
Nicola Zannone
Address: Eindhoven, Noord-Brabant, Netherlands
less
Related Authors
Sokratis Vavilis
Eindhoven University of Technology
Ricardo J Santos
Universidade de Coimbra
Jorge Bernardino
Instituto Politécnico de Coimbra
Sandro Etalle
Eindhoven University of Technology
Massimo Ficco
UniversitĂ della Campania Luigi Vanvitelli
Elisa Bertino
Purdue University
Uploads
Papers by Nicola Zannone
in order to detect security incidents. These systems raise alerts when anomalous
activities are detected. The alerts raised have to be analyzed to timely respond
to the security incidents. Their analysis, however, is time-consuming and costly.
This problem increases with the large number of alerts often raised by anomaly detection
systems. To timely and effectively handle security incidents, alerts should
be accompanied by information which allows the understanding of incidents and
their context (e.g., root causes, attack type) and their prioritization (e.g., criticality
level). Unfortunately, the current state of affairs regarding the information about
alerts provided by existing anomaly detection systems is not very satisfactory. This
work presents an anomaly analysis framework that facilitates the analysis of alerts
raised by an anomaly detection system monitoring a database system. The framework
provides an approach to assess the criticality of alerts with respect to the
disclosure of sensitive information and a feature-based approach for the classification
of alerts with respect to database attacks. The framework has been deployed as
a web-based alert audit tool that provides alert classification and risk-based ranking
capabilities, significantly easing the analysis of alerts. We validate the classification
and ranking approaches using synthetic data generated through an existing
healthcare management system.
for organizations. To this end, data leakage solutions are usually employed by
organizations to monitor network traffic and the use of portable storage devices.
These solutions often produce a large number of alerts, whose analysis is timeconsuming
and costly for organizations. To effectively handle leakage incidents,
organizations should be able to focus on the most severe incidents. Therefore,
alerts need to be prioritized with respect to their severity. This work presents
a novel approach for the quantification of data leakages based on their severity.
The approach quantifies leakages with respect to the amount and sensitivity of the
leaked information as well as the ability to identify the data subjects of the leaked
information. To specify and reason on data sensitivity in an application domain,
we propose a data model representing the knowledge in the domain. We validate
our approach by analyzing data leakages within a healthcare environment.""
The aim of this survey is to propose a framework for the analysis of reputation systems. We elicit the requirements for reputations metrics along with the features necessary to achieve such requirements. The identified requirements and features form a reference framework which allows an objective evaluation and comparison of reputation systems. We demonstrate its applicability by analyzing and classifying a number of existing reputation systems. Our framework can serve as a reference model for the analysis of reputation systems. It is also helpful for the design of new reputation systems as it provides an analysis of the implications of design choices.
in healthcare practices. Data reliability, however, is
crucial for the acceptance of these new services. This work
presents a semi-automated system to evaluate the quality
of medical measurements taken by patients. The system relies
on data qualifiers to evaluate various quality aspects
of measurements. The overall quality of measurements is
determined on the basis of these qualifiers enhanced with
a troubleshooting mechanism. Namely, the troubleshooting
mechanism guides healthcare professionals in the investigation
of the root causes of low quality values."
of data leakage is crucial to reduce possible damages. Therefore, breaches should be detected as early as
possible, e.g., when data are leaving the database. In this paper, we focus on data leakage detection by
monitoring database activities. We present a framework that automatically learns normal user behavior, in
terms of database activities, and detects anomalies as deviation from such behavior. In addition, our approach
explicitly indicates the root cause of an anomaly. Finally, the framework assesses the severity of data leakages
based on the sensitivity of the disclosed data.
in order to detect security incidents. These systems raise alerts when anomalous
activities are detected. The alerts raised have to be analyzed to timely respond
to the security incidents. Their analysis, however, is time-consuming and costly.
This problem increases with the large number of alerts often raised by anomaly detection
systems. To timely and effectively handle security incidents, alerts should
be accompanied by information which allows the understanding of incidents and
their context (e.g., root causes, attack type) and their prioritization (e.g., criticality
level). Unfortunately, the current state of affairs regarding the information about
alerts provided by existing anomaly detection systems is not very satisfactory. This
work presents an anomaly analysis framework that facilitates the analysis of alerts
raised by an anomaly detection system monitoring a database system. The framework
provides an approach to assess the criticality of alerts with respect to the
disclosure of sensitive information and a feature-based approach for the classification
of alerts with respect to database attacks. The framework has been deployed as
a web-based alert audit tool that provides alert classification and risk-based ranking
capabilities, significantly easing the analysis of alerts. We validate the classification
and ranking approaches using synthetic data generated through an existing
healthcare management system.
for organizations. To this end, data leakage solutions are usually employed by
organizations to monitor network traffic and the use of portable storage devices.
These solutions often produce a large number of alerts, whose analysis is timeconsuming
and costly for organizations. To effectively handle leakage incidents,
organizations should be able to focus on the most severe incidents. Therefore,
alerts need to be prioritized with respect to their severity. This work presents
a novel approach for the quantification of data leakages based on their severity.
The approach quantifies leakages with respect to the amount and sensitivity of the
leaked information as well as the ability to identify the data subjects of the leaked
information. To specify and reason on data sensitivity in an application domain,
we propose a data model representing the knowledge in the domain. We validate
our approach by analyzing data leakages within a healthcare environment.""
The aim of this survey is to propose a framework for the analysis of reputation systems. We elicit the requirements for reputations metrics along with the features necessary to achieve such requirements. The identified requirements and features form a reference framework which allows an objective evaluation and comparison of reputation systems. We demonstrate its applicability by analyzing and classifying a number of existing reputation systems. Our framework can serve as a reference model for the analysis of reputation systems. It is also helpful for the design of new reputation systems as it provides an analysis of the implications of design choices.
in healthcare practices. Data reliability, however, is
crucial for the acceptance of these new services. This work
presents a semi-automated system to evaluate the quality
of medical measurements taken by patients. The system relies
on data qualifiers to evaluate various quality aspects
of measurements. The overall quality of measurements is
determined on the basis of these qualifiers enhanced with
a troubleshooting mechanism. Namely, the troubleshooting
mechanism guides healthcare professionals in the investigation
of the root causes of low quality values."
of data leakage is crucial to reduce possible damages. Therefore, breaches should be detected as early as
possible, e.g., when data are leaving the database. In this paper, we focus on data leakage detection by
monitoring database activities. We present a framework that automatically learns normal user behavior, in
terms of database activities, and detects anomalies as deviation from such behavior. In addition, our approach
explicitly indicates the root cause of an anomaly. Finally, the framework assesses the severity of data leakages
based on the sensitivity of the disclosed data.