scispace - formally typeset
G

Giuseppe Settanni

Researcher at Austrian Institute of Technology

Publications -  23
Citations -  693

Giuseppe Settanni is an academic researcher from Austrian Institute of Technology. The author has contributed to research in topics: Anomaly detection & Intrusion detection system. The author has an hindex of 11, co-authored 23 publications receiving 535 citations.

Papers
More filters
Journal ArticleDOI

Combating advanced persistent threats

TL;DR: A novel anomaly detection approach which is a promising basis for modern intrusion detection systems and keeps track of system events, their dependencies and occurrences, and thus learns the normal system behaviour over time and reports all actions that differ from the created system model.
Journal ArticleDOI

A Problem Shared is a Problem Halved: A Survey on the Dimensions of Collective Cyber Defense Through Security Information Sharing

TL;DR: A structured overview about the dimensions of cyber security information sharing is provided, motivated in more detail and work out the requirements for an information sharing system, and a critical review of the state of the art is reviewed.
Journal ArticleDOI

Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection

TL;DR: A dynamic log file anomaly detection methodology that incrementally groups log lines within time windows and establishes links between otherwise isolated collections of clusters, which suggests the applicability of the introduced approach.
Journal ArticleDOI

A collaborative cyber incident management system for European interconnected critical infrastructures

TL;DR: This paper proposes a system architecture for a National SOC, defining the functional components and interfaces it comprises, and describes the functionalities provided by the different system components to support SOC operators in performing incident management tasks.
Proceedings ArticleDOI

Semi-synthetic data set generation for security software evaluation

TL;DR: This paper introduces an approach of an evaluation setup that consists of virtual components, which imitate real systems and human user interactions as close as possible to produce system events, network flows and logging data of complex ICT service environments.