Category: Intrusion Detection

GeoIP and Geo-Targeting

Posted on 09/08/09 No Comments

Lately I have been busy with a web-based geo-targeting project.   For those of you not familiar with geo-targeting, the deeper you get into geo-targeting, the more you realize how important and interesting it is. Geo-targeting is used for fraud detection, personalization, ad-targeting, content-delivery, and more.   In addition, the same basic concept is used [...]

Read more

U.S. Cyber Command – Some Deep Background

Posted on 06/25/09 No Comments

It is not common knowledge, but we began discussing the need for a cyber command in the mid-1990s; but it was the Langley Cyber Attack in 1997 that started the momentum toward making a future cyber command a reality.   I don’t want to rehash well-documented historical events in this post.  Instead, I will focus [...]

Read more

A Review of Zabbix – Zabbix Rules! (Part 2)

Posted on 03/23/09 2 Comments

In A Review of Zabbix – Zabbix Rules! (Part 1) we provided a brief introduction to Zabbix in the context of network and security management.  In this post I will discuss Zabbix as an event processing platform. Zabbix is like most event processing platforms.  Zabbix provides both agent-initiated events as well as server-requested events.  In [...]

Read more

Classification in Complex Event Processing

Posted on 02/01/09 2 Comments

Following up on the excellent discussion in Predicting Events with Logistic Regression I think it is time to talk a bit about the importance of classification in complex event processing.  CEP is, by definition, about detecting business opportunities and threats in real-time.   It follows, that by definition, CEP is centered around classifying and discriminating complex [...]

Read more

Twenty Four CEP Public Presentations on SlideShare

Posted on 11/03/08 2 Comments

For archiving purposes, I have uploaded 24 public CEP presentations that I presented over an 18 month period at various conferences from March 14, 2006 to September 21, 2007.  These presentations can be viewed here.  For example, my first public CEP presentation: View SlideShare presentation or Upload your own. (tags: event processing) So far, I [...]

Read more

The Motivation Behind Adaptive Analytics and CEP

Posted on 10/11/08 17 Comments

This is a continuation of The Genesis of Complex Event Processing: Asymmetric Capabilities and CEP, Event Noise and Asymmetric Event Processing where I have been discussing the motivation behind CEP and adaptive analytics in cyberspace. Around the same time that Professor Luckham and his team was working on CEP applications in network management and security [...]

Read more

A Blast from the Past: Processing Patterns for Predictive Business, March 2006

Posted on 07/09/08 No Comments

For readers interested in complex event processing and a few of the challenges the industry faces, here is a presentation from 28 months back called Processing Patterns for Predictive Business.   This presentation was delivered at the first Workshop on Event Processing – Presentations at IBM Research Labs, Yorktown Heights, March 14-16th 2006. The same key points of [...]

Read more

A Blast from the Past: CEP at Stanford,1998-2003

Posted on 07/07/08 1 Comment

Courtesy of Complex Event Processing at Stanford Complex event processing (CEP) is a new technology. It can be applied to extracting and analyzing information from any kind of distributed message-based system. It is developed from the Rapide concepts of (1) causal event modeling, (2) event patterns and pattern matching, and (3) event pattern maps and [...]

Read more

A Bitter Pill To Swallow: First Generation CEP Software Needs To Evolve

Posted on 02/08/08 4 Comments

Frankly speaking, the CEP market is now saturated with hype about all the great things CEP can do, detecting opportunities and threats in real time and supporting the decision cycle.  However, in my opinion, it is time for the software vendors and analysts to move beyond the marketing hype and demonstrate real operational value with [...]

Read more

The Top Information Security Risks for 2008

Posted on 01/15/08 No Comments

Blogging has it’s rewards. I recently published a list of the Top Ten Cybersecurity Threats for 2008. This list motivated another collaborative list for 2008, organized by Dr. Gary Hinson, The Top Information Security Risks for 2008.

Read more
Page 1 of 512345»