What happens when your implementation of SSL or some other cryptographic protocol is subverted through a buffer overflow attack? You have been hacked, yes. Unfortunately, you may be unaware of it: because normal traffic is encrypted, most IDSs cannot monitor it. We propose a simple, yet efficient technique to detect most of such attacks, by computing the entropy of the flow and comparing it against known thresholds
Covert timing channels provide a way to surreptitiously leak information from an entity in a higher-...
International audienceBelief and min-entropy leakage are two well-known approaches to quantify infor...
Here in this paper an effective technique for the detection of intrusion is proposed. The model is b...
A community network often operates with the same Internet service provider domain or the virtual net...
The detection of covert channels has quickly become a vital need due to their pervasive nature and t...
Part 9: ATIMCNInternational audienceIn this paper, we propose a new approach of detecting a kind of ...
AbstractDenial of service attack and Distributed Denial of Service attacks are becoming an increasin...
Intrusion Detection System (IDS) typically generates a huge number of alerts with high false rate, e...
[[abstract]]In recent years, there have been many approaches proposed by many researchers to detect ...
Part 1: Anomaly DetectionInternational audienceEntropy has been widely used for anomaly detection in...
Distributed Denial of Service (DDoS) is a cyber attack type involving multiple computer sources whic...
Distributed Denial-of-Service (DDoS) attacks are a serious threat to the safety and security of cybe...
[[abstract]]The aim of this study is to protect an electronic mail (email) server system based on an...
Early detection methods are required to prevent the DoS / DDoS attacks. The detection methods using ...
In information theory, entropies make up of the basis for distance and divergence measures among var...
Covert timing channels provide a way to surreptitiously leak information from an entity in a higher-...
International audienceBelief and min-entropy leakage are two well-known approaches to quantify infor...
Here in this paper an effective technique for the detection of intrusion is proposed. The model is b...
A community network often operates with the same Internet service provider domain or the virtual net...
The detection of covert channels has quickly become a vital need due to their pervasive nature and t...
Part 9: ATIMCNInternational audienceIn this paper, we propose a new approach of detecting a kind of ...
AbstractDenial of service attack and Distributed Denial of Service attacks are becoming an increasin...
Intrusion Detection System (IDS) typically generates a huge number of alerts with high false rate, e...
[[abstract]]In recent years, there have been many approaches proposed by many researchers to detect ...
Part 1: Anomaly DetectionInternational audienceEntropy has been widely used for anomaly detection in...
Distributed Denial of Service (DDoS) is a cyber attack type involving multiple computer sources whic...
Distributed Denial-of-Service (DDoS) attacks are a serious threat to the safety and security of cybe...
[[abstract]]The aim of this study is to protect an electronic mail (email) server system based on an...
Early detection methods are required to prevent the DoS / DDoS attacks. The detection methods using ...
In information theory, entropies make up of the basis for distance and divergence measures among var...
Covert timing channels provide a way to surreptitiously leak information from an entity in a higher-...
International audienceBelief and min-entropy leakage are two well-known approaches to quantify infor...
Here in this paper an effective technique for the detection of intrusion is proposed. The model is b...