International audienceCurrent intrusion detection systems go beyond the detection of attacks and provide reaction mechanisms to cope with detected attacks or at least reduce their effect. Previous research works have proposed methods to automatically select possible countermeasures capable of ending the detected attack. But actually, countermeasures have side effects and can be as harmful as the detected attack. In this paper, we propose to improve the reaction selection process by giving means to quantify the effectiveness and select the countermeasure that has the minimum negative side effect on the information system. To achieve this goal, we adopt a risk assessment and analysis approach
The increasing amount of network-based attacks evolved to one of the top concerns responsible for ne...
The landscape of security threats continues to evolve, with attacks becoming more serious and the nu...
In past decades, we have seen that the increasing speed of the network attacks compromising computer...
International audienceCurrent intrusion detection systems go beyond the detection of attacks and pro...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
International audienceCurrent prevention techniques provide restrictive responses that may take a lo...
International audienceNowadays, intrusion detection systems are able to react to the attacks rather ...
The protection of internetworked systems by cryptographic techniques have crystallized as a fundamen...
When large numbers of alerts are reported by intrusion detection (ID) systems in very fine granulari...
Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise al...
This paper is an extension of work originally presented in WITS-2017 CONF. We extend our previous wo...
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detec...
Attacks propagated against IT systems and how they can be curbed has been an important information s...
Protecting networks from computer security attacks is an important concern of computer security. Wit...
The increasing amount of network-based attacks evolved to one of the top concerns responsible for ne...
The landscape of security threats continues to evolve, with attacks becoming more serious and the nu...
In past decades, we have seen that the increasing speed of the network attacks compromising computer...
International audienceCurrent intrusion detection systems go beyond the detection of attacks and pro...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
International audienceCurrent prevention techniques provide restrictive responses that may take a lo...
International audienceNowadays, intrusion detection systems are able to react to the attacks rather ...
The protection of internetworked systems by cryptographic techniques have crystallized as a fundamen...
When large numbers of alerts are reported by intrusion detection (ID) systems in very fine granulari...
Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise al...
This paper is an extension of work originally presented in WITS-2017 CONF. We extend our previous wo...
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detec...
Attacks propagated against IT systems and how they can be curbed has been an important information s...
Protecting networks from computer security attacks is an important concern of computer security. Wit...
The increasing amount of network-based attacks evolved to one of the top concerns responsible for ne...
The landscape of security threats continues to evolve, with attacks becoming more serious and the nu...
In past decades, we have seen that the increasing speed of the network attacks compromising computer...