AbstractCooperative intrusion detection use several intrusion detection systems (IDS) and analyzers in order to build a reliable overview of the monitored system trough a central security information and event management system (SIEM). In such environment, the definition of a shared vocabulary describing the exchanged information between tools is prominent. Since these pieces of information are structured, we propose in this paper to use an ontological representation based on Description Logics (DLs) which is a powerful tool for knowledge representation. Moreover, DLs are able to ensure a decidable reasoning. An alert correlation prototype is presented using this ontology, and an illustrative attack scenario is carried out to show the usefu...
International audienceManaging and supervising security in large networks has become a challenging t...
This paper proposes an effective approach to model DDoS attacks, and its application to recognize at...
Software applications become highly distributed and complex, involving independent collaborating com...
Cooperative intrusion detection use several intrusion detection systems (IDS) and analyzers in order...
AbstractCooperative intrusion detection use several intrusion detection systems (IDS) and analyzers ...
The notion of event correlation has been around for some time. Most recently, event correlation has ...
Intrusion detection products that are currently available only provide support in terms of intrusion...
Intrusion detection is not new in the area of information security. It is crucial for the intrusion ...
Abstract. We state the benefits of transitioning from taxonomies to ontologies and ontology specific...
11th International Conference on Metadata and Semantic Research, MTSR 2017 -- 28 November 2017 throu...
Currently available products only provide some support in terms of Intrusion Prevention and Intrusio...
In the security infrastructure, intrusion detection has become an indispensable defense line in face...
Information security is plagued with increasingly sophisticated and persistent threats to communicat...
Abstract — Intrusion Detection Systems are tools used to detect attacks against networks. Many of th...
The integration of networks within an organization made many critical infrastructures (CI) and their...
International audienceManaging and supervising security in large networks has become a challenging t...
This paper proposes an effective approach to model DDoS attacks, and its application to recognize at...
Software applications become highly distributed and complex, involving independent collaborating com...
Cooperative intrusion detection use several intrusion detection systems (IDS) and analyzers in order...
AbstractCooperative intrusion detection use several intrusion detection systems (IDS) and analyzers ...
The notion of event correlation has been around for some time. Most recently, event correlation has ...
Intrusion detection products that are currently available only provide support in terms of intrusion...
Intrusion detection is not new in the area of information security. It is crucial for the intrusion ...
Abstract. We state the benefits of transitioning from taxonomies to ontologies and ontology specific...
11th International Conference on Metadata and Semantic Research, MTSR 2017 -- 28 November 2017 throu...
Currently available products only provide some support in terms of Intrusion Prevention and Intrusio...
In the security infrastructure, intrusion detection has become an indispensable defense line in face...
Information security is plagued with increasingly sophisticated and persistent threats to communicat...
Abstract — Intrusion Detection Systems are tools used to detect attacks against networks. Many of th...
The integration of networks within an organization made many critical infrastructures (CI) and their...
International audienceManaging and supervising security in large networks has become a challenging t...
This paper proposes an effective approach to model DDoS attacks, and its application to recognize at...
Software applications become highly distributed and complex, involving independent collaborating com...