Part 3: FORENSIC TECHNIQUESInternational audienceClassical intrusion analysis of network log files uses statistical machine learning or regular expressions. Where statistically machine learning methods are not analytically exact, methods based on regular expressions do not reach up very far in Chomsky’s hierarchy of languages. This paper focuses on parsing traces of network traffic using context-free grammars. “Green grammars” are used to describe acceptable log files while “red grammars” are used to represent known intrusion patterns. This technique can complement or augment existing approaches by providing additional precision. Analytically, the technique is also more powerful than existing techniques that use regular expressions
Many network intrusion detection systems (NIDS) use byte sequen-ces as signatures to detect maliciou...
Security analysts often employ automated detection systems to reduce the cognitive burden imposed by...
International audienceIn this paper, we propose a Web Usage Mining pre-processing method to retrieve...
Keeping networks secure has never been such an imperative task as today. Threats come from hardware ...
The goal of this master thesis is to make possible to perform system log analysis in more general wa...
System logs contain messages from a wide range of applications. They are the natural starting point ...
World Wide Web is widely accessed by people for accessing services, social networking and so on. All...
The sheer number of different attack vectors and large amount of data produced by computer systems m...
International audienceEvent logging is a key source of information on a system state. Reading logs p...
Log data adapted for intrusion detection is a little explored research issue despite its importance ...
In this paper we propose a method for network intrusion de-tection based on language models. Our met...
Aim: The analysis of network traffic plays a crucial role in modern organizations since it can provi...
We consider typical tasks that arise in the intrusion analysis of log data from the perspectives of ...
A significant number of logs are generated in dynamic malware analysis. Consequently, a method for e...
The increasing popularity of network technology has brought convenience to human life.People have st...
Many network intrusion detection systems (NIDS) use byte sequen-ces as signatures to detect maliciou...
Security analysts often employ automated detection systems to reduce the cognitive burden imposed by...
International audienceIn this paper, we propose a Web Usage Mining pre-processing method to retrieve...
Keeping networks secure has never been such an imperative task as today. Threats come from hardware ...
The goal of this master thesis is to make possible to perform system log analysis in more general wa...
System logs contain messages from a wide range of applications. They are the natural starting point ...
World Wide Web is widely accessed by people for accessing services, social networking and so on. All...
The sheer number of different attack vectors and large amount of data produced by computer systems m...
International audienceEvent logging is a key source of information on a system state. Reading logs p...
Log data adapted for intrusion detection is a little explored research issue despite its importance ...
In this paper we propose a method for network intrusion de-tection based on language models. Our met...
Aim: The analysis of network traffic plays a crucial role in modern organizations since it can provi...
We consider typical tasks that arise in the intrusion analysis of log data from the perspectives of ...
A significant number of logs are generated in dynamic malware analysis. Consequently, a method for e...
The increasing popularity of network technology has brought convenience to human life.People have st...
Many network intrusion detection systems (NIDS) use byte sequen-ces as signatures to detect maliciou...
Security analysts often employ automated detection systems to reduce the cognitive burden imposed by...
International audienceIn this paper, we propose a Web Usage Mining pre-processing method to retrieve...