Noureddine Boudriga

Learn More
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization(More)
The growth of different network architectures to connect wireless sensors for monitoring physical environments has become an important application area. Chief issues related to such systems include: (a) the permanence of environment monitoring, (b) the mobility management of sensors, (c) the ad-hoc communication method, and (d) the security of responsive(More)
Pipeline-based applications have become the indispensable part of life. Active monitoring and frequent inspections are critical to maintaining pipeline health. However, these tasks are highly expensive using the traditional maintenance systems, knowing that the pipeline systems can be largely deployed in an inaccessible and hazardous environment. In this(More)
To defeat the process of investigation and make the analysis and reconstruction of attack scenarios difficult, challenging, or even impossible, attackers are motivated by conducting anti-forensic attacks. Several methods were proposed by the literature to formally reconstruct the sequence of events executed during the incident using theoretical and(More)
This paper presents an architecture for an all optical switching node. The architecture is suitable for optical packet and optical burst switching and provides appropriate contention resolution schemes and QoS guarantees. A concept, called virtual memory, is developed to allow controllable and reasonable periods for delaying optical traffics. Related to its(More)
Slim Rekhis. Theoretical Aspects of Digital Investigation of Security Incidents. PhD thesis, Engineering School of Communications (Sup’Com), Networks and Security Research Lab (CN&S), February 2007. (Under the direction of Pr. Noureddine Boudriga). While research in computer security has started giving importance to digital investigation of security(More)
In this paper, we provide a logic for digital investigation of security incidents and its high level-specification language. The logic is used to prove the existence or non-existence of potential attack scenarios which, if executed on the investigated system, would produce the different forms of specified evidences. To generate executable attack scenarios(More)
The security of information systems is generally related to the deployed tools to protect the network infrastructure from attacks. These latter are based on detection components that analyze the information transmitted through the network. The existing systems do not provide a full protection and present a high rate of false positives that could result from(More)