International audienceThis paper proposes a novel approach called IDrISS that exploits electromagnetic (EM) side-channel signals to design non-protocol based Intrusion Detection System (IDS). EM emanations side-channels are captured on power lines of an infrastructure. They are used to identify the presence of any type of electronic devices onto a physical network. IDrISS can learn the structure of the EM unintentional emanations of the legit devices composing the infrastructure as a reference profile. In a second step, it records and analyses the current emanations to compare and detect any kind of unwanted emanations. IDrISS is used as a Intrusion Detection System (IDS) that can trig an alarm as soon as a intrusion is detected. The result...
Our increasing dependence on different types of networks leads us to make them more secure. Intrusio...
International audienceThe Internet of Things (IoT) is constituted of devices that are exponentially ...
Attacks propagated against IT systems and how they can be curbed has been an important information s...
International audienceThis paper proposes a novel approach called IDrISS that exploits electromagnet...
Presented on November 8, 2019 at 12:00 p.m. in the Krone Engineered Biosystems Building, Room 1005.N...
Recent advances in computer hardware security research have shown that electronic devices are vulner...
With the ever increasing wireless connectivity and complexity of infrastructure-oriented systems, se...
International audienceIn this poster we present a novel approach of using side channel information t...
ABSTRACT: Network security is one of the most important nonfunctional requirements in a system [1]. ...
An intrusion detection system (IDS) is an ad hoc security solution to protect flawed computer system...
As the world strides into the digital world, cybersecurity has become an indispensable part of conne...
The advent of the Smart Grid (SG) raises severe cybersecurity risks that can lead to devastating con...
This paper proposes a rule-based Network Intrusion Detection System (NIDS) to detect a wide range of...
Modern legal and corporate investigations heavily rely on the field of digital forensics to uncover ...
International audienceNowadays, network technologies are essential for transferring and storing vari...
Our increasing dependence on different types of networks leads us to make them more secure. Intrusio...
International audienceThe Internet of Things (IoT) is constituted of devices that are exponentially ...
Attacks propagated against IT systems and how they can be curbed has been an important information s...
International audienceThis paper proposes a novel approach called IDrISS that exploits electromagnet...
Presented on November 8, 2019 at 12:00 p.m. in the Krone Engineered Biosystems Building, Room 1005.N...
Recent advances in computer hardware security research have shown that electronic devices are vulner...
With the ever increasing wireless connectivity and complexity of infrastructure-oriented systems, se...
International audienceIn this poster we present a novel approach of using side channel information t...
ABSTRACT: Network security is one of the most important nonfunctional requirements in a system [1]. ...
An intrusion detection system (IDS) is an ad hoc security solution to protect flawed computer system...
As the world strides into the digital world, cybersecurity has become an indispensable part of conne...
The advent of the Smart Grid (SG) raises severe cybersecurity risks that can lead to devastating con...
This paper proposes a rule-based Network Intrusion Detection System (NIDS) to detect a wide range of...
Modern legal and corporate investigations heavily rely on the field of digital forensics to uncover ...
International audienceNowadays, network technologies are essential for transferring and storing vari...
Our increasing dependence on different types of networks leads us to make them more secure. Intrusio...
International audienceThe Internet of Things (IoT) is constituted of devices that are exponentially ...
Attacks propagated against IT systems and how they can be curbed has been an important information s...