Proceedings of the 4th Edition of National Security Days (JNS4)最新文献

筛选
英文 中文
Intelligent architecture based on MAS and CBR for intrusion detection 基于MAS和CBR的入侵检测智能体系结构
Proceedings of the 4th Edition of National Security Days (JNS4) Pub Date : 2014-05-12 DOI: 10.1109/JNS4.2014.6850123
Mohssine El Ajjouri, S. Benhadou, H. Medromi
{"title":"Intelligent architecture based on MAS and CBR for intrusion detection","authors":"Mohssine El Ajjouri, S. Benhadou, H. Medromi","doi":"10.1109/JNS4.2014.6850123","DOIUrl":"https://doi.org/10.1109/JNS4.2014.6850123","url":null,"abstract":"The agents used in the intrusion detection architectures have multiple characteristics namely delegation, cooperation and communication. However, an important property of agents: learning is not used. The concept of learning in existing IDSs used in general to learn the normal behavior of the system to secure. For this, normal profiles are built in a dedicated training phase, these profiles are then compared with the current activity. Thus, the IDS does not have the ability to detect new attacks. We propose in this paper, a new architecture based intrusion MAS adding a learning feature abnormal behaviors that correspond to new attack patterns detection. Thanks to this feature to update the knowledge base of attacks take place when a new plan of attack is discovered. To learn a new attack, the architecture must detect at first and then update the basic attack patterns. For the detection step, the detection approach adopted is based on the technique of Case-Based Reasoning (CBR). Thus, the proposed architecture is based on a hierarchical and distributed strategy where features are structured and separated into layers.","PeriodicalId":228109,"journal":{"name":"Proceedings of the 4th Edition of National Security Days (JNS4)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115327441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On access control requirements for inter-organizational workflow 组织间工作流的访问控制需求
Proceedings of the 4th Edition of National Security Days (JNS4) Pub Date : 2014-05-12 DOI: 10.1109/JNS4.2014.6850128
Asmaa Elkandoussi, Hanan Elbakkali
{"title":"On access control requirements for inter-organizational workflow","authors":"Asmaa Elkandoussi, Hanan Elbakkali","doi":"10.1109/JNS4.2014.6850128","DOIUrl":"https://doi.org/10.1109/JNS4.2014.6850128","url":null,"abstract":"The rapid development in networks technologies has significantly enhanced connectivity and interactions between organizations. In fact, several organizations gather to cooperate and put in common their resources and skills to reach a common goal. Inter-Organizational Workflow aims to support cooperation between business processes running in different organizations. The Access Control service remains a major challenge to ensure safe and reliable exchange of data. Indeed, such collaborative systems are highly vulnerable to security threats, especially for confidential and sensitive data. So organizations must take into account the security needs and particularly those related to access control. That's why it's important to study the security requirements in such systems. This paper studies different Inter-Organizational Workflow Access Control models, explores the main requirements in such environments and gives a comparative study.","PeriodicalId":228109,"journal":{"name":"Proceedings of the 4th Edition of National Security Days (JNS4)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132667564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Surveing the challenges and requirements for identity in the cloud 调查云中身份的挑战和需求
Proceedings of the 4th Edition of National Security Days (JNS4) Pub Date : 2014-05-12 DOI: 10.1109/JNS4.2014.6850127
Naoufal Ben Bouazza, M. Lemoudden, B. El Ouahidi
{"title":"Surveing the challenges and requirements for identity in the cloud","authors":"Naoufal Ben Bouazza, M. Lemoudden, B. El Ouahidi","doi":"10.1109/JNS4.2014.6850127","DOIUrl":"https://doi.org/10.1109/JNS4.2014.6850127","url":null,"abstract":"Cloud technologies are increasingly important for IT department for allowing them to concentrate on strategy as opposed to maintaining data centers; the biggest advantages of the cloud is the ability to share computing resources between multiple providers, especially hybrid clouds, in overcoming infrastructure limitations. User identity federation is considered as the second major risk in the cloud, and since business organizations use multiple cloud service providers, IT department faces a range of constraints. Multiple attempts to solve this problem have been suggested like federated Identity, which has a number of advantages, despite it suffering from challenges that are common in new technologies. The following paper tackles federated identity, its components, advantages, disadvantages, and then proposes a number of useful scenarios to manage identity in hybrid clouds infrastructure.","PeriodicalId":228109,"journal":{"name":"Proceedings of the 4th Edition of National Security Days (JNS4)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116253991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Securing private wireless sensors in a shared environment in the Internet of Things context 在物联网环境中保护共享环境中的专用无线传感器
Proceedings of the 4th Edition of National Security Days (JNS4) Pub Date : 2014-05-12 DOI: 10.1109/JNS4.2014.6850126
A. Rghioui, Said Bouchkaren, Anass Khannous, M. Bouhorma
{"title":"Securing private wireless sensors in a shared environment in the Internet of Things context","authors":"A. Rghioui, Said Bouchkaren, Anass Khannous, M. Bouhorma","doi":"10.1109/JNS4.2014.6850126","DOIUrl":"https://doi.org/10.1109/JNS4.2014.6850126","url":null,"abstract":"To lead to the Smart Cities, we should have the possibility of obtaining information from different places and objects anytime and anywhere, in order to collect sufficient data to anticipate problems and take a good decisions. This will promote to an effective and autonomous organization by creating interacted and communicated objects around the city. So, we need to install various and specific IP-based wireless sensors everywhere to collect data remotely and in a real time. The idea of mixing sensors belonging to organizations from different specialties in the same places will involve several experts and encourages competition. But on the other side, it will open the door to new security threats and issues, also this will impose new management problems like how to limit the access to each organization to its sensors. In this paper, we study the security of a set of IP-based wireless sensors, which belongs to different organizations, and form a local network. We propose a model to ensure exchanged information confidentiality and manage the sensors accessibility, while considering the wireless sensors constrained characteristics.","PeriodicalId":228109,"journal":{"name":"Proceedings of the 4th Edition of National Security Days (JNS4)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116963354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a new intelligent generation of intrusion detection system 迈向新一代智能入侵检测系统
Proceedings of the 4th Edition of National Security Days (JNS4) Pub Date : 2014-05-12 DOI: 10.1109/JNS4.2014.6850125
H. Benmoussa, A. A. El Kalam, A. A. Ouahman
{"title":"Towards a new intelligent generation of intrusion detection system","authors":"H. Benmoussa, A. A. El Kalam, A. A. Ouahman","doi":"10.1109/JNS4.2014.6850125","DOIUrl":"https://doi.org/10.1109/JNS4.2014.6850125","url":null,"abstract":"This paper presents a survey of distributed Intrusion Detection Systems (IDS) based on intelligent and mobile agents; it also proposes a new concept of proactive IDS. At first, we introduce the topic. Then, we present limitations of classical IDSs. In the third part, we study the technologies of agent and multi-agent system and present benefits of using it to address shortcoming of classical IDSs. Finally, we present our approach and future work.","PeriodicalId":228109,"journal":{"name":"Proceedings of the 4th Edition of National Security Days (JNS4)","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121303536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信