- Network Security and Intrusion Detection
- Network Traffic and Congestion Control
- Software-Defined Networks and 5G
- Anomaly Detection Techniques and Applications
- Internet Traffic Analysis and Secure E-voting
- Software System Performance and Reliability
- Peer-to-Peer Network Technologies
- Advanced Optical Network Technologies
- Multimedia Communication and Technology
- Mobile Agent-Based Network Management
- Advanced Malware Detection Techniques
- Network Packet Processing and Optimization
- Wireless Networks and Protocols
- Vehicular Ad Hoc Networks (VANETs)
- Complex Network Analysis Techniques
- Simulation Techniques and Applications
- Distributed and Parallel Computing Systems
- Advanced MIMO Systems Optimization
- Smart Grid Security and Resilience
- Mobile Ad Hoc Networks
- IPv6, Mobility, Handover, Networks, Security
- Power Line Communications and Noise
- IoT and Edge/Fog Computing
- Scientific Computing and Data Management
- Cloud Computing and Resource Management
Université de Toulouse
2013-2024
Laboratoire d'Analyse et d'Architecture des Systèmes
2015-2024
Centre National de la Recherche Scientifique
2014-2024
Institut National des Sciences Appliquées de Toulouse
2012-2023
Université Toulouse III - Paul Sabatier
2005-2019
Roche (France)
1997-2015
Roche (Switzerland)
2014
Xilinx (United States)
2013
Interface (United Kingdom)
2013
National Council for Scientific Research
2010
Nowadays, network intrusion detectors mainly rely on knowledge databases to detect suspicious traffic. These have be continuously updated which requires important human resources and time. Unsupervised anomaly overcome this issue by using "intelligent" techniques identify anomalies without any prior knowledge. However, these systems are often very complex as they need explore the traffic flows patterns. Therefore, unable meet real-time requirements. In paper, we present a new online...
The goals of the present contribution are twofold. First, we propose use a non-Gaussian long-range dependent process to model Internet traffic aggregated time series. We give definitions and intuition behind this model. detail numerical procedures that can be used synthesize artificial exactly following prescription. also original practically effective estimate corresponding parameters from empirical data. show relevantly describes large variety traffic, including both regular obtained...
Our goal is to design a traffic model for noncongested Internet backbone links, which simple enough be used in network operation, while being as general possible. The proposed solution the at flow level by Poisson shot-noise process. In our model, generic notion that must able capture characteristics of any kind data stream. We analyze accuracy with real traces collected on Sprint protocol (IP) network. Despite its simplicity, provides good approximation observed and variation. Finally, we...
Despite network monitoring and testing being critical for computer networks, current solutions are both extremely expensive inflexible. Into this lacuna we launch the Open Source Network Tester, a fully open source traffic generator capture system. Our prototype implementation on NetFPGA-10G supports 4 × 10 Gb/s generation across all packet sizes, is supported up to 2 10Gb/s with naïve host software. system provides methods scaling coordinating multiple generator/capture systems, 6.25 ns...
Our goal is to design a traffic model for uncongested IP backbone links that simple enough be used in network operation, and protocol application agnostic order as general possible. The proposed solution the at flow level by Poisson shot-noise process. In our model, generic notion must able capture characteristics of any kind data stream. We analyze accuracy with real traces collected on Sprint network. Despite its simplicity, provides good approximation observed variation. Finally, we...
The emerging SDVN (Software Defined Vehicular Network) paradigm promises to bring flexibility and efficient resource utilization vehicular networks, enabling the emergence of novel Intelligent Transportation Services. However, as it was initially designed with wired network in mind, applying SDN a context faces new challenges related peculiar characteristics this (high node mobility density, presence wireless links). In paper, we focus on one critical architectural elements SDVN, namely,...
Summary Network anomalies and attacks represent a serious challenge to ISPs, who need cope with an increasing number of unknown events that put their networks' integrity at risk. Most the network anomaly detection systems proposed so far employ supervised strategy accomplish task, using either signature‐based methods or supervised‐learning techniques. The former fails detect anomalies, exposing severe consequences; latter requires labeled traffic, which is difficult expensive produce. In...
While innovation in inter-domain routing has remained stagnant for over a decade, Internet exchange points (IXPs) are consolidating their role as economically advantageous interconnection reducing path latencies and exchanging ever increasing amounts of traffic. As such, IXPs appear natural place to foster network assess the benefits SDN, recent technological trend that already boosted within data center networks. In this article, we give comprehensive overview use cases SDN at IXPs, which...
The Cloud computing paradigm has become the new industry standard way of designing large scale applications. Over past years, we observe an increased adoption this technology on numerous IoT- Edge And while comes with its promises and benefits, considering almost infinite scalability, it also along drawbacks challenges. Detecting partial failures or bottlenecks are obstacles that arose Applications. Distributed Tracing now allows developers to gain insight composition services within a...
Research in the field of green-networking is raising more and interest, particular driven by energy saving purposes. The global Internet its thousands equipments consume an enormous amount, have impact on warming. In addition, nobody has a precise idea about what - or at least one AS (Autonomous System) consumes. It obvious designing new routing management strategies for greening relies initial study consumption network large, routers focuses way. That why we this paper power router...
Network anomaly detection is a critical aspect of network management for instance QoS, security, etc. The continuous arising new anomalies and attacks create challenge to cope with events that put the integrity at risk. Most systems proposed so far employ supervised strategy accomplish task, using either signature-based methods or supervised-learning techniques. However, both approaches present major limitations: former fails detect characterize unknown (letting unprotected long periods),...
Monitoring communication networks and their traffic is of essential importance for estimating the risk in Internet, therefore designing suited protection systems computer networks. Network analysis can be done thanks to measurement devices or honeypots. However, analyzing huge amount gathered data, characterizing anomalies attacks contained these traces remain complex time consuming tasks, by network security experts using poorly automatized tools, are consequently slow costly. In this...
Driven by the well-known limitations of port-based and payload-based analysis techniques, use Machine Learning for Internet traffic classification has become a fertile research area during past half-decade. In this paper we introduce MINETRAC, combination unsupervised semi-supervised machine learning techniques capable identifying classifying different classes IP flows sharing similar characteristics. The is accomplished means robust clustering using Sub-Space Clustering, Evidence...
The heterogeneity barrier breakthrough achieved by the OpenFlow protocol is currently paced variability in performance semantics among network devices, which reduces ability of applications to take complete advantage programmable control. As a result, control remain conservative on requirements order be generalizable and trade for explicit state consistency support varying behaviours. In this paper we argue that must optimized towards device capabilities managers application developers...
Monitoring communication networks and their traffic is of essential importance for estimating the risk in Internet, therefore designing suited protection systems computer networks. Network analysis can be done thanks to measurement devices or honeypots. However, analyzing huge amount gathered data, characterizing anomalies attacks contained these traces remain complex time consuming tasks, by network security experts using poorly automatized tools, are consequently slow costly. In this...
Innovation in interdomain routing has remained stagnant for over a decade. Recently, Internet eXchange Points (IXPs) have emerged as economically-advantageous interconnection points reducing path latencies and exchanging ever increasing traffic volumes among, possibly, hundreds of networks. Given their far-reaching implications on routing, IXPs are the ideal place to foster network innovation extend benefits software defined networking (SDN) level. In this paper, we present, evaluate,...
This paper proposes a new approach for making simulations realistic. is based on the principle of "trace driven simulation", i.e. using results actual traffic traces analysis in order to reproduce same experimental conditions simulation. The main proposed this deals with simulation sources replay under certain - grabbed networks. describes implementation NS simulator, and evaluates it by comparing characteristics obtained our original data traces. parameters that are considered comparison...
The Internet is on the way of becoming universal communication network, and then needs to provide various services with guaranteed quality for all kinds applications. Denial service (DoS) attacks are more efficient in a multi-services network than "old" best effort Internet. Indeed, services, DoS attack has forbid target communicate. With it sufficient make not respect SLA (service level agreement) committed clients, what easier can be performed using simple flooding attacks. Then, question...