Skip to main content
Nowadays, network infrastructures are supervised by human operators. These operators are submerged by a massive surcharge of information and alerts caused by security mechanisms. In this paper, we focus particularly in anomalies detection... more
Nowadays, network infrastructures are supervised by human operators. These operators are submerged by a massive surcharge of information and alerts caused by security mechanisms. In this paper, we focus particularly in anomalies detection systems and propose a multi-levels architecture allowing in one hand, the enhancement of the diagnosis' quality for security administrator support by filtering faulty alerts and on the
Research Interests:
Security-as-a-service (SaaS) is an outsourcing new model for security management. This model is defined as the ability to deliver security services remotely. In this paper we present a new SaaS approach that allows a customer to request... more
Security-as-a-service (SaaS) is an outsourcing new model for security management. This model is defined as the ability to deliver security services remotely. In this paper we present a new SaaS approach that allows a customer to request from a security provider the verification of his firewall. The requested task is achieved using mobile agents approach. After accomplishing its task the delegated mobile agent sends the verification results to its provider which transmits the customer. The whole process is done in a transparent way without any customer intervention.
Abstract–Europe has a clear objective of obtaining a large share of wind power in the overall energy mix. A significant part of the installed wind power capacity will come from offshore wind farms. As an alternative to connecting every... more
Abstract–Europe has a clear objective of obtaining a large share of wind power in the overall energy mix. A significant part of the installed wind power capacity will come from offshore wind farms. As an alternative to connecting every wind farm to the onshore grid separately ...
There is growing consensus that some design principles are needed to overcome the ever increasing complexity in verifying and testing software in order to build more reliable systems. Design for testability (DFT) is the process of... more
There is growing consensus that some design principles are needed to overcome the ever increasing complexity in verifying and testing software in order to build more reliable systems. Design for testability (DFT) is the process of applying techniques and methods during the design ...
Communication software has become more complex and therefore more difficult to test. In order to handle the complexity of tests for communication protocols, a research topic known as the design for testability (DFT) has emerged. The main... more
Communication software has become more complex and therefore more difficult to test. In order to handle the complexity of tests for communication protocols, a research topic known as the design for testability (DFT) has emerged. The main objective of DFT is to reduce the cost and the complexity of tests. Testability activity and its analysis necessitate the use of estimation
Shopping Cart | Login | Register, IGI Global. BOOKS Book Information. Catalogs Imprints Book Series How To Order Library Recommendation Course Adoption Distributors. Browse Our Books. Featured Books Complete Listing ...
It is well known that the tests and diagnostics influence greatly the communication software reliability. The testability and the easiness of the diagnostic process of communication software are becoming a major concern of the design... more
It is well known that the tests and diagnostics influence greatly the communication software reliability. The testability and the easiness of the diagnostic process of communication software are becoming a major concern of the design community. The fault detection and the fault localization problems are strongly related issues. The easiness of diagnostics can be seen as a criteria of testability, it is in fact characterized by specific requirements at the design level. In this paper, we will make a clear link between these two issues and we will study the influence of some testability factors on the diagnostic activity. We will present our results and hints on "diagnosablility" in the context of finite state machine model.
Firewalls are core elements in network security. However, detecting anomalies, particularly in distributed firewalls has become a complex task. Mobile agents promise an interesting approach for communications between different distributed... more
Firewalls are core elements in network security. However, detecting anomalies, particularly in distributed firewalls has become a complex task. Mobile agents promise an interesting approach for communications between different distributed systems specially Web services applications. In this work, we propose a firewall anomaliespsila detection system based on interactions between the Web services and the mobile agents technologies. Then, we highlight
Nowadays, to survey and guarantee the security policy in networks, the administrator uses different network security components, such as firewalls and intrusion detection systems (IDS). For a perfect interoperability between these... more
Nowadays, to survey and guarantee the security policy in networks, the administrator uses different network security components, such as firewalls and intrusion detection systems (IDS). For a perfect interoperability between these components in the network, these latter must be configured properly to avoid misconfiguration anomalies between them. However, there are a set of anomalies between alerting rules in the IDS
ABSTRACT Firewalls are core elements in network security. However detecting anomalies, particularly in distributed firewalls has become a complex task. Mobile agents promise an interesting approach for communications between different... more
ABSTRACT Firewalls are core elements in network security. However detecting anomalies, particularly in distributed firewalls has become a complex task. Mobile agents promise an interesting approach for communications between different distributed systems. The main challenge when deploying mobile agent environments pertains to security issues concerning mobile agents and their executive platform. In this work, we propose a firewall anomalies' detection system using a secure mobile agents approach where protection is based on the cooperation of a trust agent running inside a trust host.
ABSTRACT The Agents and Data Mining integration has emerged as a promising area for disributed problems solving. Applying this integration on distributed firewalls will facilitate the anomalies detection process. In this chapter, we... more
ABSTRACT The Agents and Data Mining integration has emerged as a promising area for disributed problems solving. Applying this integration on distributed firewalls will facilitate the anomalies detection process. In this chapter, we present a set of algorithms and mining techniques to analyse, manage and detect anomalies on distributed firewalls’ policy rules using the multi-agent approach; first, for each firewall, a static agent will execute a set of data mining techniques to generate a new set of efficient firewall policy rules. Then, a mobile agent will exploit these sets of optimized rules to detect eventual anomalies on a specific firewall (intra-firewalls anomalies) or between firewalls (inter-firewalls anomalies). An experimental case study will be presented to demonstrate the usefulness of our approach.
ABSTRACT The high costs of network platforms, growth in customer requirements, data volumes and pressures on response time pushed companies to migrate to Cloud Computing providing on demand internet hosted IT services. Cloud computing is... more
ABSTRACT The high costs of network platforms, growth in customer requirements, data volumes and pressures on response time pushed companies to migrate to Cloud Computing providing on demand internet hosted IT services. Cloud computing is based essentially on platforms and servers virtualization and promises the reduction of costs and the increase of flexibility. However, there are still some challenges to be solved. Amongst these are security and trust issues, since the user's data has to be released to the Cloud and thus leaves the protection-sphere of the data owner. In this paper, we propose a cloud computing architecture offering the ease of resources management, access security and service availability in a reliable structure with lower cost.
Nowadays, network infrastructures are supervised by human operators. These operators are submerged by a massive surcharge of information and alerts caused by security mechanisms. In this paper, we focus particularly in anomalies detection... more
Nowadays, network infrastructures are supervised by human operators. These operators are submerged by a massive surcharge of information and alerts caused by security mechanisms. In this paper, we focus particularly in anomalies detection systems and propose a multi-levels architecture allowing in one hand, the enhancement of the diagnosis' quality for security administrator support by filtering faulty alerts and on the
The cost of the test activity constitutes an important part of the total development cost. To make test easier (cost, time, and efforts), the consideration of test problems before the implementation phase is now necessary. This early... more
The cost of the test activity constitutes an important part of the total development cost. To make test easier (cost, time, and efforts), the consideration of test problems before the implementation phase is now necessary. This early consideration is known as Design for testability (DFT). The design of testable software does not consist solely in applying methods that improve the testability but also to verify if the degree of testability of the new obtained product is acceptable. This activity can be carried out using testability evaluation and a set of appropriate transformations. We propose a method based on the modeling of software by relations. The testability of a given specification is defined as a set of factors that influence the tests. These factors are evaluated separately and their values are gathered in a vector called the testability vector. The evaluation is based on the properties of a relation such as determinism, definissability, and informability. The method is us...
To deal with the increased complexity related to the testing of communications software, we propose the integration and application of finite state machine based specification transformations and testability measures early in the... more
To deal with the increased complexity related to the testing of communications software, we propose the integration and application of finite state machine based specification transformations and testability measures early in the communications software development process. Based on this integration, the testability of a given design is estimated and appropriate specification transformations are defined and applied iteratively to enhance the
... ISBN10: 1-60566-026-4 EISBN13: 978-1-60566-027-1. Author(s): Kamel Karoui (University ... of Information Science and Technology, Second Edition Source Author(s)/Editor(s): Mehdi Khosrow-Pour ... In this article, we first focus on... more
... ISBN10: 1-60566-026-4 EISBN13: 978-1-60566-027-1. Author(s): Kamel Karoui (University ... of Information Science and Technology, Second Edition Source Author(s)/Editor(s): Mehdi Khosrow-Pour ... In this article, we first focus on these two technologies of actuality and show their ...
Nowadays, to survey and guarantee the security policy in networks, the administrator uses different network security components, such as firewalls and intrusion detection systems (IDS). For a perfect interoperability between these... more
Nowadays, to survey and guarantee the security policy in networks, the administrator uses different network security components, such as firewalls and intrusion detection systems (IDS). For a perfect interoperability between these components in the network, these latter must be configured properly to avoid misconfiguration anomalies between them. However, there are a set of anomalies between alerting rules in the IDS
Cloud computing is an emerging paradigm based on distributed services. It is deployed in virtual resources to provide services to public customers and private organizations. Generally, without security measures, distributed cloud services... more
Cloud computing is an emerging paradigm based on distributed services. It is deployed in virtual resources to provide services to public customers and private organizations. Generally, without security measures, distributed cloud services are vulnerable. In this paper, we will propose a framework for detecting and repairing distributed intrusions in hybrid cloud. Our framework is based on secure mobile agents.
Firewalls are core elements in network security. However, the management of firewall rules has been proven to be complex, error-prone, costly and inefficient for many large-networked organizations. These firewall rules are mostly... more
Firewalls are core elements in network security. However, the management of firewall rules has been proven to be complex, error-prone, costly and inefficient for many large-networked organizations. These firewall rules are mostly custom-designed and hand-written thus in constant need for tuning and validation to avoid incoherence between them and to guarantee interoperability between distributed firewalls. In this work, we propose a model to check the distributed firewall interoperability using the mobile agent approach.
There are many challenges confronting the correctness and consistency of security policy configuration in enterprise networks. Firewalls are network security devices that operate based on locally configured policies. A successful... more
There are many challenges confronting the correctness and consistency of security policy configuration in enterprise networks. Firewalls are network security devices that operate based on locally configured policies. A successful deployment of a network security system requires global analysis of policy configurations of all firewalls in order to avoid policy conflicts and inconsistency. Policy conflicts may cause serious security breaches and network vulnerability such as blocking legitimate traffic, permitting unwanted traffic, and insecure data transmission. In this paper, we will check the security policy conflicts that might potentially exist in a single firewall (intra-policy conflicts) or between firewalls (inter-policy conflicts) in a network. To achieve this goal, we will use the mobile agent approach which facilitates communication and data exchange between distributed firewalls. A case study will demonstrate the effectiveness of our approach.
Security-as-a-service (SaaS) is an outsourcing new model for security management. This model is defined as the ability to deliver security services remotely. In this paper we present a new SaaS approach that allows a customer to request... more
Security-as-a-service (SaaS) is an outsourcing new model for security management. This model is defined as the ability to deliver security services remotely. In this paper we present a new SaaS approach that allows a customer to request from a security provider the verification of his firewall. The requested task is achieved using mobile agents approach. After accomplishing its task the delegated mobile agent sends the verification results to its provider which transmits the customer. The whole process is done in a transparent way without any customer intervention.
Firewalls are core elements in network security. However, detecting anomalies, particularly in distributed firewalls has become a complex task. Mobile agents promise an interesting approach for communications between different distributed... more
Firewalls are core elements in network security. However, detecting anomalies, particularly in distributed firewalls has become a complex task. Mobile agents promise an interesting approach for communications between different distributed systems. In this work, we propose a firewall anomalies’ detection system using the mobile agents approach and highlight the trumps of this approach compared to the client/server model.
Research Interests:
The distributed applications need to communicate and to exchange information between various entities. The Mobile Agents appears in this context as a promising solution, allowing the construction of flexible applications, adaptable to... more
The distributed applications need to communicate and to exchange information between various entities. The Mobile Agents appears in this context as a promising solution, allowing the construction of flexible applications, adaptable to their constraints and to their execution environment. Web services are a distributed web applications which can be accessed by any language, using any component model and running on any operating system. In this work, we will present how to merge theses two complementary paradigms will allow us to benefit from their advantages.
There is growing consensus that some design principles are needed to overcome the ever increasing complexity in verifying and testing software in order to build more reliable systems. Design for testability (DFT) is the process of... more
There is growing consensus that some design principles are needed to overcome the ever increasing complexity in verifying and testing software in order to build more reliable systems. Design for testability (DFT) is the process of applying techniques and methods during the design ...
Firewalls are core elements in network security. However, detecting anomalies, particularly in distributed firewalls has become a complex task. Mobile agents promise an interesting approach for communications between different distributed... more
Firewalls are core elements in network security. However, detecting anomalies, particularly in distributed firewalls has become a complex task. Mobile agents promise an interesting approach for communications between different distributed systems specially Web services applications. In this work, we propose a firewall anomaliespsila detection system based on interactions between the Web services and the mobile agents technologies. Then, we highlight
Nowadays, to survey and guarantee the security policy in networks, the administrator uses different network security components, such as firewalls and intrusion detection systems (IDS). For a perfect interoperability between these... more
Nowadays, to survey and guarantee the security policy in networks, the administrator uses different network security components, such as firewalls and intrusion detection systems (IDS). For a perfect interoperability between these components in the network, these latter must be configured properly to avoid misconfiguration anomalies between them. However, there are a set of anomalies between alerting rules in the IDS
ABSTRACT Firewalls are core elements in network security. However detecting anomalies, particularly in distributed firewalls has become a complex task. Mobile agents promise an interesting approach for communications between different... more
ABSTRACT Firewalls are core elements in network security. However detecting anomalies, particularly in distributed firewalls has become a complex task. Mobile agents promise an interesting approach for communications between different distributed systems. The main challenge when deploying mobile agent environments pertains to security issues concerning mobile agents and their executive platform. In this work, we propose a firewall anomalies' detection system using a secure mobile agents approach where protection is based on the cooperation of a trust agent running inside a trust host.
ABSTRACT The Agents and Data Mining integration has emerged as a promising area for disributed problems solving. Applying this integration on distributed firewalls will facilitate the anomalies detection process. In this chapter, we... more
ABSTRACT The Agents and Data Mining integration has emerged as a promising area for disributed problems solving. Applying this integration on distributed firewalls will facilitate the anomalies detection process. In this chapter, we present a set of algorithms and mining techniques to analyse, manage and detect anomalies on distributed firewalls’ policy rules using the multi-agent approach; first, for each firewall, a static agent will execute a set of data mining techniques to generate a new set of efficient firewall policy rules. Then, a mobile agent will exploit these sets of optimized rules to detect eventual anomalies on a specific firewall (intra-firewalls anomalies) or between firewalls (inter-firewalls anomalies). An experimental case study will be presented to demonstrate the usefulness of our approach.
ABSTRACT The high costs of network platforms, growth in customer requirements, data volumes and pressures on response time pushed companies to migrate to Cloud Computing providing on demand internet hosted IT services. Cloud computing is... more
ABSTRACT The high costs of network platforms, growth in customer requirements, data volumes and pressures on response time pushed companies to migrate to Cloud Computing providing on demand internet hosted IT services. Cloud computing is based essentially on platforms and servers virtualization and promises the reduction of costs and the increase of flexibility. However, there are still some challenges to be solved. Amongst these are security and trust issues, since the user's data has to be released to the Cloud and thus leaves the protection-sphere of the data owner. In this paper, we propose a cloud computing architecture offering the ease of resources management, access security and service availability in a reliable structure with lower cost.
Nowadays, network infrastructures are supervised by human operators. These operators are submerged by a massive surcharge of information and alerts caused by security mechanisms. In this paper, we focus particularly in anomalies detection... more
Nowadays, network infrastructures are supervised by human operators. These operators are submerged by a massive surcharge of information and alerts caused by security mechanisms. In this paper, we focus particularly in anomalies detection systems and propose a multi-levels architecture allowing in one hand, the enhancement of the diagnosis' quality for security administrator support by filtering faulty alerts and on the

And 4 more