Ecole d'ingénieur et centre de recherche en Sciences du numérique

Large scale data analysis for system security

Balzarotti, Davide

Invited Keynote Speech at CISIS, 7th International Conference on Computational Intelligence in Security for Information Systems, 25-27 June 2014, Bilbao, Spain

Certain phenoma do not manifest themselves on a small scale. For example, if you check the spam messages received by a single company you may not notice any pattern. But by looking at millions of spam messages collected worldwide, some structure can suddenly emerge and it may become possible to recognize spam campaigns, and even the infrastructure responsible for sending them. The same concept applies to many other security areas, from botnet detection to malware analysis, from web-based infection to network intrusion detection systems. In this talk, I will present some of the advantages of performing large scale analysis in the area of system security. In particular, I will describe several case studies, using results we obtained in the areas of embedded systems, online scam analysis, user risk profiling, and botnet detection as main running examples.

Bibtex

Titre:Large scale data analysis for system security
Type:Conférence
Langue:English
Ville:Bilbao
Pays:ESPAGNE
Date:
Département:Sécurité numérique
Eurecom ref:4350
Copyright: © Springer. Personal use of this material is permitted. The definitive version of this paper was published in Invited Keynote Speech at CISIS, 7th International Conference on Computational Intelligence in Security for Information Systems, 25-27 June 2014, Bilbao, Spain and is available at :
Bibtex: @inproceedings{EURECOM+4350, year = {2014}, title = {{L}arge scale data analysis for system security}, author = {{B}alzarotti, {D}avide}, booktitle = {{I}nvited {K}eynote {S}peech at {CISIS}, 7th {I}nternational {C}onference on {C}omputational {I}ntelligence in {S}ecurity for {I}nformation {S}ystems, 25-27 {J}une 2014, {B}ilbao, {S}pain}, address = {{B}ilbao, {ESPAGNE}}, month = {06}, url = {http://www.eurecom.fr/publication/4350} }
Voir aussi: