Amel Meddeb-Makhlouf

Learn More
The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in(More)
To enhance the traditional techniques of detecting distributed attacks, an algebraic tool for correlating alerts is proposed in this paper. It is mainly based on a new concept called multi-violation detectors (MvD). While MvDs allow event and alert correlation, they can be mathematically managed, constructed, and learned. The proposed method is validated at(More)
Multihoming is among the features of SCTP (Stream Control Transmission Protocol), which makes it more robust and efficient than TCP(Transmission Control Protocol)but more vulnerable under attack. Nevertheless, a strong security can degrade the QoS(Quality of Service) by adding additional delay. Therefore, we propose in this paper, a secure authentication(More)
This paper proposes to manage data structures manipulated by the proposed correlation function based on a new concept called multi-violation detectors (MvD). The MvD-based correlation function manipulates events based on metrics that evaluate them. The detection and the correlation processes are managed using a MLP (multi-layer perceptron)-like network(More)
In this paper, we propose to cooperate multi level IDSs through the use of an architecture called global intrusion detection and tolerance architecture (GIDTA). GIDTA allows the detection of distributed attacks at their early stages using the collection, correlation, and exchange of data provided by different network components and the structures available(More)
SCTP (Stream Control Transmission Protocol) has enhanced data transport performance due to its interesting features such as multihoming and multistreaming. However, nowadays, the requirement for mobility through different wireless networks has been steadily increasing. Hence, the need for vertical handover between heterogeneous networks in the wireless(More)
We propose in this work an error detection process for wireless networks, applied to a previously published transmitter/Receiver system model. This model is based on a bit interleaved coded modulation (BICM) scheme over a frequency selective channel. The detection process is able to discern the attacked block: encoder, modulator or channel. We prove using(More)
This paper presents an architecture for a global intrusion detection and tolerance such as global detection, global correlation, and intrusion tolerance. Global Intrusion Detection and Tolerance System (GIDTS). The cooperation proposed by the GIDTS solution allows the detection of complex attacks at their early stages. This cooperation is performed based on(More)