%0 Conference Proceedings %T Evaluating Reputation of Internet Entities %+ Brno University of Technology [Brno] (BUT) %+ CESNET [Prague] %A Bartoš, Václav %A Kořenek, Jan %Z Part 4: PhD Student Workshop — Security Management %< avec comité de lecture %( Lecture Notes in Computer Science %B 10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS) %C Munich, Germany %Y Rémi Badonnel %Y Robert Koch %Y Aiko Pras %Y Martin Drašar %Y Burkhard Stiller %I Springer International Publishing %3 Management and Security in the Age of Hyperconnectivity %V LNCS-9701 %P 132-136 %8 2016-06-20 %D 2016 %R 10.1007/978-3-319-39814-3_13 %Z Computer Science [cs] %Z Computer Science [cs]/Networking and Internet Architecture [cs.NI]Conference papers %X Security monitoring tools, such as honeypots, IDS, behavioral analysis or anomaly detection systems, generate large amounts of security events or alerts. These alerts are often shared within some communities using various alert sharing systems. Our research is focused on analysis of the huge amount of data present in these systems. In this work we focus on summarizing all alerts and other information known about a network entity into a measure called reputation score expressing the level of threat the entity poses. Computation of the reputation score is based on estimating probability of future attacks caused by the entity. %G English %Z TC 6 %Z WG 6.6 %2 https://inria.hal.science/hal-01632738/document %2 https://inria.hal.science/hal-01632738/file/385745_1_En_13_Chapter.pdf %L hal-01632738 %U https://inria.hal.science/hal-01632738 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC6 %~ IFIP-AIMS %~ IFIP-WG6-6 %~ IFIP-LNCS-9701