Deliverables Documents, reports (10) Final legal requirements Updated version of D2.2. Final data analysis results Final results of T5.1, T5.2 and T5.3, using T5.4 as the basis. The report will detail the advances made in this WP, including the novel insights derived from the individual and combined data sets and suggestions for fellow researchers. Final dissemination report Final version of D2.1, including data from the second reporting period. Preliminary legal requirements This deliverable will document the management of all legal aspects and deployment strategy, as well as the IPR management. Particular attention will be paid to the law differences among the member states as well as other Countries where SISSDEN will be operated, focusing on European level, but with paying attention to sensible regions outside Europe. Qualitative and quantitative assessment report Essential assessment of both the qualitative and quantitative success and impact of the SISSDEN pilot. Data exchange interfaces specification Specification of data exchange interfaces and mechanisms used in SISSDEN. Trial definition and test plan Technical trial and testing plan documents, updated regularly during the WP6 pilot phase to ensure successful testing of all SISSDEN pilot phase elements. Metrics specification and results This deliverable presents the final set of metrics derived from the data available to the consortium and their application for cross-country and cross-region comparisons. With interactive and searchable online metrics & statistical mapping. Preliminary data analysis specification The deliverable documents the new analyses developed in T5.1, T5.2 and T5.3, including a preliminary specification of new information they provide. Interim dissemination report This report is an instrument that will allow following the awareness actions done by the project partners throughout the project. The preliminary version will report past activities and give an overview of actions the planned in the second period, while the final report will contain the list of all activities done at several dissemination level, such as papers, website, links from other reference websites, demonstrations and workshops. Websites, patent fillings, videos etc. (3) Collaboration and data sharing portals This deliverable will consist of web services to support the collaboration and sharing of data inside the project and with external participants. The project website is public in general, but may contain non-public sections internal to the consortium. Project website The project website will be created at a very early stage of the project and will be kept updated all along project duration. This deliverable represents an important part of Task 2.4 and will be carried out by partners paying attention to exploit the website as a key dissemination and market approach instrument. Platform user feedback system Feedback platform to allow SISSDEN consortium members and other vetted system users to provide feedback on SISSDEN system usage. Publications Peer reviewed articles (1) Botnet Fingerprinting: Anomaly Detection in SMTP Conversations Author(s): Piotr Bazydlo, Krzysztof Lasota, Adam Kozakiewicz Published in: IEEE Security & Privacy, Issue 15/6, 2017, Page(s) 25-32, ISSN 1540-7993 Publisher: IEEE Computer Society DOI: 10.1109/MSP.2017.4251116 Conference proceedings (8) Linking Amplification DDoS Attacks to Booter Services Author(s): Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy, Michael Backes Published in: Research in Attacks, Intrusions, and Defenses. RAID 2017. Lecture Notes in Computer Science., 2016, Page(s) 427-449, ISBN 978-3-319-66332-6 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-66332-6_19 Evasive Malware via Identifier Implanting Author(s): Rui Tanabe, Wataru Ueno, Kou Ishii, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Christian Rossow Published in: Detection of Intrusions and Malware, and Vulnerability Assessment, Issue 10885, 2018, Page(s) 162-184, ISBN 978-3-319-93410-5 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-93411-2_8 teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts Author(s): Johannes Krupp, Christian Rossow Published in: 27th USENIX Security Symposium (USENIX Security 18), Issue August 15–17, 2018, 2018, Page(s) 1317-1333, ISBN 978-1-939133-04-5 Publisher: USENIX Association Millions of targets under attack - a macroscopic characterization of the DoS ecosystem Author(s): Mattijs Jonker, Alistair King, Johannes Krupp, Christian Rossow, Anna Sperotto, Alberto Dainotti Published in: Proceedings of the 2017 Internet Measurement Conference on - IMC '17, 2017, Page(s) 100-113, ISBN 9781-450351188 Publisher: ACM Press DOI: 10.1145/3131365.3131383 MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps Author(s): Michael Brengel, Christian Rossow Published in: Detection of Intrusions and Malware, and Vulnerability Assessment, Issue 10885, 2018, Page(s) 24-45, ISBN 978-3-319-93410-5 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-93411-2_2 MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware. Author(s): Sebastian Walla, Christian Rossow Published in: 4th IEEE European Symposium on Security and Privacy, Issue 4, 2019, Page(s) TBD (in print) Publisher: IEEE Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild Author(s): Marius Steffens, Christian Rossow, Martin Johns, Ben Stock Published in: Proceedings 2019 Network and Distributed System Security Symposium, 2019, ISBN 1-891562-55-X Publisher: Internet Society DOI: 10.14722/ndss.2019.23009 Świadomość sytuacyjna cyberzagrożeń (eng. Cyber-threat Situational Awareness) Author(s): Adam Kozakiewicz Published in: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, Issue 8-9, 2018, Page(s) 562-568, ISSN 1230-3496 Publisher: Sigma-NOT Other (1) Recurrent Neural Networks for Enhancement of Signature-based Network Intrusion Detection Systems Author(s): Sohi, Soroush M.; Ganji, Fatemeh; Seifert, Jean-Pierre Published in: Issue 1, 2018 Publisher: arXiv.org Book chapters (1) Cyber-Threat Intelligence from European-wide Sensor Network in SISSDEN Author(s): Edgardo Montes de Oca, Jart Armin, Angelo Consoli Published in: Challenges in Cybersecurity and Privacy - the European Research Landscape, 2019, Page(s) 117-128, ISBN 9788-770220880 Publisher: River Publishers Searching for OpenAIRE data... There was an error trying to search data from OpenAIRE No results available