G
Giuseppe Settanni
Researcher at Austrian Institute of Technology
Publications - 23
Citations - 693
Giuseppe Settanni is an academic researcher from Austrian Institute of Technology. The author has contributed to research in topics: Anomaly detection & Intrusion detection system. The author has an hindex of 11, co-authored 23 publications receiving 535 citations.
Papers
More filters
Journal ArticleDOI
Combating advanced persistent threats
TL;DR: A novel anomaly detection approach which is a promising basis for modern intrusion detection systems and keeps track of system events, their dependencies and occurrences, and thus learns the normal system behaviour over time and reports all actions that differ from the created system model.
Journal ArticleDOI
A Problem Shared is a Problem Halved: A Survey on the Dimensions of Collective Cyber Defense Through Security Information Sharing
TL;DR: A structured overview about the dimensions of cyber security information sharing is provided, motivated in more detail and work out the requirements for an information sharing system, and a critical review of the state of the art is reviewed.
Journal ArticleDOI
Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection
TL;DR: A dynamic log file anomaly detection methodology that incrementally groups log lines within time windows and establishes links between otherwise isolated collections of clusters, which suggests the applicability of the introduced approach.
Journal ArticleDOI
A collaborative cyber incident management system for European interconnected critical infrastructures
Giuseppe Settanni,Florian Skopik,Yegor Shovgenya,Roman Fiedler,Mark Carolan,Damien Conroy,Konstantin Boettinger,Mark Gall,Gerd Stefan Brost,Christophe Ponchel,Mirko Haustein,Helmut Kaufmann,Klaus Theuerkauf,Pia Olli +13 more
TL;DR: This paper proposes a system architecture for a National SOC, defining the functional components and interfaces it comprises, and describes the functionalities provided by the different system components to support SOC operators in performing incident management tasks.
Proceedings ArticleDOI
Semi-synthetic data set generation for security software evaluation
TL;DR: This paper introduces an approach of an evaluation setup that consists of virtual components, which imitate real systems and human user interactions as close as possible to produce system events, network flows and logging data of complex ICT service environments.