International audienceWith the growth of modern systems and infrastructures, automated and intelligent response systems become the holy grail of the security community. An interesting approach proposes to use dynamic access control policies to specify response policies for such systems. These policies should be enforced when an ongoing attack, that threatens the monitored system, is detected. However, existing work do not present a clear methodology to specify the Response policies. In particular, the deactivation issue is not yet tackled. In this paper, we first present how to specify response policies. Second, a risk-aware framework is proposed to activate and deactivate response policies. Hence, the success likelihood of the threat, and...
PhDThe increasing number and complexity of security attacks on IT infrastructure demands for the d...
Abstract Finding adequate responses to ongoing attacks on ICT systems is a pertinacious problem and ...
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detec...
International audienceWith the growth of modern systems and infrastructures, automated and intellige...
International audienceCurrent prevention techniques provide restrictive responses that may take a lo...
International audienceThe use of dynamic access control policies for threat response adapts local re...
International audienceNowadays, intrusion detection systems are able to react to the attacks rather ...
International audienceFinding adequate responses to ongoing attacks on ICT systems is a pertinacious...
International audienceAppropriate response strategies against new and ongoing cyber attacks must be ...
International audienceIntrusion response models and systems have been recently an active field in th...
ABSTRACT: The aim of this paper is to present an adaptive and cost-sensitive model to prevent securi...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
The increasing amount of network-based attacks evolved to one of the top concerns responsible for ne...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
International audienceCurrent intrusion detection systems go beyond the detection of attacks and pro...
PhDThe increasing number and complexity of security attacks on IT infrastructure demands for the d...
Abstract Finding adequate responses to ongoing attacks on ICT systems is a pertinacious problem and ...
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detec...
International audienceWith the growth of modern systems and infrastructures, automated and intellige...
International audienceCurrent prevention techniques provide restrictive responses that may take a lo...
International audienceThe use of dynamic access control policies for threat response adapts local re...
International audienceNowadays, intrusion detection systems are able to react to the attacks rather ...
International audienceFinding adequate responses to ongoing attacks on ICT systems is a pertinacious...
International audienceAppropriate response strategies against new and ongoing cyber attacks must be ...
International audienceIntrusion response models and systems have been recently an active field in th...
ABSTRACT: The aim of this paper is to present an adaptive and cost-sensitive model to prevent securi...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
The increasing amount of network-based attacks evolved to one of the top concerns responsible for ne...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
International audienceCurrent intrusion detection systems go beyond the detection of attacks and pro...
PhDThe increasing number and complexity of security attacks on IT infrastructure demands for the d...
Abstract Finding adequate responses to ongoing attacks on ICT systems is a pertinacious problem and ...
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detec...