Technology Blogs by SAP
Learn how to extend and personalize SAP applications. Follow the SAP technology blog for insights into SAP BTP, ABAP, SAP Analytics Cloud, SAP HANA, and more.
cancel
Showing results for 
Search instead for 
Did you mean: 
slim_trabelsi
Employee
Employee
In 2015 the SMASH cybersecurity project demonstrated the high performance calculation capabilities of the SAP HANA Database by implementing a Social Media crawler that detects and alerts on real-time all the new threats, vulnerabilities and cyber-attacks targeting companies and software products. https://blogs.sap.com/2015/06/04/smash-goes-live-software-vulnerability-live-monitoring-on-hana/

This year in 2016, the SMASH project took a new dimension by proposing new features and functionalities taking advantage from several HANA functions like the HANA predictive library (PAL) or the sentiment analysis service…

The SMASH core technology associated with SAP HANA capabilities is currently used by four threat intelligence applications:

  • SMASH Live Alerting: that is a real-time cyber threat alerting tool that monitor the new security issues related to products and companies.

  • SMASH Autopsy: that is an archive based audit tool that analyses the past security messages in order to generate a report summarizing the security health of a product or company

  • SMASH threat prediction: that uses the HANA predictive library in order to predict the future attacks generated by new exploit kits observed on social media.

  • SMASH Sentiment Analysis: that is a real-time security sentiment analysis tool that monitors the security image of a product or a company. This application is particularly efficient to detect spam based defamation campaigns shared in the medias



Contact:

Dr Slim Trabelsi (slim.trabelsi@sap.com)
Stuart Short (stuart.short@sap.com)
Skander Ben Mahmoud (skander.ben.mahmoud@sap.com)