Search Results - "Majorczyk, Frederic"

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    SECURE-GEGELATI Always-On Intrusion Detection through GEGELATI Lightweight Tangled Program Graphs by Sourbier, Nicolas, Desnos, Karol, Guyet, Thomas, Majorczyk, Frédéric, Gesny, Olivier, Pelcat, Maxime

    Published in Journal of signal processing systems (01-07-2022)
    “…The fast improvement of Machine-Learning (ML) methods gives rise to new attacks in Information System (IS). Simultaneously, ML also creates new opportunities…”
    Get full text
    Journal Article
  2. 2

    VEGAS: Visualizing, exploring and grouping alerts by Cremilleux, Damien, Bidan, Christophe, Majorczyk, Frederic, Prigent, Nicolas

    “…The large quantities of alerts generated by intrusion detection systems (IDS) make very difficult to distinguish on a network real threats from noise. To help…”
    Get full text
    Conference Proceeding Journal Article
  3. 3

    A Tale of Two Methods: Unveiling the Limitations of GAN and the Rise of Bayesian Networks for Synthetic Network Traffic Generation by Schoen, Adrien, Blanc, Gregory, Gimenez, Pierre-Francois, Han, Yufei, Majorczyk, Frederic, Me, Ludovic

    “…The evaluation of network intrusion detection systems requires a sufficient amount of mixed network traffic, i.e., composed of both malicious and legitimate…”
    Get full text
    Conference Proceeding
  4. 4

    Automatic generation of correlation rules to detect complex attack scenarios by Godefroy, Erwan, Totel, Eric, Hurfin, Michel, Majorczyk, Frederic

    “…In large distributed information systems, alert correlation systems are necessary to handle the huge amount of elementary security alerts and to identify…”
    Get full text
    Conference Proceeding
  5. 5

    Cross-domain alert correlation methodology for industrial control systems by Koucham, Oualid, Mocanu, Stéphane, Hiet, Guillaume, Thiriet, Jean-Marc, Majorczyk, Frédéric

    Published in Computers & security (01-07-2022)
    “…Alert correlation is a set of techniques that process alerts raised by intrusion detection systems to eliminate redundant alerts, reduce the number of false…”
    Get full text
    Journal Article
  6. 6

    Towards Self Adaptable Security Monitoring in IaaS Clouds by Giannakou, Anna, Rillling, Louis, Pazat, Jean-Louis, Majorczyk, Frederic, Morin, Christine

    “…Traditional intrusion detection systems are not adaptive enough to cope with the dynamic characteristics of cloud-hosted virtual infrastructures. This makes…”
    Get full text
    Conference Proceeding
  7. 7

    Generation and assessment of correlation rules to detect complex attack scenarios by Godefroy, Erwan, Totel, Eric, Hurfin, Michel, Majorczyk, Frederic

    “…Information systems can be targeted by different types of attacks. Some of them are easily detected (like an DDOS targeting the system) while others are more…”
    Get full text
    Conference Proceeding
  8. 8

    Automated Instruction-Set Randomization for Web Applications in Diversified Redundant Systems by Majorczyk, F., Demay, J.-C.

    “…The use of diversity and redundancy in the security domain is an interesting approach to prevent or detect intrusions. Many researchers have proposed…”
    Get full text
    Conference Proceeding
  9. 9

    Simulating Routing Schemes on Large-Scale Topologies by Hogie, Luc, Papadimitriou, Dimitri, Tahiri, Issam, Majorczyk, Frederic

    “…The expansion of the Internet routing system results in a number of research challenges, in particular, the Border Gateway Protocol (BGP) starts to show its…”
    Get full text
    Conference Proceeding
  10. 10

    Adaptive Strategies for Speeding Up Sequences of Consensus by Hurfin, M., Moise, I., Le Narzul, J-P, Majorczyk, F.

    “…The Paxos-MIC protocol allows to solve a sequence of consensus instances in an unreliable asynchronous system. It follows the basic principles of Paxos and…”
    Get full text
    Conference Proceeding