Search Results - "Aib, Issam"

Refine Results
  1. 1

    FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks by Francois, Jérôme, Aib, Issam, Boutaba, Raouf

    Published in IEEE/ACM transactions on networking (01-12-2012)
    “…Distributed denial-of-service (DDoS) attacks remain a major security problem, the mitigation of which is very hard especially when it comes to highly…”
    Get full text
    Journal Article
  2. 2

    Policy-based Management: A Historical Perspective by Boutaba, Raouf, Aib, Issam

    Published in Journal of network and systems management (01-12-2007)
    “…This paper traces the history of policy-based management and how it evolved from the first security models dating back to the late 1960's until today's more…”
    Get full text
    Journal Article
  3. 3

    FuzMet: a fuzzy-logic based alert prioritization engine for intrusion detection systems by Alsubhi, Khalid, Aib, Issam, Boutaba, Raouf

    “…SUMMARY Intrusion detection systems (IDSs) are designed to monitor a networked environment and generate alerts whenever abnormal activities are detected. The…”
    Get full text
    Journal Article
  4. 4

    Dirichlet-Based Trust Management for Effective Collaborative Intrusion Detection Networks by Fung, C J, Jie Zhang, Aib, I, Boutaba, R

    “…The accuracy of detecting intrusions within a Collaborative Intrusion Detection Network (CIDN) depends on the efficiency of collaboration between peer…”
    Get full text
    Journal Article
  5. 5

    Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection by Fung, Carol, Zhang, Jie, Aib, Issam, Boutaba, Raouf

    Published in Journal of network and systems management (01-06-2011)
    “…The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes…”
    Get full text
    Journal Article
  6. 6

    On Leveraging Policy-Based Management for Maximizing Business Profit by Aib, I., Boutaba, R.

    “…This paper presents a systematic approach to business and policy driven refinement. It also discusses an implementation of an application-hosting service level…”
    Get full text
    Journal Article
  7. 7

    An evasive attack on SNORT flowbits by Tung Tran, Aib, I., Al-Shaer, E., Boutaba, R.

    “…The support of stateful signatures is an important feature of signature-based Network Intrusion Detection Systems (NIDSs) which permits the detection of…”
    Get full text
    Conference Proceeding
  8. 8

    Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention by Alsubhi, K., Aib, I., Francois, J., Boutaba, R.

    “…Intrusion detection and/or prevention systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and…”
    Get full text
    Conference Proceeding
  9. 9

    Business-driven management of differentiated services by Rubio-Loyola, Javier, Charalambides, Marinos, Aib, Issam, Serrat, Joan, Pavlou, George, Boutaba, Raouf

    “…Several intra- and inter-domain quality of service (QoS) provisioning mechanisms for IP networks have been researched and developed using Differentiated…”
    Get full text
    Conference Proceeding
  10. 10

    ALBA: An autonomic load balancing algorithm for IEEE 802.11 wireless networks by Sawma, G., Aib, I., Ben-El-Kezadri, R., Pujolle, G.

    “…The widespread success of the WLAN technology raises the need for the efficient management of the different access points and the associated wireless devices,…”
    Get full text
    Conference Proceeding
  11. 11

    Characterization and Solution to a Stateful IDS Evasion by Aib, I., Tran, T., Boutaba, R.

    “…We identify a new type of stateful IDS evasion, named signature evasion. We formalize the signature evasion on those Stateful IDSs whose state can be modeled…”
    Get full text
    Conference Proceeding
  12. 12

    CyberPlanner: A comprehensive toolkit for network service providers by Boutaba, R., Jin Xiao, Aib, I.

    “…With the increased network size and diversity, and the proliferation in applications and services, the network service providers are faced with a flood of…”
    Get full text
    Conference Proceeding
  13. 13

    Robust and scalable trust management for collaborative intrusion detection by Fung, C.J., Jie Zhang, Aib, I., Boutaba, R.

    “…The accuracy of detecting intrusions within an intrusion detection network (IDN) depends on the efficiency of collaboration between the peer intrusion…”
    Get full text
    Conference Proceeding
  14. 14

    Business-Driven Optimization of Policy-Based Management solutions by Aib, I., Boutaba, R.

    “…We consider whether the off-line compilation of a set of Service Level Agreements (SLAs) into low-level management policies can lead to the runtime…”
    Get full text
    Conference Proceeding
  15. 15

    P2P-AIS: A P2P Artificial Immune Systems architecture for detecting DDoS flooding attacks by Ali, K., Aib, I., Boutaba, R.

    “…The human immune system (HIS) plays an important role in protecting the human body from various intruders ranging from naive germs to the most sophisticated…”
    Get full text
    Conference Proceeding
  16. 16

    A distributed trust and reputation model for capacity enhancement in wireless networks by Sawma, G., Demerjian, J., Aibz, I., Pujolle, G.

    Published in 2008 1st IFIP Wireless Days (01-11-2008)
    “…In order to enhance resource allocation in wireless local area networks, it is important to properly distribute the load from the overloaded access points…”
    Get full text
    Conference Proceeding
  17. 17

    Design of a Simulation Framework to Evaluate Trust Models for Collaborative Intrusion Detection by Fung, C., Zhang, J., Aib, I., Boutaba, R., Cohen, R.

    “…Different trust models have been developed for dealing with possible dishonest behavior and attacks from malicious peer Intrusion Detection Systems (IDSs) in a…”
    Get full text
    Conference Proceeding
  18. 18

    A Recursive Load Balancing technique for VoIP-dedicated WLANs by Sawma, G., Aib, I., Barbar, K., Pujolle, G.

    “…Intelligent and dynamic management is essential for improving WLAN efficiency, especially when multimedia and other QoS demanding applications are employed. In…”
    Get full text
    Conference Proceeding
  19. 19

    SLA-based dynamic resource management in wireless environments by Tebbani, B., Aib, I., Pujolle, G.

    “…In this article, we focus on the service-driven management of quality of service and user access in wireless corporate networks. We propose a service-level…”
    Get full text
    Conference Proceeding
  20. 20

    Autonomic Management for Capacity Improvement in Wireless Networks by Sawma, G., Ben-El-Kezadri, R., Aib, I., Pujolle, G.

    “…This paper presents an autonomic load balancing algorithm (ALBA) which enhances resource allocation in wireless local area networks (WLAN). ALBA offers…”
    Get full text
    Conference Proceeding