Skip to main content
European Commission logo
polski polski
CORDIS - Wyniki badań wspieranych przez UE
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Secure Information Sharing Sensor Delivery event Network

Rezultaty

Final legal requirements

Updated version of D2.2.

Final data analysis results

Final results of T5.1, T5.2 and T5.3, using T5.4 as the basis. The report will detail the advances made in this WP, including the novel insights derived from the individual and combined data sets and suggestions for fellow researchers.

Final dissemination report

Final version of D2.1, including data from the second reporting period.

Preliminary legal requirements

This deliverable will document the management of all legal aspects and deployment strategy, as well as the IPR management. Particular attention will be paid to the law differences among the member states as well as other Countries where SISSDEN will be operated, focusing on European level, but with paying attention to sensible regions outside Europe.

Qualitative and quantitative assessment report

Essential assessment of both the qualitative and quantitative success and impact of the SISSDEN pilot.

Data exchange interfaces specification

Specification of data exchange interfaces and mechanisms used in SISSDEN.

Trial definition and test plan

Technical trial and testing plan documents, updated regularly during the WP6 pilot phase to ensure successful testing of all SISSDEN pilot phase elements.

Metrics specification and results

This deliverable presents the final set of metrics derived from the data available to the consortium and their application for cross-country and cross-region comparisons. With interactive and searchable online metrics & statistical mapping.

Preliminary data analysis specification

The deliverable documents the new analyses developed in T5.1, T5.2 and T5.3, including a preliminary specification of new information they provide.

Interim dissemination report

This report is an instrument that will allow following the awareness actions done by the project partners throughout the project. The preliminary version will report past activities and give an overview of actions the planned in the second period, while the final report will contain the list of all activities done at several dissemination level, such as papers, website, links from other reference websites, demonstrations and workshops.

Collaboration and data sharing portals

This deliverable will consist of web services to support the collaboration and sharing of data inside the project and with external participants. The project website is public in general, but may contain non-public sections internal to the consortium.

Project website

The project website will be created at a very early stage of the project and will be kept updated all along project duration. This deliverable represents an important part of Task 2.4 and will be carried out by partners paying attention to exploit the website as a key dissemination and market approach instrument.

Platform user feedback system

Feedback platform to allow SISSDEN consortium members and other vetted system users to provide feedback on SISSDEN system usage.

Publikacje

Botnet Fingerprinting: Anomaly Detection in SMTP Conversations

Autorzy: Piotr Bazydlo, Krzysztof Lasota, Adam Kozakiewicz
Opublikowane w: IEEE Security & Privacy, Numer 15/6, 2017, Strona(/y) 25-32, ISSN 1540-7993
Wydawca: IEEE Computer Society
DOI: 10.1109/MSP.2017.4251116

Linking Amplification DDoS Attacks to Booter Services

Autorzy: Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy, Michael Backes
Opublikowane w: Research in Attacks, Intrusions, and Defenses. RAID 2017. Lecture Notes in Computer Science., 2016, Strona(/y) 427-449, ISBN 978-3-319-66332-6
Wydawca: Springer International Publishing
DOI: 10.1007/978-3-319-66332-6_19

Evasive Malware via Identifier Implanting

Autorzy: Rui Tanabe, Wataru Ueno, Kou Ishii, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Christian Rossow
Opublikowane w: Detection of Intrusions and Malware, and Vulnerability Assessment, Numer 10885, 2018, Strona(/y) 162-184, ISBN 978-3-319-93410-5
Wydawca: Springer International Publishing
DOI: 10.1007/978-3-319-93411-2_8

teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts

Autorzy: Johannes Krupp, Christian Rossow
Opublikowane w: 27th USENIX Security Symposium (USENIX Security 18), Numer August 15–17, 2018, 2018, Strona(/y) 1317-1333, ISBN 978-1-939133-04-5
Wydawca: USENIX Association

Millions of targets under attack - a macroscopic characterization of the DoS ecosystem

Autorzy: Mattijs Jonker, Alistair King, Johannes Krupp, Christian Rossow, Anna Sperotto, Alberto Dainotti
Opublikowane w: Proceedings of the 2017 Internet Measurement Conference on - IMC '17, 2017, Strona(/y) 100-113, ISBN 9781-450351188
Wydawca: ACM Press
DOI: 10.1145/3131365.3131383

MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps

Autorzy: Michael Brengel, Christian Rossow
Opublikowane w: Detection of Intrusions and Malware, and Vulnerability Assessment, Numer 10885, 2018, Strona(/y) 24-45, ISBN 978-3-319-93410-5
Wydawca: Springer International Publishing
DOI: 10.1007/978-3-319-93411-2_2

MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware.

Autorzy: Sebastian Walla, Christian Rossow
Opublikowane w: 4th IEEE European Symposium on Security and Privacy, Numer 4, 2019, Strona(/y) TBD (in print)
Wydawca: IEEE

Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild

Autorzy: Marius Steffens, Christian Rossow, Martin Johns, Ben Stock
Opublikowane w: Proceedings 2019 Network and Distributed System Security Symposium, 2019, ISBN 1-891562-55-X
Wydawca: Internet Society
DOI: 10.14722/ndss.2019.23009

Świadomość sytuacyjna cyberzagrożeń (eng. Cyber-threat Situational Awareness)

Autorzy: Adam Kozakiewicz
Opublikowane w: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, Numer 8-9, 2018, Strona(/y) 562-568, ISSN 1230-3496
Wydawca: Sigma-NOT

Recurrent Neural Networks for Enhancement of Signature-based Network Intrusion Detection Systems

Autorzy: Sohi, Soroush M.; Ganji, Fatemeh; Seifert, Jean-Pierre
Opublikowane w: Numer 1, 2018
Wydawca: arXiv.org

Cyber-Threat Intelligence from European-wide Sensor Network in SISSDEN

Autorzy: Edgardo Montes de Oca, Jart Armin, Angelo Consoli
Opublikowane w: Challenges in Cybersecurity and Privacy - the European Research Landscape, 2019, Strona(/y) 117-128, ISBN 9788-770220880
Wydawca: River Publishers

Wyszukiwanie danych OpenAIRE...

Podczas wyszukiwania danych OpenAIRE wystąpił błąd

Brak wyników