We present in this thesis a novel approach for automated threat response. The emergence of SIM (Security Information Management) platforms, as well as recent advances in the field of intrusion detection, raises the question of response to the threat reported by such tools. Till now, response is mainly left to the initiative of the security officer. Due to complexity of the analysis, such manual response suffers from a lack of reactivity and possibly relevancy. We propose to replace the security officer by a component in charge of assessing threats considering alerts reported by security monitoring tools, and responsible for deciding which countermeasures are suitable. The core of our proposal relies on the use of a contextual security polic...
International audienceThe analysis of the behaviour of individuals and entities (UEBA) is an area of...
La sécurité informatique est un enjeu crucial. Elle consiste en premier lieu à définir une politique...
International audienceThe analysis of the behaviour of individuals and entities (UEBA) is an area of...
The growth and diversity of services offered by modern systems make the task of securing these syste...
Les SIEMs (systèmes pour la Sécurité de l'Information et la Gestion des Evénements) sont le cœur des...
Cyber-attacks on critical infrastructure such as electricity, gas, and water distribution, or power ...
International audienceCurrent prevention techniques provide restrictive responses that may take a lo...
RÉSUMÉ: La menace interne est devenue récemment un sujet très abordé en cybersécurité suite aux diff...
To defend against sophisticated cyber-criminal organizations and APTs, IT system operators should de...
Ces dernières années, le piratage est devenu une industrie à part entière, augmentant le nombre et l...
Since computer infrastructures are currently getting more vulnerable than ever, traditional security...
Les systèmes de contrôle-commande industriels (Industrial Control System, ICS) sont des infrastructu...
Purpose – The increasing speed and volume of attacks against networked systems highlights the need t...
International audienceThe analysis of the behaviour of individuals and entities (UEBA) is an area of...
La sécurité informatique est un enjeu crucial. Elle consiste en premier lieu à définir une politique...
International audienceThe analysis of the behaviour of individuals and entities (UEBA) is an area of...
The growth and diversity of services offered by modern systems make the task of securing these syste...
Les SIEMs (systèmes pour la Sécurité de l'Information et la Gestion des Evénements) sont le cœur des...
Cyber-attacks on critical infrastructure such as electricity, gas, and water distribution, or power ...
International audienceCurrent prevention techniques provide restrictive responses that may take a lo...
RÉSUMÉ: La menace interne est devenue récemment un sujet très abordé en cybersécurité suite aux diff...
To defend against sophisticated cyber-criminal organizations and APTs, IT system operators should de...
Ces dernières années, le piratage est devenu une industrie à part entière, augmentant le nombre et l...
Since computer infrastructures are currently getting more vulnerable than ever, traditional security...
Les systèmes de contrôle-commande industriels (Industrial Control System, ICS) sont des infrastructu...
Purpose – The increasing speed and volume of attacks against networked systems highlights the need t...
International audienceThe analysis of the behaviour of individuals and entities (UEBA) is an area of...
La sécurité informatique est un enjeu crucial. Elle consiste en premier lieu à définir une politique...
International audienceThe analysis of the behaviour of individuals and entities (UEBA) is an area of...