Elisa Costante
Eindhoven, Noord-Brabant, Nederland
3K volgers
Meer dan 500 connecties
Info
As the Vice President of Research at Forescout Technologies Inc., I lead Forescout Vedere…
Activiteit
-
🚀 Forescout at #ISCCPH 2024! 🚀 Join Forescout on November 13-14, 2024, in Copenhagen for the Industrial Security Conference CPH! 🔈 Don’t miss…
🚀 Forescout at #ISCCPH 2024! 🚀 Join Forescout on November 13-14, 2024, in Copenhagen for the Industrial Security Conference CPH! 🔈 Don’t miss…
Gemarkeerd als interessant door Elisa Costante
-
What an amazing event. Thanks for having me I thoroughly enjoyed attending!
What an amazing event. Thanks for having me I thoroughly enjoyed attending!
Gemarkeerd als interessant door Elisa Costante
Ervaring
Opleiding
Licenties en certificaten
Publicaties
-
Hunting the Unknown - White-Box Database Leakage Detection
Springer
Data leakage causes significant losses and privacy breaches worldwide. In this paper we present a white-box data leakage detection system to spot anomalies in database transactions. We argue that our approach represents a major leap forward w.r.t. previous work because: i) it significantly decreases the False Positive Rate (FPR) while keeping the Detection Rate (DR) high; on our experimental dataset, consisting of millions of real enterprise transactions, we measure a FPR that is orders of…
Data leakage causes significant losses and privacy breaches worldwide. In this paper we present a white-box data leakage detection system to spot anomalies in database transactions. We argue that our approach represents a major leap forward w.r.t. previous work because: i) it significantly decreases the False Positive Rate (FPR) while keeping the Detection Rate (DR) high; on our experimental dataset, consisting of millions of real enterprise transactions, we measure a FPR that is orders of magnitude lower than in state-of-the-art comparable approaches; and ii) the white-box approach allows the creation of self-explanatory and easy to update profiles able to explain why a given query is anomalous, which further boosts the practical applicability of the system.
Andere auteursPublicatie weergeven -
Database Anomalous Activities: Detection and Quantification
Proceeding of International Conference on Security and Cryptography (SECRYPT) 2013
The disclosure of sensitive data to unauthorized entities is a critical issue for organizations. Timely detection of data leakage is crucial to reduce possible damages. Therefore, breaches should be detected as early as possible, e.g., when data are leaving the database. In this paper, we focus on data leakage detection by monitoring database activities. We present a framework that automatically learns normal user behavior, in terms of database activities, and detects anomalies as deviation…
The disclosure of sensitive data to unauthorized entities is a critical issue for organizations. Timely detection of data leakage is crucial to reduce possible damages. Therefore, breaches should be detected as early as possible, e.g., when data are leaving the database. In this paper, we focus on data leakage detection by monitoring database activities. We present a framework that automatically learns normal user behavior, in terms of database activities, and detects anomalies as deviation from such behavior. In addition, our approach explicitly indicates the root cause of an anomaly. Finally, the framework assesses the severity of data leakages based on the sensitivity of the disclosed data.
Andere auteurs -
Privacy-Aware Web Service Composition and Ranking
Procs. of the IEEE 20th International Conference on Web Services (ICWS), 2013
In this paper, we propose a novel privacy-preserving Web service composition and selection approach which (i) makes it possible to verify the compliance between users’ privacy requirements and providers’ privacy policies and (ii) ranks the composite Web services with respect to the privacy level they offer. We demonstrate our approach using a travel agency Web service as an example of service composition.
Andere auteurs -
On-line trust perception: what really matters
Proceedings of the First Workshop on Socio-Technical Aspects in Security and Trust
Talen
-
English
Volledige professionele vaardigheid
-
Italian
Moedertaal of tweetalig
-
Spanish
Beperkte werkvaardigheid
Meer activiteiten van Elisa
-
Forescout Technologies Inc. Vedere Labs exposed one medical imaging device online for one year: 1.6M+ interactions 1 attack every 20 seconds, on…
Forescout Technologies Inc. Vedere Labs exposed one medical imaging device online for one year: 1.6M+ interactions 1 attack every 20 seconds, on…
Gemarkeerd als interessant door Elisa Costante
Overige vergelijkbare profielen
Anderen hebben Elisa Costante genoemd
2 anderen door wie Elisa Costante is genoemd, gebruiken LinkedIn
Bekijk anderen die Elisa Costante heten