Laboratoire d’Analyse et d’Architecture des Systèmes
D.CARVIN, P.OWEZARSKI, P.BERTHOU
SARA
Manifestation avec acte : International Conference on Network and Service Management CNSM 2012 du 22 octobre au 26 octobre 2012, Las Vegas (USA), 2012, 4p. , N° 12226
Lien : http://hal.archives-ouvertes.fr/hal-00692544
Diffusable
Plus d'informations
The Internet of Things (IoT) is a promising theme of research. Covering subjects from micro-electronic to social sciences with a major field in computing, network and telecommunication. It is judged as the future of the today's Internet. The main idea is to benefit from an ambient intelligence instantiated by objects assisting humans in their daily tasks. One has already imagined use cases and challenging projects in separate areas, but challenge often means performances and requires expensive specific implementations or technologies. Paradoxically, this technology fragmentation starves us from a rapid growth of the IoT whereas it prevents us to be flooded by the uncharacterized traffic it would generate. Intersecting three domains of research that are Systems Monitoring and Management, Ubiquitous Computing and Cognitive Radio, we introduce our ongoing work on a new transversal use case called Ubiquitous Cognitive Systems Management (UCSM) to tackle this paradox and originate the chatty object concept.
S.GIL CASALS, P.OWEZARSKI, G.DESCARGUES
SARA, Thales Avionics
Manifestation avec acte : International Conference on Computer Safety, Reliability and Security ( SafeComp ) 2012 du 25 septembre au 28 septembre 2012, Magdeburg (Allemagne), Septembre 2012, 8p. , N° 12247
Diffusable
Plus d'informations
The era of digital avionics is opening a fabulous opportunity to improve aircraft operational functions, airline dispatch and service continuity. But arising vulnerabilities could be an open door to malicious attacks. Necessity for security protection on airborne systems has been officially recognized and new standards are actually under construction. In order to provide development assurance and countermeasures effectiveness evidence to certification authorities, security objectives and specifications must be clearly identified thanks to a security risk assessment process. This paper gives main characteristics for a security risk assessment methodology to be integrated in the early design of airborne systems development and compliant with airworthiness security standards.
G.KREMER, P.OWEZARSKI, P.BERTHOU
SARA
Rapport de Contrat : ANR RESCUE, Juin 2012, 31p. , N° 12298
Diffusion restreinte
127432P.CASAS HERNANDEZ, J.MAZEL, P.OWEZARSKI
SARA
Revue Scientifique : Computer Communications, Vol.35, N°7, pp.772-783, Avril 2012 , N° 12638
Lien : http://hal.archives-ouvertes.fr/hal-00736278
Diffusable
Plus d'informations
Traditional Network Intrusion Detection Systems (NIDSs) rely on either specialized signatures of previously seen attacks, or on expensive and difficult to produce labeled traffic datasets for user-profiling to hunt out network attacks. Despite being opposite in nature, both approaches share a common downside: they require the knowledge provided by an external agent, either in terms of signatures or as normal-operation profiles. In this paper we present UNIDS, an Unsupervised Network Intrusion Detection System capable of detecting unknown network attacks without using any kind of signatures, labeled traffic, or training. UNIDS uses a novel unsupervised outliers detection approach based on Sub-Space Clustering and Multiple Evidence Accumulation techniques to pin-point different kinds of network intrusions and attacks such as DoS/DDoS, probing attacks, propagation of worms, buffer overflows, illegal access to network resources, etc. We evaluate UNIDS in three different traffic datasets, including the well-known KDD99 dataset as well as real traffic traces from two operational networks. We particularly show the ability of UNIDS to detect unknown attacks, comparing its performance against traditional misuse-detection-based NIDSs. In addition, we also evidence the supremacy of our outliers detection approach with respect to different previously used unsupervised detection techniques.
D.PAPADIMITRIOU, B.PUYPE, S.LATRE, W.VAN DE MEERSSCHE, D.DESCHRIJVER, W.TAVERNIER, C.BARAKAT, A.KRIFA, P.CASAS HERNANDEZ, J.MAZEL, P.OWEZARSKI, D.SAUCEZ, B.DONNET, O.BONAVENTURE, G.LEDUC
ALB, IBBT, INRIA Sophia, UCL, ULg, SARA
Rapport de Contrat : ECODE FP7-ICT-2007-2-1.6-223936-D4.3, Janvier 2012, 151p. , N° 11670
Diffusable
126024D.SAUCEZ, C.BARAKAT, O.BONAVENTURE, F.CANTIN, P.CASAS HERNANDEZ, D.COLLE, B.DONNET, P.GEURTS, A.KRIFA, G.LEDUC, P.LEPROPRE, Y.LIAO, J.MAZEL, P.OWEZARSKI, D.PAPADIMITRIOU, B.PUYPE
UCL, INRIA Sophia, ULg, IBBT, ALB, SARA
Rapport de Contrat : ECODE FP7-ICT-2007-2-1.6-223936-D2.3, Janvier 2012, 74p. , N° 11669
Diffusable
126022P.CASAS HERNANDEZ, J.MAZEL, P.OWEZARSKI
SARA
Revue Scientifique : IEEE Network Magazine, Vol.26, N°1, pp.13-21, Janvier 2012, Special issue on "Network Traffic Monitoring and Analysis'' , N° 11450
Diffusable
128192S.GIL CASALS, P.OWEZARSKI, G.DESCARGUES
OLC, Thales Avionics
Rapport LAAS N°11570, Novembre 2011, 8p.
Diffusable
125607J.MAZEL, P.CASAS HERNANDEZ, Y.LABIT, P.OWEZARSKI
OLC
Manifestation avec acte : International Conference on Network and Service Managment (CNSM 2011), Paris (France), 24-28 Octobre 2011, 7p. , N° 11362
Diffusable
125623P.OWEZARSKI
OLC
Conférence invitée : International Conference on Network and Service Managment (CNSM 2011), Paris (France), 24-28 Octobre 2011, 11p. , N° 11770
Diffusable
126469