Search Results - "Aib, Issam"
-
1
FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
Published in IEEE/ACM transactions on networking (01-12-2012)“…Distributed denial-of-service (DDoS) attacks remain a major security problem, the mitigation of which is very hard especially when it comes to highly…”
Get full text
Journal Article -
2
Policy-based Management: A Historical Perspective
Published in Journal of network and systems management (01-12-2007)“…This paper traces the history of policy-based management and how it evolved from the first security models dating back to the late 1960's until today's more…”
Get full text
Journal Article -
3
FuzMet: a fuzzy-logic based alert prioritization engine for intrusion detection systems
Published in International journal of network management (01-07-2012)“…SUMMARY Intrusion detection systems (IDSs) are designed to monitor a networked environment and generate alerts whenever abnormal activities are detected. The…”
Get full text
Journal Article -
4
Dirichlet-Based Trust Management for Effective Collaborative Intrusion Detection Networks
Published in IEEE eTransactions on network and service management (01-06-2011)“…The accuracy of detecting intrusions within a Collaborative Intrusion Detection Network (CIDN) depends on the efficiency of collaboration between peer…”
Get full text
Journal Article -
5
Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection
Published in Journal of network and systems management (01-06-2011)“…The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes…”
Get full text
Journal Article -
6
On Leveraging Policy-Based Management for Maximizing Business Profit
Published in IEEE eTransactions on network and service management (01-12-2007)“…This paper presents a systematic approach to business and policy driven refinement. It also discusses an implementation of an application-hosting service level…”
Get full text
Journal Article -
7
An evasive attack on SNORT flowbits
Published in 2012 IEEE Network Operations and Management Symposium (01-04-2012)“…The support of stateful signatures is an important feature of signature-based Network Intrusion Detection Systems (NIDSs) which permits the detection of…”
Get full text
Conference Proceeding -
8
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Published in 2009 IEEE International Conference on Communications (01-06-2009)“…Intrusion detection and/or prevention systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and…”
Get full text
Conference Proceeding -
9
Business-driven management of differentiated services
Published in 2010 IEEE Network Operations and Management Symposium - NOMS 2010 (01-04-2010)“…Several intra- and inter-domain quality of service (QoS) provisioning mechanisms for IP networks have been researched and developed using Differentiated…”
Get full text
Conference Proceeding -
10
ALBA: An autonomic load balancing algorithm for IEEE 802.11 wireless networks
Published in NOMS 2008 - 2008 IEEE Network Operations and Management Symposium (01-04-2008)“…The widespread success of the WLAN technology raises the need for the efficient management of the different access points and the associated wireless devices,…”
Get full text
Conference Proceeding -
11
Characterization and Solution to a Stateful IDS Evasion
Published in 2009 29th IEEE International Conference on Distributed Computing Systems (01-06-2009)“…We identify a new type of stateful IDS evasion, named signature evasion. We formalize the signature evasion on those Stateful IDSs whose state can be modeled…”
Get full text
Conference Proceeding -
12
CyberPlanner: A comprehensive toolkit for network service providers
Published in NOMS 2008 - 2008 IEEE Network Operations and Management Symposium (01-04-2008)“…With the increased network size and diversity, and the proliferation in applications and services, the network service providers are faced with a flood of…”
Get full text
Conference Proceeding -
13
Robust and scalable trust management for collaborative intrusion detection
Published in 2009 IFIP/IEEE International Symposium on Integrated Network Management (01-06-2009)“…The accuracy of detecting intrusions within an intrusion detection network (IDN) depends on the efficiency of collaboration between the peer intrusion…”
Get full text
Conference Proceeding -
14
Business-Driven Optimization of Policy-Based Management solutions
Published in 2007 10th IFIP/IEEE International Symposium on Integrated Network Management (01-05-2007)“…We consider whether the off-line compilation of a set of Service Level Agreements (SLAs) into low-level management policies can lead to the runtime…”
Get full text
Conference Proceeding -
15
P2P-AIS: A P2P Artificial Immune Systems architecture for detecting DDoS flooding attacks
Published in 2009 Global Information Infrastructure Symposium (01-06-2009)“…The human immune system (HIS) plays an important role in protecting the human body from various intruders ranging from naive germs to the most sophisticated…”
Get full text
Conference Proceeding -
16
A distributed trust and reputation model for capacity enhancement in wireless networks
Published in 2008 1st IFIP Wireless Days (01-11-2008)“…In order to enhance resource allocation in wireless local area networks, it is important to properly distribute the load from the overloaded access points…”
Get full text
Conference Proceeding -
17
Design of a Simulation Framework to Evaluate Trust Models for Collaborative Intrusion Detection
Published in 2009 International Conference on Network and Service Security (01-06-2009)“…Different trust models have been developed for dealing with possible dishonest behavior and attacks from malicious peer Intrusion Detection Systems (IDSs) in a…”
Get full text
Conference Proceeding -
18
A Recursive Load Balancing technique for VoIP-dedicated WLANs
Published in 2008 IEEE/ACS International Conference on Computer Systems and Applications (01-03-2008)“…Intelligent and dynamic management is essential for improving WLAN efficiency, especially when multimedia and other QoS demanding applications are employed. In…”
Get full text
Conference Proceeding -
19
SLA-based dynamic resource management in wireless environments
Published in 2008 IEEE/ACS International Conference on Computer Systems and Applications (01-03-2008)“…In this article, we focus on the service-driven management of quality of service and user access in wireless corporate networks. We propose a service-level…”
Get full text
Conference Proceeding -
20
Autonomic Management for Capacity Improvement in Wireless Networks
Published in 2009 6th IEEE Consumer Communications and Networking Conference (01-01-2009)“…This paper presents an autonomic load balancing algorithm (ALBA) which enhances resource allocation in wireless local area networks (WLAN). ALBA offers…”
Get full text
Conference Proceeding