Search Results - "Majorczyk, Frederic"
-
1
SECURE-GEGELATI Always-On Intrusion Detection through GEGELATI Lightweight Tangled Program Graphs
Published in Journal of signal processing systems (01-07-2022)“…The fast improvement of Machine-Learning (ML) methods gives rise to new attacks in Information System (IS). Simultaneously, ML also creates new opportunities…”
Get full text
Journal Article -
2
VEGAS: Visualizing, exploring and grouping alerts
Published in IEEE/IFIP Network Operations and Management Symposium (01-04-2016)“…The large quantities of alerts generated by intrusion detection systems (IDS) make very difficult to distinguish on a network real threats from noise. To help…”
Get full text
Conference Proceeding Journal Article -
3
A Tale of Two Methods: Unveiling the Limitations of GAN and the Rise of Bayesian Networks for Synthetic Network Traffic Generation
Published in 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (08-07-2024)“…The evaluation of network intrusion detection systems requires a sufficient amount of mixed network traffic, i.e., composed of both malicious and legitimate…”
Get full text
Conference Proceeding -
4
Automatic generation of correlation rules to detect complex attack scenarios
Published in 2014 10th International Conference on Information Assurance and Security (01-11-2014)“…In large distributed information systems, alert correlation systems are necessary to handle the huge amount of elementary security alerts and to identify…”
Get full text
Conference Proceeding -
5
Cross-domain alert correlation methodology for industrial control systems
Published in Computers & security (01-07-2022)“…Alert correlation is a set of techniques that process alerts raised by intrusion detection systems to eliminate redundant alerts, reduce the number of false…”
Get full text
Journal Article -
6
Towards Self Adaptable Security Monitoring in IaaS Clouds
Published in 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (01-05-2015)“…Traditional intrusion detection systems are not adaptive enough to cope with the dynamic characteristics of cloud-hosted virtual infrastructures. This makes…”
Get full text
Conference Proceeding -
7
Generation and assessment of correlation rules to detect complex attack scenarios
Published in 2015 IEEE Conference on Communications and Network Security (CNS) (01-09-2015)“…Information systems can be targeted by different types of attacks. Some of them are easily detected (like an DDOS targeting the system) while others are more…”
Get full text
Conference Proceeding -
8
Automated Instruction-Set Randomization for Web Applications in Diversified Redundant Systems
Published in 2009 International Conference on Availability, Reliability and Security (01-03-2009)“…The use of diversity and redundancy in the security domain is an interesting approach to prevent or detect intrusions. Many researchers have proposed…”
Get full text
Conference Proceeding -
9
Simulating Routing Schemes on Large-Scale Topologies
Published in 2010 IEEE Workshop on Principles of Advanced and Distributed Simulation (17-05-2010)“…The expansion of the Internet routing system results in a number of research challenges, in particular, the Border Gateway Protocol (BGP) starts to show its…”
Get full text
Conference Proceeding -
10
Adaptive Strategies for Speeding Up Sequences of Consensus
Published in 2012 26th International Conference on Advanced Information Networking and Applications Workshops (01-03-2012)“…The Paxos-MIC protocol allows to solve a sequence of consensus instances in an unreliable asynchronous system. It follows the basic principles of Paxos and…”
Get full text
Conference Proceeding