In this thesis, we consider the problems of detecting intrusions initiated by cooperative malicious nodes and multiple malicious packets initiated by a smart intruder. Detection is accomplished by sampling a subset of the transmitted packets over selected network links or router interfaces. Given a total sampling budget, our framework aims at developing a network packet sampling strategy to effectively reduce the success chances of an intruder. We consider two different scenarios: (1) A well informed intruder divides her attack over multiple packets in order to increase her chances of successfully intruding a target domain. (2) Different cooperating intruders distribute the attack among themselves each sending the attack fragments to the ta...
In this paper, a game theoretical analysis method is presented to provide the optimal security detec...
Security forces are deployed to protect networks that are threatened by multiple intruders. To selec...
Making a network foolproof is a very important task that every Intrusion Detection System should pro...
In this paper, we consider the problem of detecting an intruding packet in a communication network. ...
We study the problem of optimal resource allocation for packet selection and inspection to detect po...
Abstract—This work studies the problem of optimal posi-tioning of Intrusion Detection Systems (IDSs)...
International audienceEnforcing security in a network always comes with a trade-off regarding budget...
International audienceWith the rise of the Internet-of-Things, networks are becoming abundant and di...
This paper investigates the secrecy and reliability of a communication where the user is assisting a...
In this paper we extend the work presented in [1], [2] by quantifying the effects of in-band wormhol...
Together with the massive and rapid evolution of computer networks, there has been a surge of resear...
Abstract—Traditional intrusion detection systems (IDSs) work in isolation and can be easily compromi...
Abstract—Deciding that two network flows are essentially the same is an important problem in intrusi...
In this paper, the game theoretical analysis method is presented to provide optimal strategies for a...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
In this paper, a game theoretical analysis method is presented to provide the optimal security detec...
Security forces are deployed to protect networks that are threatened by multiple intruders. To selec...
Making a network foolproof is a very important task that every Intrusion Detection System should pro...
In this paper, we consider the problem of detecting an intruding packet in a communication network. ...
We study the problem of optimal resource allocation for packet selection and inspection to detect po...
Abstract—This work studies the problem of optimal posi-tioning of Intrusion Detection Systems (IDSs)...
International audienceEnforcing security in a network always comes with a trade-off regarding budget...
International audienceWith the rise of the Internet-of-Things, networks are becoming abundant and di...
This paper investigates the secrecy and reliability of a communication where the user is assisting a...
In this paper we extend the work presented in [1], [2] by quantifying the effects of in-band wormhol...
Together with the massive and rapid evolution of computer networks, there has been a surge of resear...
Abstract—Traditional intrusion detection systems (IDSs) work in isolation and can be easily compromi...
Abstract—Deciding that two network flows are essentially the same is an important problem in intrusi...
In this paper, the game theoretical analysis method is presented to provide optimal strategies for a...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
In this paper, a game theoretical analysis method is presented to provide the optimal security detec...
Security forces are deployed to protect networks that are threatened by multiple intruders. To selec...
Making a network foolproof is a very important task that every Intrusion Detection System should pro...