Simon Foley
Research Publications Talks
Anomaly detection based on application system logs

Anomaly detection based on application system logs

May, 2016

Publications

  • Khan, M. I., Foley, S. N., & O’Sullivan, B. (2020). Towards Privacy-anomaly Detection: Discovering Correlation between Privacy and Security-anomalies. In E. M. Shakshuki & A.-U.-H. Yasar (Eds.), The 17th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2020) / The 15th International Conference on Future Networks and Communications (FNC-2020) / The 10th International Conference on Sustainable Energy Information Technology, Leuven, Belgium, August 9-12, 2020 (Vol. 175, pp. 331–339). Elsevier. https://doi.org/10.1016/j.procs.2020.07.048 [link]
  • M.I. Khan, S. N. F., & O’Sullivan, B. (2020). Quantitatively Measuring Privacy in Interactive Query Settings Within RDBMS Framework. Frontiers of Big Data: Cybersecurity and Privacy. Retrieved from https://doi.org/10.3389/fdata.2020.00011 [link]
  • Kahn, I. M., Foley, S. N., & O’Sullivan, B. (2019). Computing the Identification Capability of SQL Queries for Privacy Comparison. In Proceedings 5th ACM International Workshop on Security and Privacy Analytics (IWSPA@CODASPY 2019). ACM press.
  • M.I. Kahn, B. O. S., S.N. Foley. (2019). PriDe: A Quantitative Measure of Privacy- Loss in Interactive Querying Settings. In 10th IFIP International Conference on New Technologies, Mobility and Security.
  • Kahn, I. M., O’Sullivan, B., & Foley, S. N. (2018). Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access. In In proceedings of Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention @ BigData 2018. IEEE Press.
  • Kahn, M. I., O’Sullivan, B., & Foley, S. N. (2017). A semantic approach to frequency based anomaly detection of insider access in database management systems. In International Conference on Risks and Security of Internet and Systems.
  • Kahn, M. I., Foley, S. N., & O’Sullivan, B. (2017). On database intrusion detection: Query analytics based model of normative behavior to detect insider attacks. In 7th International Conference on Communication and Network Security.
  • Kahn, M. I., & Foley, S. N. (2016). Detecting anomalous behavior in DBMS logs. In International Conference on Risks and Security of Internet and Systems (CRiSIS2016).
  • Pieczul, O., & Foley, S. N. (2016). Runtime detection of zero-day vulnerability exploits in contemporary software systems. In IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec2016). Retrieved from https://simonnfoley.github.io/pubs/dbsec2016-struts.pdf [link]
  • Pieczul, O., & Foley, S. N. (2015). The Dark Side of the Code. In International Workshop on Security Protocols (Vol. 9379). Springer. https://doi.org/10.1007/978-3-319-26096-9_1 [link]
  • Foley, S. N., & Pieczul, O. (2015). The Dark Side of the Code (Transcript of Discussion). In Security Protocols XXIII (Vol. 9379). Springer. https://doi.org/10.1007/978-3-319-26096-9_2 [link]
  • Pieczul, O., & Foley, S. N. (2014). Collaborating as Normal: Detecting Systemic Anomalies in Your Partner. In Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers (pp. 18–27). https://doi.org/10.1007/978-3-319-12400-1_3 [link]
  • Foley, S. N. (2014). Collaborating as Normal: Detecting Systemic Anomalies in Your Partner (Transcript of Discussion). In Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers (pp. 28–37). https://doi.org/10.1007/978-3-319-12400-1_4 [link]
  • Pieczul, O., & Foley, S. N. (2013). Discovering emergent norms in security logs. In Communications and Network Security (CNS - SafeConfig), 2013 IEEE Conference on (pp. 438–445). https://doi.org/10.1109/CNS.2013.6682758 [link]

Anomaly detection based on application system logs

  • This page contains no Javascript, cookies or trackers. Contact me if you want your visit tracked.

Research on security risk management, network and distributed access controls, security assurance and user-centered security