International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but they go beyond by providing reaction mechanisms to cope with detected attacks, or at least reduce their effects. Previous research works have proposed several methods to automatically select possible countermeasures capable of ending the detected attack, but without taking into account their side effects. In fact, countermeasures can be as harmful as the detected attack. Moreover, sometimes selected countermeasures are not adapted to the attackerpsilas actions and/or knowledge. In this paper, we propose to turn the reaction selection process intelligent by giving means to (i) quantify the effectiveness and select the countermeasure that has th...
Given the continuing advancement of networking applications and our increased dependence upon softwa...
In past decades, we have seen that the increasing speed of the network attacks compromising computer...
The protection of internetworked systems by cryptographic techniques have crystallized as a fundamen...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
International audienceCurrent intrusion detection systems go beyond the detection of attacks and pro...
International audienceNowadays, intrusion detection systems are able to react to the attacks rather ...
Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise al...
The increasing amount of network-based attacks evolved to one of the top concerns responsible for ne...
When large numbers of alerts are reported by intrusion detection (ID) systems in very fine granulari...
This paper is based on a conceptual framework in which security can be split into two generic types ...
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detec...
International audienceCurrent prevention techniques provide restrictive responses that may take a lo...
Abstract--This paper proposes a new methodology for adaptive, automated intrusion response (IR) usin...
Protecting networks from computer security attacks is an important concern of computer security. Wit...
Given the continuing advancement of networking applications and our increased dependence upon softwa...
In past decades, we have seen that the increasing speed of the network attacks compromising computer...
The protection of internetworked systems by cryptographic techniques have crystallized as a fundamen...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
International audienceCurrent intrusion detection systems go beyond the detection of attacks and pro...
International audienceNowadays, intrusion detection systems are able to react to the attacks rather ...
Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise al...
The increasing amount of network-based attacks evolved to one of the top concerns responsible for ne...
When large numbers of alerts are reported by intrusion detection (ID) systems in very fine granulari...
This paper is based on a conceptual framework in which security can be split into two generic types ...
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detec...
International audienceCurrent prevention techniques provide restrictive responses that may take a lo...
Abstract--This paper proposes a new methodology for adaptive, automated intrusion response (IR) usin...
Protecting networks from computer security attacks is an important concern of computer security. Wit...
Given the continuing advancement of networking applications and our increased dependence upon softwa...
In past decades, we have seen that the increasing speed of the network attacks compromising computer...
The protection of internetworked systems by cryptographic techniques have crystallized as a fundamen...