A. Guelfi
Related Authors
Takoua Abdellatif
University of Sousse: Ecole Supérieure des Sciences et de Technologie de Hammam Sousse
Christos Emmanouilidis
University of Groningen
Luciano Bertini
UFF - Universidade Federal Fluminense
Shahid Raza
Mälardalen University
Essam Debie
The University of New South Wales
Miguel Zamora
Sitec
Kostantinos Demertzis
Hellenic Open University
Uploads
Papers by A. Guelfi
Intrusion Detection Systems (IDS), can be listed the
difficulty to understand the strategies of the attacks and the
huge amount of alerts generated. The analysis of alerts can
be difficult because many alerts are kind of false positive
and eventually lead to false results. Correlate alerts issued
by an IDS based on its causes and consequences is a way of
highlighting strategies and establish links between the
attacks. However, many alerts, called isolates did not
correlate to others. Within this context, the ideal is to check
the veracity of alerts (isolated and correlated) through
other sources (cross-correlation), for example, logs taken
from the operating system. Therefore, the objective is to
propose an Event Analysis System (SAE) which allows
multi-correlate security alerts information from a SDI with
the operating system logs and analyze the alerts isolates for
the identification of false positives alerts.
(MANETs), the position of the nodes is generally hard to
be determined. In sensor networks, for instance, such information
may be critical for the MANETs. Additionally, one problem to
be faced in this scenario is the fake parameters broadcasted
by misbehaving/malicious nodes, which can either compromise
results about positioning, or deplete power resources of mobile
devices. Therefore, in this paper we propose a model for (1)
identifying the fake parameters broadcasted in the network, and
for (2) detecting the malicious/misbehaving nodes. The Linear
Regression and Variance Analysis (LRVA) are both the basis for
the multi-step-ahead predictions in this paper. Through NS-2 and
Avrora, we simulated the movement and energy consumption of
nodes in a MANET, analyzing the time series of beacon-packets
exchanged in the network. As a result of the LRVA employment,
the fake parameters broadcasted in the network were detected,
with the malicious/misbehaving nodes identified. The simulations
presented in this paper show low power consumption, which
allows the jointly employment of LRVA with other security
techniques in the MANETs.
Intrusion Detection Systems (IDS), can be listed the
difficulty to understand the strategies of the attacks and the
huge amount of alerts generated. The analysis of alerts can
be difficult because many alerts are kind of false positive
and eventually lead to false results. Correlate alerts issued
by an IDS based on its causes and consequences is a way of
highlighting strategies and establish links between the
attacks. However, many alerts, called isolates did not
correlate to others. Within this context, the ideal is to check
the veracity of alerts (isolated and correlated) through
other sources (cross-correlation), for example, logs taken
from the operating system. Therefore, the objective is to
propose an Event Analysis System (SAE) which allows
multi-correlate security alerts information from a SDI with
the operating system logs and analyze the alerts isolates for
the identification of false positives alerts.
(MANETs), the position of the nodes is generally hard to
be determined. In sensor networks, for instance, such information
may be critical for the MANETs. Additionally, one problem to
be faced in this scenario is the fake parameters broadcasted
by misbehaving/malicious nodes, which can either compromise
results about positioning, or deplete power resources of mobile
devices. Therefore, in this paper we propose a model for (1)
identifying the fake parameters broadcasted in the network, and
for (2) detecting the malicious/misbehaving nodes. The Linear
Regression and Variance Analysis (LRVA) are both the basis for
the multi-step-ahead predictions in this paper. Through NS-2 and
Avrora, we simulated the movement and energy consumption of
nodes in a MANET, analyzing the time series of beacon-packets
exchanged in the network. As a result of the LRVA employment,
the fake parameters broadcasted in the network were detected,
with the malicious/misbehaving nodes identified. The simulations
presented in this paper show low power consumption, which
allows the jointly employment of LRVA with other security
techniques in the MANETs.