Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Issam Aib"'
Publikováno v:
Techniques et sciences informatiques. 31:215-243
With the proliferation of the IEEE 802.11 technology as a universal standard for wireless LAN, the management of access points and wireless stations has become essential to provide QoS to the users. In this article, we propose an autonomic piloting s
Publikováno v:
International Journal of Network Management. 22:263-284
Intrusion detection systems (IDSs) are designed to monitor a networked environment and generate alerts whenever abnormal activities are detected. The number of these alerts can be very large, making their evaluation by security analysts a difficult t
Publikováno v:
IEEE Transactions on Network and Service Management. 8:79-91
The accuracy of detecting intrusions within a Collaborative Intrusion Detection Network (CIDN) depends on the efficiency of collaboration between peer Intrusion Detection Systems (IDSes) as well as the security itself of the CIDN. In this paper, we p
Publikováno v:
Journal of Network and Systems Management. 19:257-277
The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes. The security itself within this network is an additional concern that needs to be addresse
Autor:
Raouf Boutaba, Issam Aib
Publikováno v:
IEEE Transactions on Network and Service Management. 4:25-39
This paper presents a systematic approach to business and policy driven refinement. It also discusses an implementation of an application-hosting service level agreement (SLA) use case. We make use of a simple application hosting SLA template, for wh
Autor:
Raouf Boutaba, Issam Aib
Publikováno v:
Journal of Network and Systems Management. 15:447-480
This paper traces the history of policy-based management and how it evolved from the first security models dating back to the late 1960's until today's more elaborate frameworks, languages, and policy-based management tools. The focus will be on prov
Publikováno v:
IEEE/ACM Transactions on Networking
IEEE/ACM Transactions on Networking, IEEE/ACM, 2012, 20 (6), pp.1828-1841. ⟨10.1109/TNET.2012.2194508⟩
IEEE/ACM Transactions on Networking, IEEE/ACM, 2012, 20 (6), pp.1828-1841. ⟨10.1109/TNET.2012.2194508⟩
International audience; Distributed Denial of Service (DDoS) attacks remain a major security problem the mitigation of which is very hard especially when it comes to highly distributed botnet-based attacks. The early discovery of these attacks, altho
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::41006004c158284b2073ca9d4d996247
https://hal.archives-ouvertes.fr/hal-00959439/document
https://hal.archives-ouvertes.fr/hal-00959439/document
Publikováno v:
NOMS
The support of stateful signatures is an important feature of signature-based Network Intrusion Detection Systems (NIDSs) which permits the detection of multi-stage attacks. However, due to the difficulty to completely simulate every application prot
Autor:
Belkacem Daheb, Issam Aib
Publikováno v:
Management, Control and Evolution of IP Networks
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6bbc18e21fbe066a6c610b1eaae0fb9f
https://doi.org/10.1002/9780470612118.ch11
https://doi.org/10.1002/9780470612118.ch11
Publikováno v:
NETWORKING 2010 ISBN: 9783642129629
Networking
Networking
Network Virtualization (NV) is an enabling technology for the future Internet and next-generation communication networks. A fundamental problem in NV is to map the virtual nodes and virtual links of a VN to physical nodes and paths, respectively, kno
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::571590aacc9dfeb9548979634a75aafe
https://doi.org/10.1007/978-3-642-12963-6_4
https://doi.org/10.1007/978-3-642-12963-6_4