Skip to main content

Secure Information Sharing Sensor Delivery event Network

Deliverables

Final legal requirements

Updated version of D2.2.

Final data analysis results

Final results of T5.1, T5.2 and T5.3, using T5.4 as the basis. The report will detail the advances made in this WP, including the novel insights derived from the individual and combined data sets and suggestions for fellow researchers.

Final dissemination report

Final version of D2.1, including data from the second reporting period.

Preliminary legal requirements

This deliverable will document the management of all legal aspects and deployment strategy, as well as the IPR management. Particular attention will be paid to the law differences among the member states as well as other Countries where SISSDEN will be operated, focusing on European level, but with paying attention to sensible regions outside Europe.

Qualitative and quantitative assessment report

Essential assessment of both the qualitative and quantitative success and impact of the SISSDEN pilot.

Data exchange interfaces specification

Specification of data exchange interfaces and mechanisms used in SISSDEN.

Trial definition and test plan

Technical trial and testing plan documents, updated regularly during the WP6 pilot phase to ensure successful testing of all SISSDEN pilot phase elements.

Metrics specification and results

This deliverable presents the final set of metrics derived from the data available to the consortium and their application for cross-country and cross-region comparisons. With interactive and searchable online metrics & statistical mapping.

Preliminary data analysis specification

The deliverable documents the new analyses developed in T5.1, T5.2 and T5.3, including a preliminary specification of new information they provide.

Interim dissemination report

This report is an instrument that will allow following the awareness actions done by the project partners throughout the project. The preliminary version will report past activities and give an overview of actions the planned in the second period, while the final report will contain the list of all activities done at several dissemination level, such as papers, website, links from other reference websites, demonstrations and workshops.

Collaboration and data sharing portals

This deliverable will consist of web services to support the collaboration and sharing of data inside the project and with external participants. The project website is public in general, but may contain non-public sections internal to the consortium.

Project website

The project website will be created at a very early stage of the project and will be kept updated all along project duration. This deliverable represents an important part of Task 2.4 and will be carried out by partners paying attention to exploit the website as a key dissemination and market approach instrument.

Platform user feedback system

Feedback platform to allow SISSDEN consortium members and other vetted system users to provide feedback on SISSDEN system usage.

Searching for OpenAIRE data...

Publications

Botnet Fingerprinting: Anomaly Detection in SMTP Conversations


Published in: ISSN 1540-7993
DOI: 10.1109/MSP.2017.4251116

Linking Amplification DDoS Attacks to Booter Services

Author(s): Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy, Michael Backes
Published in: Research in Attacks, Intrusions, and Defenses. RAID 2017. Lecture Notes in Computer Science., 2016, Page(s) 427-449
DOI: 10.1007/978-3-319-66332-6_19

Evasive Malware via Identifier Implanting

Author(s): Rui Tanabe, Wataru Ueno, Kou Ishii, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Christian Rossow
Published in: Detection of Intrusions and Malware, and Vulnerability Assessment, Issue 10885, 2018, Page(s) 162-184
DOI: 10.1007/978-3-319-93411-2_8

teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts

Author(s): Johannes Krupp, Christian Rossow
Published in: 27th USENIX Security Symposium (USENIX Security 18), Issue August 15–17, 2018, 2018, Page(s) 1317-1333

Millions of targets under attack - a macroscopic characterization of the DoS ecosystem

Author(s): Mattijs Jonker, Alistair King, Johannes Krupp, Christian Rossow, Anna Sperotto, Alberto Dainotti
Published in: Proceedings of the 2017 Internet Measurement Conference on - IMC '17, 2017, Page(s) 100-113
DOI: 10.1145/3131365.3131383

MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps

Author(s): Michael Brengel, Christian Rossow
Published in: Detection of Intrusions and Malware, and Vulnerability Assessment, Issue 10885, 2018, Page(s) 24-45
DOI: 10.1007/978-3-319-93411-2_2

MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware.

Author(s): Sebastian Walla, Christian Rossow
Published in: 4th IEEE European Symposium on Security and Privacy, Issue 4, 2019, Page(s) TBD (in print)

Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild

Author(s): Marius Steffens, Christian Rossow, Martin Johns, Ben Stock
Published in: Proceedings 2019 Network and Distributed System Security Symposium, 2019
DOI: 10.14722/ndss.2019.23009

Świadomość sytuacyjna cyberzagrożeń (eng. Cyber-threat Situational Awareness)

Author(s): Adam Kozakiewicz
Published in: Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, Issue 8-9, 2018, Page(s) 562-568, ISSN 1230-3496

Recurrent Neural Networks for Enhancement of Signature-based Network Intrusion Detection Systems

Author(s): Sohi, Soroush M.; Ganji, Fatemeh; Seifert, Jean-Pierre
Published in: Issue 1, 2018

Cyber-Threat Intelligence from European-wide Sensor Network in SISSDEN

Author(s): Edgardo Montes de Oca, Jart Armin, Angelo Consoli
Published in: Challenges in Cybersecurity and Privacy - the European Research Landscape, 2019, Page(s) 117-128