<div dir="ltr"><div><span style="color:rgb(0,0,0);font-family:Aptos,Aptos_EmbeddedFont,Aptos_MSFontService,Calibri,Helvetica,sans-serif;font-size:16px">Retransmitindo Convite de Palestra.<br></span></div><div><span style="color:rgb(0,0,0);font-family:Aptos,Aptos_EmbeddedFont,Aptos_MSFontService,Calibri,Helvetica,sans-serif;font-size:16px"><br></span></div><div><span style="color:rgb(0,0,0);font-family:Aptos,Aptos_EmbeddedFont,Aptos_MSFontService,Calibri,Helvetica,sans-serif;font-size:16px">Prezados membros do CT-MON e comunidade de Redes e Sistemas Distribuídos,</span><div><font color="#000000" face="Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif" size="3"><span><br></span></font></div><div><span style="color:rgb(0,0,0);font-family:Aptos,Aptos_EmbeddedFont,Aptos_MSFontService,Calibri,Helvetica,sans-serif;font-size:16px">Desde
o ano passado, o Comitê Técnico de Monitoramento de Redes da RNP vem
organizando palestras de pesquisadores convidados e convidando a
comunidade brasileira para participar e se engajar às atividades do
CT-Mon. </span><span style="color:rgb(0,0,0);font-family:Aptos,Aptos_EmbeddedFont,Aptos_MSFontService,Calibri,Helvetica,sans-serif;font-size:16px">Em 2024 tivemos nomes como Mark Crovella (Boston University) e Marco Fiore (IMDEA Espanha). </span></div><div><span style="color:rgb(0,0,0);font-family:Aptos,Aptos_EmbeddedFont,Aptos_MSFontService,Calibri,Helvetica,sans-serif;font-size:16px"><br></span></div><div><font size="3" style="color:rgb(0,0,0);font-family:Aptos,Aptos_EmbeddedFont,Aptos_MSFontService,Calibri,Helvetica,sans-serif">Na segunda-feira</font><font size="3" style="color:rgb(0,0,0);font-family:Aptos,Aptos_EmbeddedFont,Aptos_MSFontService,Calibri,Helvetica,sans-serif">, dia 18/08/2025, às 11hs teremos mais uma palestra. Segue abaixo mais informações e convidamos a todos a participarem.</font><br></div><div><font color="#000000" face="Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif"><span><font size="3"><br></font></span></font></div><div><font color="#000000" face="Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif"><span><font size="3">Pedimos
desculpas por eventuais duplicações e que nos ajudem enviando esse
convite aos seus respectivos grupos de pesquisa e pessoas interessadas.</font></span></font></div><div><font color="#000000" face="Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif"><span><font size="3"><br></font></span></font></div><div><span style="color:rgb(0,0,0);font-family:Aptos,Arial,Helvetica,sans-serif;font-size:16px">Palestrante: Fabrício Murai</span><br></div><div><div dir="ltr" style="font-family:Aptos,Arial,Helvetica,sans-serif;font-size:16px;color:rgb(0,0,0)">Instituição: Worcester Polytechnic Institute (WPI)<br></div><div style="font-family:Aptos,Arial,Helvetica,sans-serif;font-size:16px;color:rgb(0,0,0)">Data e hora: 18/08/2025, às 11hs</div><div style="font-family:Aptos,Arial,Helvetica,sans-serif;font-size:16px;color:rgb(0,0,0)">Link: <b style="font-family:Arial,Helvetica,sans-serif;color:rgb(34,34,34)"><a href="https://conferenciaweb.rnp.br/rnp/ct-mon" target="_blank">https://conferenciaweb.rnp.br/rnp/ct-mon</a><span style="color:rgb(0,0,0);font-family:Aptos,Aptos_EmbeddedFont,Aptos_MSFontService,Calibri,Helvetica,sans-serif"> </span></b></div><div style="font-family:Aptos,Arial,Helvetica,sans-serif;font-size:16px;color:rgb(0,0,0)"><br></div><div style="font-family:Aptos,Arial,Helvetica,sans-serif;font-size:16px;color:rgb(0,0,0)">Título da palestra: Devil in the Noise: Detecting Advanced Persistent Threats with Backbone Extraction</div><div style="font-family:Aptos,Arial,Helvetica,sans-serif;font-size:16px;color:rgb(0,0,0)"><br></div><div style="font-family:Aptos,Arial,Helvetica,sans-serif;font-size:16px;color:rgb(0,0,0)"><br></div><div style="font-family:Aptos,Arial,Helvetica,sans-serif;font-size:16px;color:rgb(0,0,0)">Breve
resumo da palestra: In the dynamically developing field of cyber
security, the detection and differentiated analysis of system attacks
represents a constant challenge. While conventional methods primarily
analyze raw data to detect anomalies, data provenance shows promising
results to advance host intrusion detection systems. However, detecting
slow-and-low attacks such as APT campaigns still poses a challenge.
Therefore, this work presents backbone extraction as a crucial
preprocessing step, filtering out irrelevant edges to detect residuals
with distinctive node and edge distributions that indicate security
threats. By applying our methodology to state-of-the-art benchmark
datasets, we observed an increase in the performance of one-class
classifiers by up to 62% on F1-score and 48% on recall in the Streamspot
dataset and by up to 40% on F1-score and 33% on recall in the DARPA3
THEIA dataset. Moreover, our results indicate mitigation of the
dependency explosion problem and underscore the ability of our
methodology to improve the detection landscape by shrinking graph sizes
without losing essential aspects capable of characterizing attacks.</div><div style="font-family:Aptos,Arial,Helvetica,sans-serif;font-size:16px;color:rgb(0,0,0)"><br></div><div style="font-family:Aptos,Arial,Helvetica,sans-serif;font-size:16px;color:rgb(0,0,0)"><br><img src="cid:ii_meae38ec0" alt="image.png" width="159" height="159" style="margin-right: 0px;"></div></div><div style="font-family:Aptos,Arial,Helvetica,sans-serif;font-size:16px;color:rgb(0,0,0)"><br></div><div style="font-family:Aptos,Arial,Helvetica,sans-serif;font-size:16px;color:rgb(0,0,0)">Breve
CV: Dr. Fabricio Murai is an Assistant Professor in Computer Science,
AI and Data Science at WPI. Before joining, Fabricio Murai was a tenured
faculty member in the Department of Computer Science at the
Universidade Federal de Minas Gerais, Brazil. He received his Ph.D. in
Computer Science at University of Massachusetts, Amherst in 2016. Dr.
Murai's research focuses on developing innovative AI techniques that (i)
leverage the interconnections among real-world entities, (ii) enhance
our comprehension of society through the analysis of online data, and
(iii) ensure equitable outcomes in high-stakes applications. He has
published in top conferences in the field of AI and Data Mining, such as
the AAAI Conference on Artificial Intelligence, ACM SIGKDD Conference
on Knowledge Discovery and Data Mining, SIAM International Conference on
Data Mining, as well as top scientific journals such as Data Mining and
Knowledge Discovery, ACM TKDD and PLOS ONE.</div><div dir="ltr" style="font-family:Aptos,Arial,Helvetica,sans-serif;font-size:16px;color:rgb(0,0,0)"><br></div><div><br clear="all"></div><div><div dir="ltr" class="gmail_signature"><div dir="ltr"><span style="color:rgb(34,34,34);font-size:13px;border-collapse:collapse">---<br>Antonio A. de A. Rocha, Associate Professor<br></span><span style="color:rgb(34,34,34);font-size:13px;border-collapse:collapse">Computer Science Department (DCC)<br>Institute of Computing (IC)<br>Fluminense Federal University (UFF)<br></span><span style="color:rgb(34,34,34);font-size:13px;border-collapse:collapse"><a href="http://www.ic.uff.br/~arocha" style="color:rgb(119,153,187)" target="_blank">http://www.ic.uff.br/~arocha</a></span></div></div></div></div><div><br></div><div><br clear="all"></div><div><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div style="color:rgb(34,34,34)">Computer Security Incident Response Team - CSIRT</div><div style="color:rgb(34,34,34)">Diretoria Executiva de Tecnologia da Informação e Comunicação - DETIC</div><div style="color:rgb(34,34,34)">Universidade Estadual de Campinas - Unicamp</div><div style="color:rgb(34,34,34)">GnuPG Public Key: <a href="http://www.security.unicamp.br/security.asc" style="color:rgb(17,85,204)" target="_blank">http://www.security.unicamp.br/security.asc</a> [^]</div><div style="color:rgb(34,34,34)">Contato: +55 19 3521-2289 ou INOC-DBA: 1251*830</div></div></div></div></div>