Hervé Debar

ORCID: 0000-0002-1344-4167
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Information and Cyber Security
  • Internet Traffic Analysis and Secure E-voting
  • Access Control and Trust
  • Anomaly Detection Techniques and Applications
  • Software-Defined Networks and 5G
  • Security and Verification in Computing
  • Spam and Phishing Detection
  • Software Reliability and Analysis Research
  • Service-Oriented Architecture and Web Services
  • Artificial Immune Systems Applications
  • Software Engineering Research
  • Smart Grid Security and Resilience
  • Cryptographic Implementations and Security
  • Caching and Content Delivery
  • Peer-to-Peer Network Technologies
  • Digital and Cyber Forensics
  • Software System Performance and Reliability
  • Cybersecurity and Cyber Warfare Studies
  • IPv6, Mobility, Handover, Networks, Security
  • Complex Network Analysis Techniques
  • Software Testing and Debugging Techniques
  • Advanced Authentication Protocols Security
  • Network Packet Processing and Optimization

Institut Polytechnique de Paris
2015-2024

Telecom SudParis
2015-2024

Laboratoire d'Ingénierie Circulation Transports
2021-2024

Télécom Paris
2010-2023

Orange (France)
2012-2021

Centre National de la Recherche Scientifique
2010-2019

Institut Mines-Télécom
2012-2017

Université Paris-Saclay
2016-2017

Centre National pour la Recherche Scientifique et Technique (CNRST)
2017

Supélec
2004-2010

An approach toward user behavior modeling that takes advantage of the properties neural algorithms is described, and results obtained on preliminary testing are presented. The basis IDES (Intruder Detection Expert System) which has two components, an expert system looking for evidence attacks known vulnerabilities a statistical model computer under surveillance. This learns habits when he works with computer, raises warnings current not consistent previously learned patterns. authors suggest...

10.1109/risp.1992.213257 article EN 2003-01-02

The growing Internet of Things (IoT) market introduces new challenges for network activity monitoring. Legacy monitoring is not tailored to cope with the huge diversity smart devices. New discovery techniques are necessary in order find out what IoT devices connected network. In this context, data analysis can be leveraged specific patterns that help recognize device types. Indeed, contrary desktop computers, perform very tasks making their networking behavior predictable. paper, we present...

10.1109/bigdata.2018.8622243 article EN 2021 IEEE International Conference on Big Data (Big Data) 2018-12-01

Distributed Denial of Service attacks (DDoS) have remained as one the most destructive in Internet for over two decades. Despite tremendous efforts on design DDoS defense strategies, few them been considered widespread deployment due to strong assumptions infrastructure, prohibitive operational costs and complexity. Recently, emergence Software Defined Networking (SDN) has offered a solution reduce network management It is also believed facilitate security thanks its programmability. To...

10.14722/sent.2015.23004 preprint EN 2015-01-01

Combining an "anomaly" and a "misuse" IDSes offers the advantage of separating monitored events between normal, intrusive or unqualified classes (i.e. not known as attack, but recognize safe either). In this article, we provide framework to systematically reason about combination anomaly misuse components. This applied Web servers lead us propose serial architecture, using drastic component with sensitive component. architecture provides operator better qualification detection results,...

10.1109/csac.2004.4 preprint EN 2005-04-06

The rapid development of the Internet Things (IoT) has prompted a recent interest into realistic IoT network traffic generation. Security practitioners need data to develop and assess network-based intrusion detection systems (NIDS). Emulating will avoid costly physical deployment thousands smart devices. From an attacker's perspective, generating that mimics legitimate behavior device can be useful evade NIDS. As consist sequences packets, problem is similar generation categorical data,...

10.1109/prdc50213.2020.00018 preprint EN 2020-12-01

Intrusion detection systems create large amounts of alerts. Significant part these alerts can be seen as background noise an operational information system, and its quantity typically overwhelms the user. In this paper we have three points to make. First, present our findings regarding causes noise. Second, provide some reasoning why one would like keep eye on despite number Finally, approach for monitoring with reasonable user load is proposed. The based modeling regularities in alert flows...

10.1145/1128817.1128835 preprint EN 2006-03-21

The new threat of the Internet, but little known to 'general public' is constituted by botnets. Botnets are networks infected computers, which headed a pirate called also 'Attacker' or 'Master'. botnets nowadays mainly responsible for large-scale coordinated attacks. attacker can ask computers 'Agents' 'Zombies' perform all sorts tasks him, like sending spam, performing DDoS attacks, phishing campaigns, delivering malware, leasing selling their other fraudsters anywhere. In this paper we...

10.1109/sar-ssi.2011.5931395 preprint EN 2011-05-01

When a new computer security vulnerability is publicly disclosed, only textual description of it available. Cybersecurity experts later provide an analysis the severity using Common Vulnerability Scoring System (CVSS). Specifically, different characteristics are summarized into vector (consisting set metrics), from which score computed. However, because high number vulnerabilities disclosed everyday this process requires lot manpower, and several days may pass before analyzed. We propose to...

10.1109/icmla52953.2021.00256 article EN 2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA) 2021-12-01

The authors present an application of recurrent neural networks for intrusion detection. A partially network has been chosen this particular application. acts as a data filter that highlights anomalous or suspicious according to previously learned patterns. It proven adaptive, because the same results several users have obtained with varying activities. cosine function was tested, and hetero-associative version used analyze flipflop problem. >

10.1109/ijcnn.1992.226942 article EN 2003-01-02
Coming Soon ...