International audienceNowadays, intrusion detection systems are able to react to the attacks rather than only raising alerts. Unfortunately, current prevention techniques provide restrictive responses that may take a local reaction in a limited information system infrastructure. In this chapter, we introduce a new comprehensive and efficient approach for responding to intrusions. This approach considers not only the threat and the architecture of the monitored information system, but also the security policy which formally specifies security requirements that are activated when an intrusion is detected. In particular, some of the security policy rules are obligations that can be enforced as countermeasures. The proposed reaction workflow li...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
When large numbers of alerts are reported by intrusion detection (ID) systems in very fine granulari...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
International audienceNowadays, intrusion detection systems are able to react to the attacks rather ...
International audienceCurrent prevention techniques provide restrictive responses that may take a lo...
The protection of internetworked systems by cryptographic techniques have crystallized as a fundamen...
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detec...
International audienceCurrent intrusion detection systems go beyond the detection of attacks and pro...
Protecting networks from computer security attacks is an important concern of computer security. Wit...
Intrusion detection systems (IDS) have been widely adopted within the IT community, as passive monit...
System intrusions violate the security of a system. In order to maintain it, it is necessary to decr...
International audienceWith the growth of modern systems and infrastructures, automated and intellige...
Since computer infrastructures are currently getting more vulnerable than ever, traditional security...
Purpose – The increasing speed and volume of attacks against networked systems highlights the need t...
Abstract. One of the most controversial issues in intrusion detection is automating responses to int...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
When large numbers of alerts are reported by intrusion detection (ID) systems in very fine granulari...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
International audienceNowadays, intrusion detection systems are able to react to the attacks rather ...
International audienceCurrent prevention techniques provide restrictive responses that may take a lo...
The protection of internetworked systems by cryptographic techniques have crystallized as a fundamen...
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detec...
International audienceCurrent intrusion detection systems go beyond the detection of attacks and pro...
Protecting networks from computer security attacks is an important concern of computer security. Wit...
Intrusion detection systems (IDS) have been widely adopted within the IT community, as passive monit...
System intrusions violate the security of a system. In order to maintain it, it is necessary to decr...
International audienceWith the growth of modern systems and infrastructures, automated and intellige...
Since computer infrastructures are currently getting more vulnerable than ever, traditional security...
Purpose – The increasing speed and volume of attacks against networked systems highlights the need t...
Abstract. One of the most controversial issues in intrusion detection is automating responses to int...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
When large numbers of alerts are reported by intrusion detection (ID) systems in very fine granulari...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...