Ahmed Serhrouchni

Learn More
A long-standing and elusive problem in software engineering is to devise reliable means that would allow us to check the correctness of distributed systems code mechanically. Writing reliable distributed code is notoriously difficult; locating the inevitable bugs in such code is therefore important. As is well-known and often repeated, traditional testing(More)
Information Centric Networking (ICN) approach constitutes one of the promising results of Internet of the Future research activities. Content is the central element in this approach. Content Centric Networking (CCN) and Named Data Networking (NDN) are the most emerging ICN projects. They adopt a security model based on named data in which content is signed(More)
In a large scale network, the privacy of the users and the performance are critical issues when conceiving a detection system, precisely for botnet detection where we need to differentiate between benign and malicious traffic. In this paper, we propose a new approach which conciliates these two requirements in order to detect domain-flux botnets and(More)
Transport Layer Security (TLS) constitutes the main protocol used to secure the exchanges in the Internet. Indeed, this protocol assures the server authentication based generally on public key certificates but the client authentication is rarely required and if it is assured, its identity is sent in clear text. In this paper, we propose TLS-HOTP protocol,(More)
Named Data Networking (NDN) represents one of the major Information Centric Networking (ICN) candidates for future Internet architectures. It treats data as the central element and it leverages in-network caching. Access control is a fundamental security feature in this project. It limits data access to only authorized entities. However, it can no longer be(More)
Voice networks evolved from the fixed traditional telephone system, to mobile and wireless networks and now towards a converged voice and data infrastructure. This convergence is based on the spread of the Internet Protocol, where VoIP is developing. Due to IP network characteristics, hackers are able to compromise and take control of different aspects of(More)
Industrial control systems (ICS) are highly distributed information systems used to control and monitor critical infrastructures such as nuclear plants, power generation and distribution plants, Oil and Gas and many other facilities. The main architecture principles of ICS are; real time response, high availability and reliability. For these specific(More)
The evolution of the web in the last decades has created the need for new requirements towards intelligent information retrieval capabilities and advanced user-oriented services. The current web integrates heterogeneous and distributed data such as XML database, relational database, P2P networks etc. leading to the coexistence of different data models and(More)
The session initiation protocol (SIP) is rapidly becoming the dominant signalling protocol for calls over the Internet. It has quickly made large inroads into the voice over IP (VoIP) market. SIP is an application-layer control operating on top of a transport protocol and allows to create, modify, and terminate sessions with one or more participants. With(More)