We propose an adaptive cyber security monitoring system that integrates a number of component techniques to collect time-series situation information, perform intrusion detection, keep track of event evolution, and characterize and identify security events so corresponding defense actions can be taken in a timely and effective manner. Particularly, we employ a decision fusion algorithm with analytically proven performance guarantee for intrusion detection based on local votes from distributed sensors. Different from the traditional rule-based pattern matching technique, security events in the proposed system are represented in a graphical form of correlation networks using random matrix theory and identified through the computation of netwo...
Part 2: Control Systems SecurityInternational audienceSupervisory control and data acquisition (SCAD...
Abstract. Alert correlation is a system which receives alerts from heterogene-ous Intrusion Detectio...
International audienceIn this paper we develop an alert correlation framework specifically tailored ...
We propose an adaptive cyber security monitoring system that integrates a number of component techni...
We propose an adaptive cyber security monitoring system that integrates a number of component techni...
We propose an adaptive cyber security monitoring system that integrates a number of component techni...
The timely and reliable data transfer required by many networked applications necessitates the devel...
Abstract—Detecting and identifying security events to provide cyber situation awareness has become a...
Abstract—Attacks to information systems are becoming more sophisticated and traditional algorithms s...
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of enterpris...
International audienceGenerally, the intruder must perform several actions, organized in an intrusio...
Abstract- Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, an...
Alert correlation is a process that analyzes the alerts produced by one or more intrusion detection ...
In this paper a methodology for the enhancement of computer networks’ cyber-defense is presented. Us...
Alert correlation is a process that analyzes the raw alerts produced by one or more intrusion detect...
Part 2: Control Systems SecurityInternational audienceSupervisory control and data acquisition (SCAD...
Abstract. Alert correlation is a system which receives alerts from heterogene-ous Intrusion Detectio...
International audienceIn this paper we develop an alert correlation framework specifically tailored ...
We propose an adaptive cyber security monitoring system that integrates a number of component techni...
We propose an adaptive cyber security monitoring system that integrates a number of component techni...
We propose an adaptive cyber security monitoring system that integrates a number of component techni...
The timely and reliable data transfer required by many networked applications necessitates the devel...
Abstract—Detecting and identifying security events to provide cyber situation awareness has become a...
Abstract—Attacks to information systems are becoming more sophisticated and traditional algorithms s...
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of enterpris...
International audienceGenerally, the intruder must perform several actions, organized in an intrusio...
Abstract- Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, an...
Alert correlation is a process that analyzes the alerts produced by one or more intrusion detection ...
In this paper a methodology for the enhancement of computer networks’ cyber-defense is presented. Us...
Alert correlation is a process that analyzes the raw alerts produced by one or more intrusion detect...
Part 2: Control Systems SecurityInternational audienceSupervisory control and data acquisition (SCAD...
Abstract. Alert correlation is a system which receives alerts from heterogene-ous Intrusion Detectio...
International audienceIn this paper we develop an alert correlation framework specifically tailored ...