexity and Scalability in Semantic Graph Analysis Semantic Days 2013 Complexity and Scalability in Semantic Graph Analysis Semantic Days 2013 James Maltby, Ph.D 1 Outline of Presentation Semantic Graph Analytics Database Architectures In-memory Semantic Database Formulation

More information

THE DEVELOPER GUIDE TO BUILDING STREAMING DATA APPLICATIONS

THE DEVELOPER GUIDE TO BUILDING STREAMING DATA APPLICATIONS THE DEVELOPER GUIDE TO BUILDING STREAMING DATA APPLICATIONS WHITE PAPER Successfully writing Fast Data applications to manage data generated from mobile, smart devices and social interactions, and the

More information

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology [email protected] Abstract intrusion detection

More information

Prevention, Detection, Mitigation

Prevention, Detection, Mitigation Thesis for the Degree of DOCTOR OF PHILOSOPHY Multifaceted Defense Against Distributed Denial of Service Attacks: Prevention, Detection, Mitigation Zhang Fu Division of Networks and Systems Department

More information

Tagetik Extends Customer Value with SQL Server 2012

Tagetik Extends Customer Value with SQL Server 2012 Tagetik Extends Customer Value with SQL Server 2012 Author: Dave Kasabian Contributors: Marco Pierallini, Luca Pieretti Published: February 2012 Summary: As the 2011 Microsoft ISV Line of Business partner

More information

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection

More information

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation

Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation Adaptive Distributed Traffic Control Service for DDoS Attack Mitigation Bernhard Plattner, ETH ZürichZ Joint work with Matthias Bossardt and Thomas Dübendorfer TIK ETH Zürich UK ProgNet Workshop, 1st December

More information

Network Based Intrusion Detection Using Honey pot Deception

Network Based Intrusion Detection Using Honey pot Deception Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

TIBCO Cyber Security Platform. Atif Chaughtai

TIBCO Cyber Security Platform. Atif Chaughtai TIBCO Cyber Security Platform Atif Chaughtai 2 TABLE OF CONTENTS 1 Introduction/Background... 3 2 Current Challenges... 3 3 Solution...4 4 CONCLUSION...6 5 A Case in Point: The US Intelligence Community...7

More information

Real-time Big Data Analytics with Storm

Real-time Big Data Analytics with Storm Ron Bodkin Founder & CEO, Think Big June 2013 Real-time Big Data Analytics with Storm Leading Provider of Data Science and Engineering Services Accelerating Your Time to Value IMAGINE Strategy and Roadmap

More information

Towards a Thriving Data Economy: Open Data, Big Data, and Data Ecosystems

Towards a Thriving Data Economy: Open Data, Big Data, and Data Ecosystems Towards a Thriving Data Economy: Open Data, Big Data, and Data Ecosystems Volker Markl [email protected] dima.tu-berlin.de dfki.de/web/research/iam/ bbdc.berlin Based on my 2014 Vision Paper On

More information

How To Handle Big Data With A Data Scientist

How To Handle Big Data With A Data Scientist III Big Data Technologies Today, new technologies make it possible to realize value from Big Data. Big data technologies can replace highly customized, expensive legacy systems with a standard solution

More information

Complete Protection against Evolving DDoS Threats

Complete Protection against Evolving DDoS Threats Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 Advanced Database Performance Analysis Techniques Using Metric Extensions and SPA Mughees A. Minhas VP of Product Management Oracle 2 Program Agenda Database Performance Analysis Challenges Advanced

More information

Open Source DBMS CUBRID 2008 & Community Activities. Byung Joo Chung [email protected]

Open Source DBMS CUBRID 2008 & Community Activities. Byung Joo Chung bjchung@cubrid.com Open Source DBMS CUBRID 2008 & Community Activities Byung Joo Chung [email protected] Agenda Open Source DBMS CUBRID 2008 CUBRID Community Activities Open Source DBMS CUBRID 2008 Open Source DBMS CUBRID

More information

Cisco Network Foundation Protection Overview

Cisco Network Foundation Protection Overview Cisco Network Foundation Protection Overview June 2005 1 Security is about the ability to control the risk incurred from an interconnected global network. Cisco NFP provides the tools, technologies, and

More information

High Performance Data Management Use of Standards in Commercial Product Development

High Performance Data Management Use of Standards in Commercial Product Development v2 High Performance Data Management Use of Standards in Commercial Product Development Jay Hollingsworth: Director Oil & Gas Business Unit Standards Leadership Council Forum 28 June 2012 1 The following

More information

JOB DESCRIPTION DEPARTMENT: JOB TITLE: Senior Data Analyst JOB GRADE: JOB CODE : REPORTS TO: Senior Manager : Supply Chain Centre

JOB DESCRIPTION DEPARTMENT: JOB TITLE: Senior Data Analyst JOB GRADE: JOB CODE : REPORTS TO: Senior Manager : Supply Chain Centre JOB DESCRIPTION DIVISION: Business Development DEPARTMENT: PMO JOB TITLE: Senior Data Analyst JOB GRADE: JOB CODE : REPORTS TO: Senior Manager : Supply Chain Centre JOB SEGMENT: Key Critical Scarce X X

More information

How To Prevent An Sql Injection Attack

How To Prevent An Sql Injection Attack CHAPTER 1 PROJECT OVERVIEW 1.1 Introduction Database security is the degree to which all data is fully protected from tampering or unauthorized acts. Security vulnerability, security threat and security

More information

Internet of Things. Opportunity Challenges Solutions

Internet of Things. Opportunity Challenges Solutions Internet of Things Opportunity Challenges Solutions Copyright 2014 Boeing. All rights reserved. GPDIS_2015.ppt 1 ANALYZING INTERNET OF THINGS USING BIG DATA ECOSYSTEM Internet of Things matter for... Industrial

More information

Business Intelligence meets Big Data: An Overview on Security and Privacy

Business Intelligence meets Big Data: An Overview on Security and Privacy Business Intelligence meets Big Data: An Overview on Security and Privacy Claudio A. Ardagna Ernesto Damiani Dipartimento di Informatica - Università degli Studi di Milano NSF Workshop on Big Data Security

More information

An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus

An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: [email protected]

More information

How to make BIG DATA work for you. Faster results with Microsoft SQL Server PDW

How to make BIG DATA work for you. Faster results with Microsoft SQL Server PDW How to make BIG DATA work for you. Faster results with Microsoft SQL Server PDW Roger Breu PDW Solution Specialist Microsoft Western Europe Marcus Gullberg PDW Partner Account Manager Microsoft Sweden

More information

Practical Intrusion Analysis

Practical Intrusion Analysis Practical Intrusion Analysis PREVENTION AND DETECTION FOR THE TWENTY-FIRST CENTURY Ryan Trost TT Ar Addison-Wesley Upper Saddle River, NJ Boston Indianapolis * San Francisco New York Toronto Montreal London

More information

Cybersecurity Delivering Confidence in the Cyber Domain

Cybersecurity Delivering Confidence in the Cyber Domain Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your

More information

IBM Cognos Enterprise: Powerful and scalable business intelligence and performance management

IBM Cognos Enterprise: Powerful and scalable business intelligence and performance management : Powerful and scalable business intelligence and performance management Highlights Arm every user with the analytics they need to act Support the way that users want to work with their analytics Meet

More information

SURVEY OF INTRUSION DETECTION SYSTEM

SURVEY OF INTRUSION DETECTION SYSTEM SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT

More information

Big Data-Anwendungsbeispiele aus Industrie und Forschung

Big Data-Anwendungsbeispiele aus Industrie und Forschung Big Data-Anwendungsbeispiele aus Industrie und Forschung Dr. Patrick Traxler +43 7236 3343 898 [email protected] www.scch.at Das SCCH ist eine Initiative der Das SCCH befindet sich im Organizational

More information

Information Security Threats and Strategies. Ted Ericson Product Marketing - ASI

Information Security Threats and Strategies. Ted Ericson Product Marketing - ASI Information Security Threats and Strategies Ted Ericson Product Marketing - ASI Agenda Security breaches today Attack vector mitigation Secure web implementation Penetration testing ASI Corporate Security

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Network Security Deployment (NSD)

Network Security Deployment (NSD) Network Security Deployment (NSD) National Cybersecurity Protection System (NCPS) 11 July 2012 What is the NCPS? National Cybersecurity Protection System (NCPS) is the program of record within the Department

More information

Introduction. Chapter 1

Introduction. Chapter 1 Chapter 1 Introduction The area of fault detection and diagnosis is one of the most important aspects in process engineering. This area has received considerable attention from industry and academia because

More information

Anatomy of Cyber Threats, Vulnerabilities, and Attacks

Anatomy of Cyber Threats, Vulnerabilities, and Attacks Anatomy of Cyber Threats, Vulnerabilities, and Attacks ACTIONABLE THREAT INTELLIGENCE FROM ONTOLOGY-BASED ANALYTICS 1 Anatomy of Cyber Threats, Vulnerabilities, and Attacks Copyright 2015 Recorded Future,

More information

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their

More information

White paper. Keys to SAP application acceleration: advances in delivery systems.

White paper. Keys to SAP application acceleration: advances in delivery systems. White paper Keys to SAP application acceleration: advances in delivery systems. Table of contents The challenges of fast SAP application delivery...3 Solving the acceleration challenge: why traditional

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems

More information

STREAM ANALYTIX. Industry s only Multi-Engine Streaming Analytics Platform

STREAM ANALYTIX. Industry s only Multi-Engine Streaming Analytics Platform STREAM ANALYTIX Industry s only Multi-Engine Streaming Analytics Platform One Platform for All Create real-time streaming data analytics applications in minutes with a powerful visual editor Get a wide

More information

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,

More information

Smarter Transportation Management

Smarter Transportation Management Smarter Transportation Management Smarter Transportation Management An Opportunity for Government to Think and Act in New Ways: Smarter Transportation and Traffic Safety Cate Richards NA Smarter Cities

More information

Big Data, Cloud Computing, Spatial Databases Steven Hagan Vice President Server Technologies

Big Data, Cloud Computing, Spatial Databases Steven Hagan Vice President Server Technologies Big Data, Cloud Computing, Spatial Databases Steven Hagan Vice President Server Technologies Big Data: Global Digital Data Growth Growing leaps and bounds by 40+% Year over Year! 2009 =.8 Zetabytes =.08

More information

Getting Ahead of Malware

Getting Ahead of Malware IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,

More information

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches. Detecting Anomalous Behavior with the Business Data Lake Reference Architecture and Enterprise Approaches. 2 Detecting Anomalous Behavior with the Business Data Lake Pivotal the way we see it Reference

More information

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey

More information

National Initiative for Cybersecurity Education

National Initiative for Cybersecurity Education THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital

More information

OPEN MODERN DATA ARCHITECTURE FOR FINANCIAL SERVICES RISK MANAGEMENT

OPEN MODERN DATA ARCHITECTURE FOR FINANCIAL SERVICES RISK MANAGEMENT WHITEPAPER OPEN MODERN DATA ARCHITECTURE FOR FINANCIAL SERVICES RISK MANAGEMENT A top-tier global bank s end-of-day risk analysis jobs didn t complete in time for the next start of trading day. To solve

More information

Headstrong: SAP Solution Helps Streamline and Accelerate Financial Services Application Development

Headstrong: SAP Solution Helps Streamline and Accelerate Financial Services Application Development 2012 SAP AG. All rights reserved. Headstrong: SAP Helps Streamline and Accelerate Financial Services Application Development Headstrong, a Genpact company Industry High tech software integration and development

More information

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose

More information

Server Consolidation with SQL Server 2008

Server Consolidation with SQL Server 2008 Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations

More information

Hillstone Intelligent Next Generation Firewall

Hillstone Intelligent Next Generation Firewall Hillstone Intelligent Next Generation Firewall Kris Nawani Solution Manager (Thailand) 12 th March 2015 1 About Hillstone Networks Founded 2006 by Netscreen visionaries World class team with security,

More information