Lisa Amini - Yorktown Heights NY, US Mihai Christodorescu - Briarcliff Manor NY, US Mitchell A. Cohen - Yorktown Heights NY, US Srinivasan Parthasarathy - Yonkers NY, US Josyula Rao - Briarcliff Manor NY, US Reiner Sailer - Scarsdale NY, US Douglas L. Schales - Armonk NY, US Wietse Z. Venema - Amawalk NY, US Olivier Verscheure - Dunboyne, IE
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 21/00
US Classification:
726 23
Abstract:
Performing adaptive cyber-security analytics including a computer implemented method that includes receiving a report on a network activity. A score responsive to the network activity and to a scoring model is computed at a computer. The score indicates a likelihood of a security violation. The score is validated and the scoring model is automatically updated responsive to results of the validating. The network activity is reported as suspicious in response to the score being within a threshold of a security violation value.
Detecting Malicious Circumvention Of Virtual Private Network
- Armonk NY, US Josyula R. Rao - Briarcliff Manor NY, US Willliam J. Rippon - Putnam Valley NY, US Wilfried Teiken - Ossining NY, US Wietse Z. Venema - Amawalk NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 29/06
Abstract:
An embodiment directed to a method is associated with a VPN that may be used to access resource servers. Upon determining that the VPN has been accessed by a specified client, resource servers are identified, which each has an address and may receive traffic routed from the client through the VPN. The method further comprises sending a message corresponding to each identified resource server to the client, wherein the message to corresponding to a given one of the identified resources is intended to cause a response to be sent from the client to the address of the given identified resource server. Responses to respective messages sent to the client are used to determine whether a route for traffic from the client to the VPN has been compromised.
IBM Research since Nov 1996
Research staff member
Eindhoven University of Technology Apr 1985 - Nov 1996
Software Architect
Education:
University of Groningen 1970 - 1984
Ph.D, Physics
Skills:
Linux Computer Security Network Security Information Security Open Source Programming Computer Forensics Cryptography Security Penetration Testing Unix Incident Response Information Security Management Distributed Systems Postfix Perl Malware Analysis Shell Scripting Intrusion Detection System Administration Vulnerability Assessment
Honor & Awards:
2012 ISSA Hall of Fame award
2008 Free Software Foundation award
2007 IBM Technical Achievement award
2006 Sendmail Milter Innovation award.
2000 NLUUG Award.
1999 SAGE Outstanding Achievement award.
Youtube
Wietse Venema - Building serverless apps with...
Abstract: In this talk, Wietse Venema will take you through what it ta...
Duration:
52m 31s
Wietse Venema & Dan Farmer, SATAN - Paul's Se...
Wietse Venema and Dan Farmer, the Developers of Security Administrator...
Duration:
59m 27s
Wietse Venema Postfix past, present and fut...
Duration:
1h 27m 19s
Secure Programming Traps and Pitfalls - Wiets...
Wietse analyzes a very small program that is obviously correct, yet co...
Duration:
37m 51s
Postfix: past, present and future - Wietse Ve...
In the 12 years since its initial release by IBM, the open source Post...