Thibault Cholez

ORCID: 0000-0002-0435-3909
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Peer-to-Peer Network Technologies
  • Caching and Content Delivery
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Spam and Phishing Detection
  • Opportunistic and Delay-Tolerant Networks
  • Software-Defined Networks and 5G
  • Advanced Malware Detection Techniques
  • Advanced Data Storage Technologies
  • Cooperative Communication and Network Coding
  • IPv6, Mobility, Handover, Networks, Security
  • Network Packet Processing and Optimization
  • Digital Rights Management and Security
  • Blockchain Technology Applications and Security
  • Image and Video Quality Assessment
  • Access Control and Trust
  • Cognitive Computing and Networks
  • Cloud Computing and Resource Management
  • Network Traffic and Congestion Control
  • Advanced Steganography and Watermarking Techniques
  • Climate Change Policy and Economics
  • Information Systems and Technology Applications
  • Smart Parking Systems Research
  • Data-Driven Disease Surveillance
  • Cybersecurity and Information Systems

Laboratoire Lorrain de Recherche en Informatique et ses Applications
2011-2024

Université de Lorraine
2011-2024

Centre National de la Recherche Scientifique
2011-2024

Dynamic Systems (United States)
2008-2023

Commonwealth Scientific and Industrial Research Organisation
2021

Institut national de recherche en informatique et en automatique
2007-2017

Centre Inria de l'Université de Lorraine
2008-2014

University of Luxembourg
2012-2013

Université de Technologie de Troyes
2011-2012

The development of TLS-based encrypted traffic comes with new challenges related to the management and security analysis traffic. There is an essential need for methods investigate, a proper level identification, increasing number HTTPS that may hold breaches. In fact, although many approaches detect type application (Web, P2P, SSH, etc.) running in secure tunnels, others identify couple specific web pages through website fingerprinting, this paper proposes robust technique precisely...

10.1109/noms.2016.7502818 preprint EN NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium 2016-04-01

Content-Centric Networking (CCN) recently received a lot of attention thanks to its elegant way optimize content diffusion at the scale Internet. However, communications occurring edge Internet, in particular Internet Things (IoT), are also vivid research topic. Even if CCN was not initially designed specific traffic pattern IoT, it can be improved better support these new applications. In this paper, we propose within for IoT network where information is created and consumed different...

10.1109/nof.2013.6724509 preprint EN 2013-10-01

Information Centric Networking (ICN) is seen as a promising solution to re-conciliate the Internet usage with its core architecture. However, be considered realistic alternative IP, ICN must evolve from pure academic proposition deployed in test environments an operational which security assessed protocol design running implementation. Among solutions, Named Data (NDN), together reference implementation NDN Forwarding Daemon (NFD), acts most mature proposal but vulnerability against Content...

10.23919/inm.2017.7987266 preprint EN 2017-05-01

Nowadays, most of Web services are accessed through HTTPS. While preserving user privacy is important, it also mandatory to monitor and detect specific users' actions, for instance, according a security policy. This paper presents solution HTTP/2 traffic over TLS. It highly differs from HTTP/1.1 TLS what makes existing monitoring techniques obsolete. Our solution, H2Classifier, aims at detecting if performs an action that has been previously defined monitored service, but without using any...

10.1109/tnsm.2019.2933155 article EN IEEE Transactions on Network and Service Management 2019-08-06

Encrypted Internet traffic is an essential element to enable security and privacy in the Internet. Surveys show that websites are more being served over HTTPS. They highlight increase of 48% sites using TLS past year, justifying tendency Web going be encrypted. This motivates development new tools methods monitor filter HTTPS traffic. paper handles latest technique for filtering based on Server Name Indication (SNI) field which has been recently implemented many firewall solutions. Our main...

10.1109/inm.2015.7140423 preprint EN 2015-05-01

With the recent technological evolutions in networks and increased deployment of multi-tier clouds, cloud gaming (CG) is gaining renewed interest expected to become a major Internet service upcoming years. Many companies have launched powerful platforms such as Google Stadia, Nvidia GeForce Now, Microsoft xCloud, Sony PlayStation Now among others, attract players. However, for all end-users fully enjoy their sessions over wide range network access qualities, CG must adapt traffic. In this...

10.23919/cnsm52442.2021.9615562 preprint EN 2021-10-25

Cloud Gaming (CG) has been gaining a lot of interest and major actors have entered this market such as Google, Nvidia, Sony or Microsoft. They operate CG platforms that attract an increasing number players worldwide. This type traffic is highly demanding for network infrastructures because it requests simultaneously high bandwidth, low delay no degradation (interruptions jitter) to ensure good end-user's QoE. To improve the delivery low-latency applications, new Active Queue Management...

10.1109/noms56928.2023.10154417 article EN NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium 2023-05-08

The Distributed Hash Table (DHT) architecture is known to be a very efficient way implement peer-to-peer (P2P) computer networks.However, the scientific literature also proved that DHT functioning in P2P networks can easily disrupted by single entity controlling many peers, as Sybil Attack.Various defensive mechanisms are prevent such attacks, or at least hinder them.The current study evaluates resiliency of InterPlanetary File System (IPFS) network legacy Attack.We show that, surprisingly,...

10.1145/3664476.3664482 article EN Proceedings of the 17th International Conference on Availability, Reliability and Security 2024-07-25

While IPv6 is increasingly being deployed in networks, including ISPs, the need to monitor and manage associated protocols increases. In this paper we focus on Neighbor Discovery Protocol motivate importance it. We also present our approach for task together with functionalities provide software, NDPMon, that developed.

10.1109/iccgi.2007.39 article EN 2007-03-01

The Bitcoin peer-to-peer network ensures the consensus between different nodes responsible for propagation of blocks containing validated bitcoin transactions. quality and safety this are therefore particularly essential. In work, we present a study public that form backbone p2p network. We analyze results our measurement campaign was made following well-defined reproducible methodology. particular several criteria can affect resilience: distribution security assessment clients' versions,...

10.1109/brains52497.2021.9569782 preprint EN 2021-09-27

Low-Iatency (LL) applications, such as the increasingly popular cloud gaming (CG) services, have stringent latency requirements. Recent network technologies L4S (Low Latency Low Loss Scalable throughput) propose to optimize transport of LL traffic and require efficient ways identify it. A previous work proposed a supervised machine learning model CG but it suffers from limited processing rate due pure software approach lack generalization. In this paper, we hybrid P4/NFV architecture, where...

10.1109/iscc58397.2023.10217863 article EN 2022 IEEE Symposium on Computers and Communications (ISCC) 2023-07-09

BitTorrent is a widely deployed P2P file sharing protocol, extensively used to distribute digital content and soft- ware updates, among others. Recent actions against torrent tracker repositories have fostered the move towards fully distributed solution based on hash table support both search implementation. In this paper we present security study of main decentralized in BitTorrent, commonly known as Mainline DHT. We show that lack DHT allows very efficient attacks can easily impact...

10.1109/ntms.2011.5721044 article EN 2011-02-01

Recent surveys show that the proportion of encrypted web traffic is quickly increasing. On one side, it provides users with essential properties security and privacy, but on other raises important challenges issues for organizations, related to monitoring (filtering, anomaly detection, etc.). This paper proposes improve a recent technique HTTPS based Server Name Indication (SNI) field TLS which has been implemented in many firewall solutions. method currently some weaknesses can be used...

10.1109/icdcsw.2016.21 preprint EN 2016-06-01

We present a new solution to protect the widely deployed KAD DHT against localized attacks which can take control over entries. show through measurements that IDs distribution of best peers found after lookup process follows geometric distribution. then use this result detect by comparing real peers' ID distributions theoretical one thanks Kullback-Leibler divergence. When an attack is detected, we propose countermeasures progressively remove suspicious from list possible contacts provide...

10.1109/ipdpsw.2010.5470928 article EN 2010-04-01

Peer-to-peer (P2P) systems are widely used to exchange content over the Internet. Knowledge of pedophile activity in such networks remains limited, despite having important social consequences. Moreover, though there different P2P use, previous academic works on this topic focused one system at a time and their results not directly comparable. We design methodology for comparing KAD eDonkey, two among most prominent ones with anonymity levels. monitor eDonkey servers network during several...

10.3390/socsci3030314 article EN cc-by Social Sciences 2014-07-01

NDN is a promising protocol that can help to reduce congestion at Internet scale by putting content the center of communications instead hosts, and providing each node with caching capability. also natively authenticate transmitted mechanism similar website certificates allows clients assess original provider. But this security feature comes high cost, as it relies heavily on asymmetric cryptography which affects server performance when Data are generated. This particularly critical for many...

10.1145/2984356.2984364 preprint EN 2016-09-07

We propose a new distributed architecture that aims to investigate and control the spread of contents in KAD P2P network through indexation keywords files. Our solution can DHT at local level with strategy bypassing Sybil attack protections inserted KAD. For targeted entries, we monitor all requests emitted by peers, from initial content publication or search, final download request fake files, assessing accurately peers interest access it. demonstrate efficiency our approach experiments...

10.1109/icc.2010.5502179 article EN IEEE International Conference on Communications 2010-05-01

de niveau recherche, publiés ou non, émanant des établissements d'enseignement et recherche français étrangers, laboratoires publics privés.

10.5220/0005226600460055 preprint FR cc-by-nc-nd 2015-01-01

Content pollution is one of the major issues affecting P2P file sharing networks. However, since early studies on FastTrack and Overnet, no recent investigation has reported its impact current In this paper, we present a method supporting architecture to quantify contents in KAD network. We first collect information many popular files shared Then, propose new way detect content by analyzing all filenames linked with metric based Tversky index which gives very low error rates. By large number...

10.1109/p2p.2011.6038658 preprint EN 2011-08-01

The orchestration of counter-measures in the context security incidents remains a challenging task for network operators. main objective this demonstration is to present how possible virtualized NDN network. Based on an adaptation TOSCA topology and model, it trigger these counter- measures after detection specific attacks. We show Montimage Monitoring Tool (MMT) has been adapted detect typical Content Poisoning Attack (CPA), orchestrator can reactions mitigate their impact

10.1109/icin.2018.8401591 preprint EN 2018-02-01
Coming Soon ...