ABSTRACT: The aim of this paper is to present an adaptive and cost-sensitive model to prevent security intrusions. In most automated intrusion response systems, response selection is performed locally based on current threat without using the knowledge of attacks history. Another challenge is that a group of responses are applied without any feedback mechanism to measure the response effect. We address these problems through retroactive-burst execution of responses and a Response Coordinator (RC) mechanism, the main contributions of this work. The retroactive-burst execution consists of several burst executions of responses with, at the end of each burst, a mechanism for measuring the effectiveness of the applied responses by the risk asses...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
Purpose – The increasing speed and volume of attacks against networked systems highlights the need t...
Intrusion detection systems (IDS) have been widely adopted within the IT community, as passive monit...
ABSTRACT: The aim of this paper is to present an adaptive and cost-sensitive model to prevent securi...
Protecting networks from computer security attacks is an important concern of computer security. Wit...
The severity and number of intrusions on computer networks are rapidly increasing. Preserving the av...
We propose a new model for automated response in distributed systems. We formalize the process of pr...
The continuous increase in the quantity and sophistication of cyberattacks is making it more difcult...
The increasing amount of network-based attacks evolved to one of the top concerns responsible for ne...
International audienceCurrent prevention techniques provide restrictive responses that may take a lo...
International audienceWith the growth of modern systems and infrastructures, automated and intellige...
The landscape of security threats continues to evolve, with attacks becoming more serious and the nu...
Attacks on computer systems are a growing problem. According to CERT there where 137,529 reported in...
International audienceIntrusion response models and systems have been recently an active field in th...
Large scale distributed systems typically have interactions among different services that create an ...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
Purpose – The increasing speed and volume of attacks against networked systems highlights the need t...
Intrusion detection systems (IDS) have been widely adopted within the IT community, as passive monit...
ABSTRACT: The aim of this paper is to present an adaptive and cost-sensitive model to prevent securi...
Protecting networks from computer security attacks is an important concern of computer security. Wit...
The severity and number of intrusions on computer networks are rapidly increasing. Preserving the av...
We propose a new model for automated response in distributed systems. We formalize the process of pr...
The continuous increase in the quantity and sophistication of cyberattacks is making it more difcult...
The increasing amount of network-based attacks evolved to one of the top concerns responsible for ne...
International audienceCurrent prevention techniques provide restrictive responses that may take a lo...
International audienceWith the growth of modern systems and infrastructures, automated and intellige...
The landscape of security threats continues to evolve, with attacks becoming more serious and the nu...
Attacks on computer systems are a growing problem. According to CERT there where 137,529 reported in...
International audienceIntrusion response models and systems have been recently an active field in th...
Large scale distributed systems typically have interactions among different services that create an ...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
Purpose – The increasing speed and volume of attacks against networked systems highlights the need t...
Intrusion detection systems (IDS) have been widely adopted within the IT community, as passive monit...