- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Graph Theory and Algorithms
- Anomaly Detection Techniques and Applications
- Internet Traffic Analysis and Secure E-voting
- Complex Network Analysis Techniques
- Web Data Mining and Analysis
- Spam and Phishing Detection
- Parallel Computing and Optimization Techniques
- Service-Oriented Architecture and Web Services
- Software System Performance and Reliability
- Data Management and Algorithms
- Software Testing and Debugging Techniques
- Advanced Graph Neural Networks
- Information and Cyber Security
- Software-Defined Networks and 5G
- Adversarial Robustness in Machine Learning
- Caching and Content Delivery
- Data Visualization and Analytics
- Green IT and Sustainability
- Graph Labeling and Dimension Problems
- Computational Physics and Python Applications
- Security in Wireless Sensor Networks
- IPv6, Mobility, Handover, Networks, Security
- Blockchain Technology Applications and Security
University of Luxembourg
2018-2022
Centre Inria de l'Université de Lorraine
2017-2018
Laboratoire Lorrain de Recherche en Informatique et ses Applications
2018
Dynamic Systems (United States)
2017
Institut national de recherche en informatique et en automatique
2017
Centre National de la Recherche Scientifique
2014-2016
Université Grenoble Alpes
2014-2016
Laboratoire d'Informatique de Grenoble
2011-2016
Université Joseph Fourier
2011-2014
Techniques of Informatics and Microelectronics for Integrated Systems Architecture
2012-2014
Botnets are one of the most dangerous and serious cybersecurity threats since they a major vector large-scale attack campaigns such as phishing, distributed denial-of-service (DDoS) attacks, trojans, spams, etc. A large body research has been accomplished on botnet detection, but recent security incidents show that there still several challenges remaining to be addressed, ability develop detectors which can cope with new types botnets. In this paper, we propose BotGM, approach detect...
Port scanning is widely used in Internet prior for attacks order to identify accessible and potentially vulnerable hosts. In this work, we propose an approach that allows discover port behavior patterns group properties of scans. This based on graph modelling mining. It provides security analysts relevant information what services are jointly targeted, the relationship scanned ports. helpful assess skills strategy attacker. We applied our method data collected from a large darknet data, i.e....
Anomaly detection on security logs is receiving more and attention. Authentication events are an important component of logs, being able to produce trustful accurate predictions minimizes the effort cyber-experts stop false attacks. Observed classified into Normal, for legitimate user behavior, Malicious, malevolent actions. These classes consistently excessively imbalanced which makes classification problem harder; in commonly used Los Alamos dataset, malicious class comprises only 0.00033%...
Robotic Operating System(ROS) security research is currently in a preliminary state, with limited tools or models. Considering the trend of digitization robotic systems, this lack foundational knowledge increases potential threat posed by vulnerabilities ROS. In article, we present new tool to assist further ROS, ROSploit. ROSploit modular two-pronged offensive covering both reconnaissance and exploitation ROS designed researchers testing exploits for
We propose ROS-Defender, a holistic approach to secure robotics systems, which integrates Security Event Management System (SIEM), an intrusion prevention system (IPS) and firewall for robotic system. ROS-Defender combines anomaly detection systems at application (ROS) level network level, with dynamic policy enforcement points using software defined networking (SDN) provide protection against large class of attacks. Although SIEMs, IPS, have been previously used computer networks,...
The Robot Operating System (ROS) are being deployed for multiple life critical activities such as self-driving cars, drones, and industries. However, the security has been persistently neglected, especially image flows incoming from camera robots. In this paper, we perform a structured assessment of robot cameras using ROS. We points out relevant number flaws that can be used to take over cameras. Furthermore, propose an intrusion detection system detect abnormal flows. Our defense approach...
Summary TCP/UDP port scanning or sweeping is one of the most common technique used by attackers to discover accessible and potentially vulnerable hosts applications. Although extracting distinguishing different strategies a challenging task, identification dependencies among probed ports primordial for profiling attacker behaviors, with final goal better mitigating them. In this paper, we propose an approach that allows track behavior patterns multiple identify intrinsic properties observed...
Nowadays, a challenge faced by many developers is the profiling of parallel applications so that they can scale over more and cores. This especially critical for embedded systems powered Multi-Processor System-on-Chip (MPSoC), where ever demanding have to run smoothly on numerous cores, each with modest power budget. The reasons lack scalability are numerous, it be time consuming developer pinpoint correct one. In this paper, we propose fully automatic method which detects instructions code...
In robotic systems, the physical world is highly coupled with cyberspace. New threats affect cyber-physical systems as they rely on several sensors to perform critical operations. The most sensitive targets are their location where spoofing attacks can force robots behave incorrectly. this paper, we propose a novel anomaly detection approach for sensor attacks, based an auto-encoder architecture. After initial training, algorithm works directly compressed data by computing reconstruction...
In this paper, we leverage the newly integrated extended Berkely Packet Filters (eBPF) and eXpress Data Path (XDP) to build ROS-FM, a high-performance inline network-monitoring framework for ROS. We extend with security policy enforcement tool distributed data visualization ROS1 ROS2 systems. compare overhead of against generic ROS monitoring tools, test existing penetration testing tools evaluate their effectiveness. find that network associated outperform all robots more than 10 running...
The Domain Name System (DNS), a fundamental protocol that controls how users interact with the Internet, inadequately provides protection for user privacy. Recently, there have been advancements in field of DNS privacy and security form over TLS (DoT) HTTPS (DoH) protocols. advent these protocols recent large-scale data processing drastically altered threat model Users can no longer rely on traditional methods, must instead take active steps to ensure their In this paper, we demonstrate...
Due to a growing need for flexibility, massively parallel Multiprocessor SoC (MPSoC) architectures are currently being developed. This leads the software, but poses problem of efficient deployment software on these architectures. To address this problem, execution program with traces enabled platform and visualization detect irregular timing behavior is rule. error prone as it relies logs human analysis, requires an existing platform. overcome issues automate process, we propose conjoint use...
Robot Operating System (ROS) is becoming more and important used widely by developers researchers in various domains. One of the most fields where it being self-driving cars industry. However, this framework far from totally secure, existing security breaches do not have robust solutions. In paper we focus on camera vulnerabilities, as often source for environment discovery decision-making process. We propose an unsupervised anomaly detection tool detecting suspicious frames incoming flows....
With the development of e-commerce over Internet, web service discovery received much interest. A critical aspect is similarity search or matchmaking. To enhance precision, several solutions that do not limit to a syntactic comparison inputs and outputs compared services have been proposed. Most them introduce structure operations in measure. In this paper, we analyze these approaches point out their time complexity drawback. Then, propose more efficient matching algorithm based on concept...
A large body of research has been accomplished on prevention and detection malicious events, attacks, threats, or botnets. However, there is a lack automatic sophisticated methods for investigating events/users, understanding the root cause discovering what really happening before an attack. In this paper, we propose attack model discovery approach mining authentication events across user accounts. The based process techniques event logs reaching attacks in order to extract behavior users....