Laboratoire d’Analyse et d’Architecture des Systèmes
I.STUDNIA, E.ALATA, Y.DESWARTE, M.KAANICHE, V.NICOMETTE
TSF
Manifestation avec acte : Computer & Electronics Security Applications Rendez-vous ( CESAR ) 2012 du 20 novembre au 22 novembre 2012, Rennes (France), 2012, pp.61-74 , N° 12657
Lien : http://hal.archives-ouvertes.fr/hal-00761206
Diffusable
Plus d'informations
Virtualization techniques are at the heart of Cloud Computing, and these techniques add their own vulnerabilities to those traditional in any connected computer system. This paper presents an overview of such vulnerabilities, as well as possible counter-measures to cope with them.
I.STUDNIA, V.NICOMETTE, M.KAANICHE, E.ALATA
TSF
Manifestation avec acte : Privacy Security Trust (PST 2012), Paris (France), 16-18 Juillet 2012, 2p. , N° 12464
Lien : http://hal.archives-ouvertes.fr/hal-00706333
Diffusable
Plus d'informations
The increase of various malicious activities spreading on the Internet network are today a crucial problem. In order to understand the motivations and operating modes of the attackers, it is necessary to collect data characterizing these malicious activities. Their analysis enables to better face these attacks, anticipate new threats and better adpat the corresponding protection mechanisms. This paper proposes a distributed platform oh high interaction honeypots deployed for that purpose. The paper describes 1) the design and implementation of this platform, 2) the methodology used to collect and record data characterizing the malicious activities and 3) the first analyses carried out on this data.
I.STUDNIA, V.NICOMETTE, M.KAANICHE, E.ALATA
TSF
Manifestation avec acte : Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SARSSI 2012), Cabourg (France), 22-25 Mai 2012, 8p. , N° 12015
Diffusable
127540I.STUDNIA, E.ALATA, M.KAANICHE, V.NICOMETTE
TSF
Rapport LAAS N°11660, Décembre 2011, 38p.
Diffusable
125964