Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Oualid Koucham"'
Publikováno v:
Computers and Security
Computers and Security, 2022, 118 (July), pp.102723. ⟨10.1016/j.cose.2022.102723⟩
Computers and Security, 2022, 118 (July), pp.102723. ⟨10.1016/j.cose.2022.102723⟩
International audience; In this paper we develop an alert correlation framework specifically tailored for Industrial Control Systems (ICSs). Alert correlation is a set of techniques used to process alerts raised by various intrusion detection systems
Efficient Mining of Temporal Safety Properties for Intrusion Detection in Industrial Control Systems
Publikováno v:
HAL
SAFEPROCESS 2018-10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes
SAFEPROCESS 2018-10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, Aug 2018, Varsovie, Poland. pp.1-8
SAFEPROCESS 2018-10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes
SAFEPROCESS 2018-10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, Aug 2018, Varsovie, Poland. pp.1-8
International audience; Sophisticated process-aware attacks targeting industrial control systems require adequate detection measures taking into account the physical process. This paper proposes an approach relying on automatically mined process spec
Publikováno v:
21st Nordic Conference on Secure IT Systems (NordSec 2016)
21st Nordic Conference on Secure IT Systems (NordSec 2016), Nov 2016, Oulu, Finland. p.20-36, ⟨10.1007/978-3-319-47560-8_2⟩
Secure IT Systems ISBN: 9783319475592
NordSec
NordSec 2016-21st Nordic Conference on Secure IT Systems (NordSec 2016)
NordSec 2016-21st Nordic Conference on Secure IT Systems (NordSec 2016), Nov 2016, Oulu, Finland. p.20-36, ⟨10.1007/978-3-319-47560-8_2⟩
21st Nordic Conference on Secure IT Systems (NordSec 2016), Nov 2016, Oulu, Finland. p.20-36, ⟨10.1007/978-3-319-47560-8_2⟩
Secure IT Systems ISBN: 9783319475592
NordSec
NordSec 2016-21st Nordic Conference on Secure IT Systems (NordSec 2016)
NordSec 2016-21st Nordic Conference on Secure IT Systems (NordSec 2016), Nov 2016, Oulu, Finland. p.20-36, ⟨10.1007/978-3-319-47560-8_2⟩
International audience; Industrial control systems (ICS) can be subject to highly sophisticated attacks which may lead the process towards critical states. Due to the particular context of ICS, protection mechanisms are not always practical, nor suff
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a5a81763e5b3d2e184d70afa731945b9
https://hal.inria.fr/hal-01361081
https://hal.inria.fr/hal-01361081
Publikováno v:
Studies in Computational Intelligence ISBN: 9783319333847
We present in this chapter a novel method for detecting intrusion into host systems that combines both data and execution flow of programs. To do this, we use sequences of system call traces produced by the host’s kernel, together with their argume
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d578b8b612be9d322faf6f871d415448
https://doi.org/10.1007/978-3-319-33386-1_21
https://doi.org/10.1007/978-3-319-33386-1_21
Publikováno v:
2015 SAI Intelligent Systems Conference (IntelliSys).
We deal in this paper with anomaly-based host intrusion detection using system call traces produced by a host's kernel. In addition to the sequences, we leverage system call arguments, contextual information and domain level knowledge to produce clus
Publikováno v:
Intelligent Systems & Applications; 2016, p427-450, 24p
Publikováno v:
Intelligent Systems & Applications; 2016, pi-ix, 9p
Publikováno v:
Secure IT Systems (9783319475592); 2016, pI-X, 10p
Publikováno v:
Secure IT Systems (9783319475592); 2016, p20-36, 17p
Publikováno v:
2015 SAI Intelligent Systems Conference (IntelliSys); 2015, p10-24, 15p