Philippe Owezarski

ORCID: 0000-0001-7713-7003
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Network Traffic and Congestion Control
  • Software-Defined Networks and 5G
  • Anomaly Detection Techniques and Applications
  • Internet Traffic Analysis and Secure E-voting
  • Software System Performance and Reliability
  • Peer-to-Peer Network Technologies
  • Advanced Optical Network Technologies
  • Multimedia Communication and Technology
  • Mobile Agent-Based Network Management
  • Advanced Malware Detection Techniques
  • Network Packet Processing and Optimization
  • Wireless Networks and Protocols
  • Vehicular Ad Hoc Networks (VANETs)
  • Complex Network Analysis Techniques
  • Simulation Techniques and Applications
  • Distributed and Parallel Computing Systems
  • Advanced MIMO Systems Optimization
  • Smart Grid Security and Resilience
  • Mobile Ad Hoc Networks
  • IPv6, Mobility, Handover, Networks, Security
  • Power Line Communications and Noise
  • IoT and Edge/Fog Computing
  • Scientific Computing and Data Management
  • Cloud Computing and Resource Management

Université de Toulouse
2013-2024

Laboratoire d'Analyse et d'Architecture des Systèmes
2015-2024

Centre National de la Recherche Scientifique
2014-2024

Institut National des Sciences Appliquées de Toulouse
2012-2023

Université Toulouse III - Paul Sabatier
2005-2019

Roche (France)
1997-2015

Roche (Switzerland)
2014

Xilinx (United States)
2013

Interface (United Kingdom)
2013

National Council for Scientific Research
2010

Nowadays, network intrusion detectors mainly rely on knowledge databases to detect suspicious traffic. These have be continuously updated which requires important human resources and time. Unsupervised anomaly overcome this issue by using "intelligent" techniques identify anomalies without any prior knowledge. However, these systems are often very complex as they need explore the traffic flows patterns. Therefore, unable meet real-time requirements. In paper, we present a new online...

10.1109/tnsm.2016.2627340 article EN IEEE Transactions on Network and Service Management 2016-11-09

The goals of the present contribution are twofold. First, we propose use a non-Gaussian long-range dependent process to model Internet traffic aggregated time series. We give definitions and intuition behind this model. detail numerical procedures that can be used synthesize artificial exactly following prescription. also original practically effective estimate corresponding parameters from empirical data. show relevantly describes large variety traffic, including both regular obtained...

10.1109/tdsc.2007.12 article EN IEEE Transactions on Dependable and Secure Computing 2007-01-01

Our goal is to design a traffic model for noncongested Internet backbone links, which simple enough be used in network operation, while being as general possible. The proposed solution the at flow level by Poisson shot-noise process. In our model, generic notion that must able capture characteristics of any kind data stream. We analyze accuracy with real traces collected on Sprint protocol (IP) network. Despite its simplicity, provides good approximation observed and variation. Finally, we...

10.1109/tsp.2003.814521 article EN IEEE Transactions on Signal Processing 2003-07-16

Despite network monitoring and testing being critical for computer networks, current solutions are both extremely expensive inflexible. Into this lacuna we launch the Open Source Network Tester, a fully open source traffic generator capture system. Our prototype implementation on NetFPGA-10G supports 4 × 10 Gb/s generation across all packet sizes, is supported up to 2 10Gb/s with naïve host software. system provides methods scaling coordinating multiple generator/capture systems, 6.25 ns...

10.1109/mnet.2014.6915433 article EN IEEE Network 2014-09-01

Our goal is to design a traffic model for uncongested IP backbone links that simple enough be used in network operation, and protocol application agnostic order as general possible. The proposed solution the at flow level by Poisson shot-noise process. In our model, generic notion must able capture characteristics of any kind data stream. We analyze accuracy with real traces collected on Sprint network. Despite its simplicity, provides good approximation observed variation. Finally, we...

10.1145/637201.637206 article EN 2002-01-01

The emerging SDVN (Software Defined Vehicular Network) paradigm promises to bring flexibility and efficient resource utilization vehicular networks, enabling the emergence of novel Intelligent Transportation Services. However, as it was initially designed with wired network in mind, applying SDN a context faces new challenges related peculiar characteristics this (high node mobility density, presence wireless links). In paper, we focus on one critical architectural elements SDVN, namely,...

10.3390/s20061701 article EN cc-by Sensors 2020-03-18

Summary Network anomalies and attacks represent a serious challenge to ISPs, who need cope with an increasing number of unknown events that put their networks' integrity at risk. Most the network anomaly detection systems proposed so far employ supervised strategy accomplish task, using either signature‐based methods or supervised‐learning techniques. The former fails detect anomalies, exposing severe consequences; latter requires labeled traffic, which is difficult expensive produce. In...

10.1002/nem.1903 article EN International Journal of Network Management 2015-07-31

While innovation in inter-domain routing has remained stagnant for over a decade, Internet exchange points (IXPs) are consolidating their role as economically advantageous interconnection reducing path latencies and exchanging ever increasing amounts of traffic. As such, IXPs appear natural place to foster network assess the benefits SDN, recent technological trend that already boosted within data center networks. In this article, we give comprehensive overview use cases SDN at IXPs, which...

10.1109/mcom.2016.7588277 article EN IEEE Communications Magazine 2016-10-01

The Cloud computing paradigm has become the new industry standard way of designing large scale applications. Over past years, we observe an increased adoption this technology on numerous IoT- Edge And while comes with its promises and benefits, considering almost infinite scalability, it also along drawbacks challenges. Detecting partial failures or bottlenecks are obstacles that arose Applications. Distributed Tracing now allows developers to gain insight composition services within a...

10.1109/icoin53446.2022.9687217 article EN 2022 International Conference on Information Networking (ICOIN) 2022-01-12

Research in the field of green-networking is raising more and interest, particular driven by energy saving purposes. The global Internet its thousands equipments consume an enormous amount, have impact on warming. In addition, nobody has a precise idea about what - or at least one AS (Autonomous System) consumes. It obvious designing new routing management strategies for greening relies initial study consumption network large, routers focuses way. That why we this paper power router...

10.1109/grid.2010.5697988 preprint EN 2010-10-01

Network anomaly detection is a critical aspect of network management for instance QoS, security, etc. The continuous arising new anomalies and attacks create challenge to cope with events that put the integrity at risk. Most systems proposed so far employ supervised strategy accomplish task, using either signature-based methods or supervised-learning techniques. However, both approaches present major limitations: former fails detect characterize unknown (letting unprotected long periods),...

10.5555/2147671.2147683 article EN Conference on Network and Service Management 2011-10-24

Monitoring communication networks and their traffic is of essential importance for estimating the risk in Internet, therefore designing suited protection systems computer networks. Network analysis can be done thanks to measurement devices or honeypots. However, analyzing huge amount gathered data, characterizing anomalies attacks contained these traces remain complex time consuming tasks, by network security experts using poorly automatized tools, are consequently slow costly. In this...

10.1145/2714576.2714580 preprint EN 2015-04-03

Driven by the well-known limitations of port-based and payload-based analysis techniques, use Machine Learning for Internet traffic classification has become a fertile research area during past half-decade. In this paper we introduce MINETRAC, combination unsupervised semi-supervised machine learning techniques capable identifying classifying different classes IP flows sharing similar characteristics. The is accomplished means robust clustering using Sub-Space Clustering, Evidence...

10.5555/2043468.2043483 article EN International Teletraffic Congress 2011-09-06

The heterogeneity barrier breakthrough achieved by the OpenFlow protocol is currently paced variability in performance semantics among network devices, which reduces ability of applications to take complete advantage programmable control. As a result, control remain conservative on requirements order be generalizable and trade for explicit state consistency support varying behaviours. In this paper we argue that must optimized towards device capabilities managers application developers...

10.1109/icc.2015.7249210 preprint EN 2015-06-01

Monitoring communication networks and their traffic is of essential importance for estimating the risk in Internet, therefore designing suited protection systems computer networks. Network analysis can be done thanks to measurement devices or honeypots. However, analyzing huge amount gathered data, characterizing anomalies attacks contained these traces remain complex time consuming tasks, by network security experts using poorly automatized tools, are consequently slow costly. In this...

10.1109/cnsm.2014.7014136 preprint EN 2014-11-01

Innovation in interdomain routing has remained stagnant for over a decade. Recently, Internet eXchange Points (IXPs) have emerged as economically-advantageous interconnection points reducing path latencies and exchanging ever increasing traffic volumes among, possibly, hundreds of networks. Given their far-reaching implications on routing, IXPs are the ideal place to foster network innovation extend benefits software defined networking (SDN) level. In this paper, we present, evaluate,...

10.1109/jsac.2017.2760398 article EN IEEE Journal on Selected Areas in Communications 2017-10-25

This paper proposes a new approach for making simulations realistic. is based on the principle of "trace driven simulation", i.e. using results actual traffic traces analysis in order to reproduce same experimental conditions simulation. The main proposed this deals with simulation sources replay under certain - grabbed networks. describes implementation NS simulator, and evaluates it by comparing characteristics obtained our original data traces. parameters that are considered comparison...

10.1109/icc.2004.1312915 preprint EN 2004-01-01

The Internet is on the way of becoming universal communication network, and then needs to provide various services with guaranteed quality for all kinds applications. Denial service (DoS) attacks are more efficient in a multi-services network than "old" best effort Internet. Indeed, services, DoS attack has forbid target communicate. With it sufficient make not respect SLA (service level agreement) committed clients, what easier can be performed using simple flooding attacks. Then, question...

10.1109/icccn.2005.1523865 article EN 2006-10-11
Coming Soon ...