Archive

Publications

Books, papers, and related publication record.

17

entries in this group

Back to Archive →

Books

4

The Security Data Lake

This book is the first publication to explain the concept of a security data lake using big data technologies.

Security Data Visualization

Two contributed chapters, one on firewall log analysis and one on IDS signature tuning using visual methods.

Applied Security Visualization

Being the first published book on security visualization, this book provides a hands-on exploration of the topic of visualization in the cyber security realm.

Snort - IDS and IPS Toolkit

Contributed chapter on security data analysis and reporting for Snort.

Papers

13

Cloud Application Logging for Forensics

Identifying and Visualizing the Malicious Insider Threat Using Bipartite Graphs

Challenge 5 of the Forensic Challenge 2010 - Log Mysteries

DAVIX gegen Goliath

Security Visualization - Learning From The New York Times

Design of an Intrusion-Tolerant Intrusion Detection System

Long-term research project funded by the European Union under the Information Society Fifth Framework Programme.

GCIA paper

how I analyzed a dataset given by SANS. I used graphing techinques, GraphViz and other tools, to automatically generate visual images of the dataset. I was a bit too enthousiastic and wrote way too much. The additional chapters are therefore published here

IP over Everything

Mixer

NIST 800-41

Contributed to the Guidelines on Firewalls, and Firewall Policy.

NIST 800-92

Contributed to the Guide to Computer Security Log Management.

special page

Thor