Andrey Sapegin

ORCID: 0000-0002-6895-1692
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Anomaly Detection Techniques and Applications
  • Software System Performance and Reliability
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Clustering Algorithms Research
  • Network Packet Processing and Optimization
  • Scientific Computing and Data Management
  • Network Traffic and Congestion Control
  • Artificial Immune Systems Applications
  • Software Testing and Debugging Techniques
  • Cloud Computing and Resource Management
  • Advanced Database Systems and Queries
  • Algorithms and Data Compression
  • Mobile Agent-Based Network Management
  • Data Stream Mining Techniques
  • Data Quality and Management
  • Data Mining Algorithms and Applications
  • Electronic Health Records Systems
  • Distributed and Parallel Computing Systems
  • Spam and Phishing Detection
  • Software-Defined Networks and 5G
  • Neural Networks and Applications

Hasso Plattner Institute
2013-2020

University of Potsdam
2013-2017

The differences in log file formats employed a variety of services and applications remain to be problem for security analysts developers intrusion detection systems. proposed solution, i.e. the usage common formats, has limited utilization within existing solutions management. In our paper, we reveal reasons this limitation. We show disadvantages normalisation events. To deal with it have created new format that fits purposes can extended easily. Taking previous work into account, would...

10.1109/isias.2013.6947748 article EN 2013-12-01

Summary Modern security information and event management systems should be capable to store process high amount of events or log messages in different formats from sources. This requirement often prevents such usage computational heavy algorithms for analysis. To deal with this issue, we built our system based on an in‐memory database integrated machine learning library, namely, SAP HANA. Three approaches, that is, (1) deep normalisation messages, (2) storing data the main memory (3) running...

10.1002/cpe.3800 article EN Concurrency and Computation Practice and Experience 2016-03-05

When looking at media reports nowadays, major security breaches of big companies and governments seem to be a normal situation. An important step for the investigation or even prevention these is normalize analyze security-related log events from various systems in target network. However, number produced IT landscapes can grow up multiple billions per day. Current management solutions, e.g., Security Information Event Management (SIEM), cannot closely such huge amounts data therefore...

10.1109/pccc.2015.7410270 article EN 2015-12-01

Nowadays processing of Big Security Data, such as log messages, is commonly used for intrusion detection purposes. Its heterogeneous nature, well a combination numerical and categorical attributes, do not allow to apply the existing data mining methods directly on without feature preprocessing. Therefore, rather computationally expensive conversion attributes into vector space should be utilised analysis data. However, well-known k-modes algorithm allows cluster avoid space. The...

10.1109/icmla51294.2020.00062 article EN 2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA) 2020-12-01

Modern Security Information and Event Management systems should be capable to store process high amount of events or log messages in different formats from sources. This requirement often prevents such usage computational-heavy algorithms for security analysis. To deal with this issue, we built our system based on an in-memory data base integrated machine learning library, namely SAP HANA. Three approaches, i.e. (1) deep normalisation (2) storing the main memory (3) running analysis directly...

10.1109/ispdc.2015.16 article EN 2015-06-01

For testing new methods of network security or algorithms analytics, we need the experimental environments as well data which are much possible similar to real-world data. Therefore, researchers always trying find best approaches and recommendations creating simulating testbeds, because issue automation testbed creation is a crucial goal accelerate research progress. One ways generate simulate user behavior on virtual machines, but challenge how describe what want simulate.

10.1145/2799979.2799985 article EN 2015-09-08

The rapid development and integration of Information Technologies over the last decades influenced all areas our life, including business world. Yet not only modern enterprises become digitalised, but also security criminal threats move into digital sphere. To withstand these threats, companies must be aware activities within their computer networks. The keystone for such continuous monitoring is a Security Event Management (SIEM) system that collects processes security-related log messages...

10.25932/publishup-42611 article EN 2018-01-01

The boundary devices, such as routers, firewalls, proxies, and domain controllers, etc., are continuously generating logs showing the behaviors of internal external users, working state network well devices themselves. To rapidly efficiently analyze these makes great sense in terms security reliability. However, it is a challenging task due to fact that huge amount data might be generated for being analyzed very short time. In this paper, we address challenge by applying complex analytics...

10.1109/hpcc-css-icess.2015.284 article EN 2015-08-01

Internet scalability depends on of its core routing protocol - Border Gateway Protocol (BGP). However, dynamics BGP still conceal many unanswered questions. Most these questions are related to update messages: root cause spikes, correlation between spikes in the different parts and influence individual global routing. This article presents a methodology locate events behind specific spikes. The method explores correlated updates seen vantage points [1]. Although previous work [2] uses...

10.1109/msn.2013.17 article EN 2013-12-01

The “HPI Future SOC Lab” is a cooperation of the Hasso Plattner Institute (HPI) and industry partners. Its mission to enable promote exchange interaction between research community partners. HPI Lab provides researchers with free charge access complete infrastructure state art hard software. This includes components, which might be too expensive for an ordinary environment, such as servers up 64 cores 2 TB main memory. offerings address particularly from but not limited areas computer...

10.25932/publishup-43310 article EN 2020-01-01

Nowadays processing of Big Security Data, such as log messages, is commonly used for intrusion detection purposed. Its heterogeneous nature, well combination numerical and categorical attributes does not allow to apply the existing data mining methods directly on without feature preprocessing. Therefore, a rather computationally expensive conversion into vector space should be utilised analysis data. However, well-known k-modes algorithm allows cluster avoid space. The implementations Data...

10.48550/arxiv.1909.13721 preprint EN other-oa arXiv (Cornell University) 2019-01-01
Coming Soon ...