Anomaly detection based on application system logs
Anomaly detection based on application system logs
May, 2016
Publications
Khan, M. I., Foley, S. N., & O’Sullivan, B. (2020). Towards Privacy-anomaly Detection: Discovering Correlation between
Privacy and Security-anomalies. In E. M. Shakshuki & A.-U.-H. Yasar (Eds.), The 17th International Conference on Mobile Systems and Pervasive
Computing (MobiSPC 2020) / The 15th International Conference on Future
Networks and Communications (FNC-2020) / The 10th International
Conference on Sustainable Energy Information Technology, Leuven, Belgium,
August 9-12, 2020 (Vol. 175, pp. 331–339). Elsevier. https://doi.org/10.1016/j.procs.2020.07.048 [link]
M.I. Khan, S. N. F., & O’Sullivan, B. (2020). Quantitatively Measuring Privacy in Interactive Query Settings Within RDBMS Framework. Frontiers of Big Data: Cybersecurity and Privacy. Retrieved from https://doi.org/10.3389/fdata.2020.00011 [link]
Kahn, I. M., Foley, S. N., & O’Sullivan, B. (2019). Computing the Identification Capability of SQL Queries for Privacy Comparison. In Proceedings 5th ACM International Workshop on Security and Privacy Analytics (IWSPA@CODASPY 2019). ACM press.
M.I. Kahn, B. O. S., S.N. Foley. (2019). PriDe: A Quantitative Measure of Privacy- Loss in Interactive Querying Settings. In 10th IFIP International Conference on New Technologies, Mobility and Security.
Kahn, I. M., O’Sullivan, B., & Foley, S. N. (2018). Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access. In In proceedings of Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention @ BigData 2018. IEEE Press.
Kahn, M. I., O’Sullivan, B., & Foley, S. N. (2017). A semantic approach to frequency based anomaly detection of insider access in database management systems. In International Conference on Risks and Security of Internet and Systems.
Kahn, M. I., Foley, S. N., & O’Sullivan, B. (2017). On database intrusion detection: Query analytics based model of normative behavior to detect insider attacks. In 7th International Conference on Communication and Network Security.
Kahn, M. I., & Foley, S. N. (2016). Detecting anomalous behavior in DBMS logs. In International Conference on Risks and Security of Internet and Systems (CRiSIS2016).
Pieczul, O., & Foley, S. N. (2016). Runtime detection of zero-day vulnerability exploits in contemporary software systems. In IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec2016). Retrieved from https://simonnfoley.github.io/pubs/dbsec2016-struts.pdf [link]
Pieczul, O., & Foley, S. N. (2015). The Dark Side of the Code. In International Workshop on Security Protocols (Vol. 9379). Springer. https://doi.org/10.1007/978-3-319-26096-9_1 [link]
Foley, S. N., & Pieczul, O. (2015). The Dark Side of the Code (Transcript of Discussion). In Security Protocols XXIII (Vol. 9379). Springer. https://doi.org/10.1007/978-3-319-26096-9_2 [link]
Pieczul, O., & Foley, S. N. (2014). Collaborating as Normal: Detecting Systemic Anomalies in Your Partner. In Security Protocols XXII - 22nd International Workshop Cambridge,
UK, March 19-21, 2014 Revised Selected Papers (pp. 18–27). https://doi.org/10.1007/978-3-319-12400-1_3 [link]
Foley, S. N. (2014). Collaborating as Normal: Detecting Systemic Anomalies in Your Partner
(Transcript of Discussion). In Security Protocols XXII - 22nd International Workshop Cambridge,
UK, March 19-21, 2014 Revised Selected Papers (pp. 28–37). https://doi.org/10.1007/978-3-319-12400-1_4 [link]
Pieczul, O., & Foley, S. N. (2013). Discovering emergent norms in security logs. In Communications and Network Security (CNS - SafeConfig), 2013 IEEE Conference on (pp. 438–445). https://doi.org/10.1109/CNS.2013.6682758 [link]