Learn More
The goals of the present contribution are twofold. First, we propose the use of a non-Gaussian long-range dependent process to model Internet traffic aggregated time series. We give the definitions and intuition behind the use of this model. We detail numerical procedures that can be used to synthesize artificial traffic exactly following the model(More)
How to provide quality of service (QoS), has been a major issue for the Internet for the past decade. Though many proposals have been put forward in the areas of differentiated and guaranteed services, none have met the needs of users and operators. Efforts have been stymied by the complexity of the Internet, its myriad systems of interconnection, and by(More)
Available bandwidth – as well as capacity or achievable bandwidth – on a path or a link is one of the very important parameters to measure or estimate in a network: it is of high interest for many networking functions (routing, admission and congestion control, load balancing, etc). Active probing techniques provide the easiest and the more flexible(More)
This paper presents an original and adaptive security architecture for the future connected aircrafts. A secure system topology for the embedded network is proposed with regards to network and system constraints, service priorities and regulatory recommendations. The design of a new component called Security Manager (SecMan) is explained in details and all(More)
Due to the variety of services and applications available on today's Internet, many properties of the traffic stray from the classical characteristics (Gaussianity and short memory) of standard models. The goal of the present contribution is to propose a statistical model able to acccount both for the non Gaussian and long memory properties of ag-gregated(More)
UAV Ad hoc NETworks (UAANETs) can be defined as a new form of ad hoc networks in which nodes are Unmanned Aerial Vehicles (UAVs) and Ground Control Station (GCS). Compared to the usual Mobile Ad hoc NETwork (MANET), this new network paradigm has some unique features and brings specific challenges such as node mobility degree, network connectivity patterns,(More)
Recently, risk assessment has been considered as an essential technique in evaluating the security of network information systems. Many proposals have been made in this area in order to provide new approaches to allow administrators and engineers to analyze the impact of any attack that could target their systems. Nevertheless, there is a lack of(More)
RÉSUMÉ. Nous nous intéressons à la détection d'attaques sur le réseau Internet. Nos procédures de détection reposent sur l'utilisation de lois non gaussiennes pour modéliser conjointement les distributions marginales du trafic agrégé à différents niveaux. Nous utilisons ensuite plu-sieurs distances statistiques pour quantifier une rupture dans cette(More)