International audienceAlthough security issues are now addressed during the development process of distributed applications, an attack may still affect the provided services or allow access to confidential data. To detect intrusions, we consider an anomaly detection mechanism which relies on a model of the monitored application's normal behavior. During a model construction phase, the application is run multiple times to observe some of its correct behaviors. Each gathered trace enables the identification of significant events and their causality relationships, without requiring the existence of a global clock. The constructed model is dual: an automaton plus a list of likely invariants. The redundancy between the two sub-models decreases w...
With the increasing requirements of fast response and privacy protection, how to detect network intr...
Abstract — An important problem in network intrusion detection is how to detect large scale coordina...
An intrusion detection system (IDS) aims at signalling an alarm for every ac- tivity that compromise...
International audienceAlthough security issues are now addressed during the development process of d...
The study carried out during this thesis focuses on the security of distributed applications. Althou...
L’étude réalisée durant cette thèse porte sur la sécurité des applications distribuées. Bien que les...
As distributed computations become more and more common in highly distributed environments like the ...
International audienceThis paper presents a new framework for distributed intrusion detection based ...
Intrusion Detection Systems (IDSs) monitor network traffic and system activities to identify any una...
Over the past decade, numerous systems have been proposed to detect and subsequently prevent or miti...
Network Intrusion Detection Systems (NIDS) are an integral part of modern data centres to ensure hig...
Network anomalies, and specifically distributed denial of services attacks, are still an important t...
Part 9: Intrusion DetectionInternational audienceThe most common anomaly detection mechanisms at app...
With the increasing requirements of fast response and privacy protection, how to detect network intr...
Abstract — An important problem in network intrusion detection is how to detect large scale coordina...
An intrusion detection system (IDS) aims at signalling an alarm for every ac- tivity that compromise...
International audienceAlthough security issues are now addressed during the development process of d...
The study carried out during this thesis focuses on the security of distributed applications. Althou...
L’étude réalisée durant cette thèse porte sur la sécurité des applications distribuées. Bien que les...
As distributed computations become more and more common in highly distributed environments like the ...
International audienceThis paper presents a new framework for distributed intrusion detection based ...
Intrusion Detection Systems (IDSs) monitor network traffic and system activities to identify any una...
Over the past decade, numerous systems have been proposed to detect and subsequently prevent or miti...
Network Intrusion Detection Systems (NIDS) are an integral part of modern data centres to ensure hig...
Network anomalies, and specifically distributed denial of services attacks, are still an important t...
Part 9: Intrusion DetectionInternational audienceThe most common anomaly detection mechanisms at app...
With the increasing requirements of fast response and privacy protection, how to detect network intr...
Abstract — An important problem in network intrusion detection is how to detect large scale coordina...
An intrusion detection system (IDS) aims at signalling an alarm for every ac- tivity that compromise...