Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Dulaunoy, Alexandre"'
This paper describes a system for storing historical forensic artefacts collected from SSH connections. This system exposes a REST API in a similar fashion as passive DNS databases, malware hash registries, and SSL notaries with the goal of supportin
Externí odkaz:
http://arxiv.org/abs/2204.04922
IT security community is recently facing a change of trend from closed to open working groups and from restrictive information to full information disclosure and sharing. One major feature for this trend change is the number of incidents and various
Externí odkaz:
http://arxiv.org/abs/1902.03914
The steady increase in the volume of indicators of compromise (IoC) as well as their volatile nature makes their processing challenging. Once compromised infrastructures are cleaned up, threat actors are moving to on to other target infrastructures o
Externí odkaz:
http://arxiv.org/abs/1803.11052
We propose in this paper a new propagation vector for malicious software by abusing the Tor network. Tor is particularly relevant, since operating a Tor exit node is easy and involves low costs compared to attack institutional or ISP networks. After
Externí odkaz:
http://arxiv.org/abs/1208.2877
Publikováno v:
Journal of Computer Virology and Hacking Techniques; 20240101, Issue: Preprints p1-9, 9p
Autor:
Wagner, Cynthia, François, Jérôme, State, Radu, Dulaunoy, Alexandre, Engel, Thomas, Massen, Gilles
Publikováno v:
International Symposium on Integrated Network Management
International Symposium on Integrated Network Management, May 2013, Ghent, Belgium
International Symposium on Integrated Network Management, May 2013, Ghent, Belgium
International audience; The Internet has grown into an enormous network offering a variety of services, which are spread over a multitude of domains. BGP-routing and Autonomous Systems (AS) are the key components for maintaining high connectivity in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::e301d3b559a7aa6cc4ec802c401a9f6b
https://inria.hal.science/hal-00846082
https://inria.hal.science/hal-00846082
Autor:
Marchal, Samuel, François, Jérôme, Wagner, Cynthia, State, Radu, Dulaunoy, Alexandre, Thomas Engel, Festor, Olivier
Publikováno v:
IEEE/IFIP Network Operations and Management Symposium, 988-993. IEEE (2012).
BASE-Bielefeld Academic Search Engine
BASE-Bielefeld Academic Search Engine
We present a monitoring approach and the supporting software architecture for passive DNS traffic. Monitoring DNS traffic can reveal essential network and system level activity profiles. Worm infected and botnet participating hosts can be identified
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::eef3e60fa794cc0edaa7302c02f0260d
http://orbilu.uni.lu/handle/10993/13059
http://orbilu.uni.lu/handle/10993/13059
Publikováno v:
Feltus, C, Khadraoui, D & Dulaunoy, A 2004, Solution standard de compensation appliqué à une architecture e-Business sécurisée . Dans Proceedings of NOTERE 2004, Les Nouvelles TEchnnologies de la Répartition, Saida, Maroc. . < http://users.encs.concordia.ca/~dssouli/NOTERE-2004.htm >
OpenSST est un protocole ouvert et basé sur des standards de transactions électroniques dont le format de message est sécurisé [9]. Le présent article présente un prototype d'expérimentation du protocole OpenSST dans le cadre des transactions
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______4291::b28cc8867e4d3908bb99ec186a6599d9
https://pure.unamur.be/ws/files/1050712/66720.pdf
https://pure.unamur.be/ws/files/1050712/66720.pdf