International audienceCurrent prevention techniques provide restrictive responses that may take a local reaction in a limited information system infrastructure. In this paper, an in depth and comprehensive approach is introduced for responding to intrusions in an efficient way. This approach considers not only the threat and the architecture of the monitored information system, but also the security policy. The proposed reaction workflow links the lowest level of the information system corresponding to intrusion detection mechanisms, including misuse and anomaly techniques, and access control techniques with the higher level of the security policy. This reaction workflow evaluates the intrusion alerts at three different levels, it then reac...
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detec...
Attacks propagated against IT systems and how they can be curbed has been an important information s...
Attacks on computer systems are a growing problem. According to CERT there where 137,529 reported in...
International audienceCurrent prevention techniques provide restrictive responses that may take a lo...
International audienceNowadays, intrusion detection systems are able to react to the attacks rather ...
International audienceCurrent intrusion detection systems go beyond the detection of attacks and pro...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
International audienceWith the growth of modern systems and infrastructures, automated and intellige...
The protection of internetworked systems by cryptographic techniques have crystallized as a fundamen...
Intrusion detection systems (IDS) have been widely adopted within the IT community, as passive monit...
Protecting networks from computer security attacks is an important concern of computer security. Wit...
Since computer infrastructures are currently getting more vulnerable than ever, traditional security...
System intrusions violate the security of a system. In order to maintain it, it is necessary to decr...
We present in this thesis a novel approach for automated threat response. The emergence of SIM (Secu...
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detec...
Attacks propagated against IT systems and how they can be curbed has been an important information s...
Attacks on computer systems are a growing problem. According to CERT there where 137,529 reported in...
International audienceCurrent prevention techniques provide restrictive responses that may take a lo...
International audienceNowadays, intrusion detection systems are able to react to the attacks rather ...
International audienceCurrent intrusion detection systems go beyond the detection of attacks and pro...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but t...
International audienceWith the growth of modern systems and infrastructures, automated and intellige...
The protection of internetworked systems by cryptographic techniques have crystallized as a fundamen...
Intrusion detection systems (IDS) have been widely adopted within the IT community, as passive monit...
Protecting networks from computer security attacks is an important concern of computer security. Wit...
Since computer infrastructures are currently getting more vulnerable than ever, traditional security...
System intrusions violate the security of a system. In order to maintain it, it is necessary to decr...
We present in this thesis a novel approach for automated threat response. The emergence of SIM (Secu...
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detec...
Attacks propagated against IT systems and how they can be curbed has been an important information s...
Attacks on computer systems are a growing problem. According to CERT there where 137,529 reported in...