Martine Bellaïche

Learn More
We present an original approach to detect SYN flooding attacks from the victim’s side, by monitoring unusual handshake sequences. Detection is done in real-time to allow quick protection and help guarantee a proper defence. Our detection system uses an entropy measure to detect changes in the balance of TCP handshakes. Experiment results show that our(More)
TCP (Transmission Control Protocol) is the dominant end to end transport protocol of the Internet, with a wide range of applications including Web, mail or peer to peer traffic. The TCP stack implements a “backlog queue” for new connections, which contains an entry for every client's connection setup received by the server. If the TCP(More)
Due to the advent in technology and continuous progresses in wireless communication leads VANET as a research scenario which proposes communication between vehicles by wireless means. It has a large potential to improve safety and travel comfort of passenger. Developed areas suffer a major consideration for traffic safety as there is a high wastage of time(More)
Security is still the main obstacle that is preventing businesses from moving towards the Cloud, which makes choosing the right Cloud service provider CSP a critical decision. We propose in this paper a methodology for evaluation and selection of Cloud security services based on a Multi-Criteria Analysis (MCA) process using a set of evaluation criteria and(More)
This paper, Based on the paper (Yazir, Yagiz Onat,, 2010), present and develop a mathematical model for a dynamic allocation of virtual distributed resources in a data center using several criteria. This dynamic allocation of resource hosting interdependent applications reduces the response time of distributed applications and their(More)
  • 1