{"title":"Intelligent architecture based on MAS and CBR for intrusion detection","authors":"Mohssine El Ajjouri, S. Benhadou, H. Medromi","doi":"10.1109/JNS4.2014.6850123","DOIUrl":"https://doi.org/10.1109/JNS4.2014.6850123","url":null,"abstract":"The agents used in the intrusion detection architectures have multiple characteristics namely delegation, cooperation and communication. However, an important property of agents: learning is not used. The concept of learning in existing IDSs used in general to learn the normal behavior of the system to secure. For this, normal profiles are built in a dedicated training phase, these profiles are then compared with the current activity. Thus, the IDS does not have the ability to detect new attacks. We propose in this paper, a new architecture based intrusion MAS adding a learning feature abnormal behaviors that correspond to new attack patterns detection. Thanks to this feature to update the knowledge base of attacks take place when a new plan of attack is discovered. To learn a new attack, the architecture must detect at first and then update the basic attack patterns. For the detection step, the detection approach adopted is based on the technique of Case-Based Reasoning (CBR). Thus, the proposed architecture is based on a hierarchical and distributed strategy where features are structured and separated into layers.","PeriodicalId":228109,"journal":{"name":"Proceedings of the 4th Edition of National Security Days (JNS4)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115327441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On access control requirements for inter-organizational workflow","authors":"Asmaa Elkandoussi, Hanan Elbakkali","doi":"10.1109/JNS4.2014.6850128","DOIUrl":"https://doi.org/10.1109/JNS4.2014.6850128","url":null,"abstract":"The rapid development in networks technologies has significantly enhanced connectivity and interactions between organizations. In fact, several organizations gather to cooperate and put in common their resources and skills to reach a common goal. Inter-Organizational Workflow aims to support cooperation between business processes running in different organizations. The Access Control service remains a major challenge to ensure safe and reliable exchange of data. Indeed, such collaborative systems are highly vulnerable to security threats, especially for confidential and sensitive data. So organizations must take into account the security needs and particularly those related to access control. That's why it's important to study the security requirements in such systems. This paper studies different Inter-Organizational Workflow Access Control models, explores the main requirements in such environments and gives a comparative study.","PeriodicalId":228109,"journal":{"name":"Proceedings of the 4th Edition of National Security Days (JNS4)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132667564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Surveing the challenges and requirements for identity in the cloud","authors":"Naoufal Ben Bouazza, M. Lemoudden, B. El Ouahidi","doi":"10.1109/JNS4.2014.6850127","DOIUrl":"https://doi.org/10.1109/JNS4.2014.6850127","url":null,"abstract":"Cloud technologies are increasingly important for IT department for allowing them to concentrate on strategy as opposed to maintaining data centers; the biggest advantages of the cloud is the ability to share computing resources between multiple providers, especially hybrid clouds, in overcoming infrastructure limitations. User identity federation is considered as the second major risk in the cloud, and since business organizations use multiple cloud service providers, IT department faces a range of constraints. Multiple attempts to solve this problem have been suggested like federated Identity, which has a number of advantages, despite it suffering from challenges that are common in new technologies. The following paper tackles federated identity, its components, advantages, disadvantages, and then proposes a number of useful scenarios to manage identity in hybrid clouds infrastructure.","PeriodicalId":228109,"journal":{"name":"Proceedings of the 4th Edition of National Security Days (JNS4)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116253991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Rghioui, Said Bouchkaren, Anass Khannous, M. Bouhorma
{"title":"Securing private wireless sensors in a shared environment in the Internet of Things context","authors":"A. Rghioui, Said Bouchkaren, Anass Khannous, M. Bouhorma","doi":"10.1109/JNS4.2014.6850126","DOIUrl":"https://doi.org/10.1109/JNS4.2014.6850126","url":null,"abstract":"To lead to the Smart Cities, we should have the possibility of obtaining information from different places and objects anytime and anywhere, in order to collect sufficient data to anticipate problems and take a good decisions. This will promote to an effective and autonomous organization by creating interacted and communicated objects around the city. So, we need to install various and specific IP-based wireless sensors everywhere to collect data remotely and in a real time. The idea of mixing sensors belonging to organizations from different specialties in the same places will involve several experts and encourages competition. But on the other side, it will open the door to new security threats and issues, also this will impose new management problems like how to limit the access to each organization to its sensors. In this paper, we study the security of a set of IP-based wireless sensors, which belongs to different organizations, and form a local network. We propose a model to ensure exchanged information confidentiality and manage the sensors accessibility, while considering the wireless sensors constrained characteristics.","PeriodicalId":228109,"journal":{"name":"Proceedings of the 4th Edition of National Security Days (JNS4)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116963354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a new intelligent generation of intrusion detection system","authors":"H. Benmoussa, A. A. El Kalam, A. A. Ouahman","doi":"10.1109/JNS4.2014.6850125","DOIUrl":"https://doi.org/10.1109/JNS4.2014.6850125","url":null,"abstract":"This paper presents a survey of distributed Intrusion Detection Systems (IDS) based on intelligent and mobile agents; it also proposes a new concept of proactive IDS. At first, we introduce the topic. Then, we present limitations of classical IDSs. In the third part, we study the technologies of agent and multi-agent system and present benefits of using it to address shortcoming of classical IDSs. Finally, we present our approach and future work.","PeriodicalId":228109,"journal":{"name":"Proceedings of the 4th Edition of National Security Days (JNS4)","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121303536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}