International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but they go beyond by providing reaction mechanisms to cope with detected attacks, or at least reduce their effects. Previous research works have proposed several methods to automatically select possible countermeasures capable of ending the detected attack, but without taking into account their side effects. In fact, countermeasures can be as harmful as the detected attack. Moreover, sometimes selected countermeasures are not adapted to the attackerpsilas actions and/or knowledge. In this paper, we propose to turn the reaction selection process intelligent by giving means to (i) quantify the effectiveness and select the countermeasure that has th...
Given the continuing advancement of networking applications and our increased dependence upon softwa...
The growth and diversity of services offered by modern systems make the task of securing these syste...
A countermeasure is any change to a system to reduce the probability it is successfully attacked. We...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
International audienceCurrent intrusion detection systems go beyond the detection of attacks and pro...
International audienceCurrent prevention techniques provide restrictive responses that may take a lo...
International audienceIntrusion response models and systems have been recently an active field in th...
The increasing amount of network-based attacks evolved to one of the top concerns responsible for ne...
International audienceNowadays, intrusion detection systems are able to react to the attacks rather ...
When large numbers of alerts are reported by intrusion detection (ID) systems in very fine granulari...
The protection of internetworked systems by cryptographic techniques have crystallized as a fundamen...
Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise al...
Given the continuing advancement of networking applications and our increased dependence upon softwa...
The growth and diversity of services offered by modern systems make the task of securing these syste...
A countermeasure is any change to a system to reduce the probability it is successfully attacked. We...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
International audienceCurrent intrusion detection systems go beyond the detection of attacks and pro...
International audienceCurrent prevention techniques provide restrictive responses that may take a lo...
International audienceIntrusion response models and systems have been recently an active field in th...
The increasing amount of network-based attacks evolved to one of the top concerns responsible for ne...
International audienceNowadays, intrusion detection systems are able to react to the attacks rather ...
When large numbers of alerts are reported by intrusion detection (ID) systems in very fine granulari...
The protection of internetworked systems by cryptographic techniques have crystallized as a fundamen...
Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise al...
Given the continuing advancement of networking applications and our increased dependence upon softwa...
The growth and diversity of services offered by modern systems make the task of securing these syste...
A countermeasure is any change to a system to reduce the probability it is successfully attacked. We...