Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fatiha Benali is active.

Publication


Featured researches published by Fatiha Benali.


international conference on move to meaningful internet systems | 2010

A distributed and privacy-preserving method for network intrusion detection

Fatiha Benali; Nadia Bennani; Gabriele Gianini; Stelvio Cimato

Organizations security becomes increasingly more difficult to obtain due to the fact that information technology and networking resources are dispersed across organizations. Network intrusion attacks are more and more difficult to detect even if the most sophisticated security tools are used. To address this problem, researchers and vendors have proposed alert correlation, an analysis process that takes the events produced by the monitoring components and produces compact reports on the security status of the organization under monitoring. Centralized solutions imply to gather from distributed resources by a third party the global state of the network in order to evaluate risks of attacks but neglect the honest but curious behaviors. In this paper, we focus on this issue and propose a set of solutions able to give a coarse or a fine grain global state depending on the system needs and on the privacy level requested by the involved organizations.


international conference on emerging security information, systems and technologies | 2008

Collaborative Approach to Automatic Classification of Heterogeneous Information Security

Fatiha Benali; Stéphane Ubéda; Véronique Legrand

The messages generated by the security devices represent the necessary data for the detection of the malicious activities in an information system. The heterogeneity of the devices and the lack of a standard for the security messages make the automatic processing of the messages difficult. The messages are short, use a very wide vocabulary and have different formats. We propose in this article the collaboration between classifiers to increase the accuracy of the classification. We apply the text categorization technics for the automatic classification of security log files messages, in categories defined by an ontology. We develop an extraction module for the message attributes to reduce the vocabulary size. Then we apply two training algorithms: the k-nearest neighbour algorithm and the naive Bayes, on two corpus of security log messages. Finally we propose to collaborate the classifiers to produce a single classifier with better accuracy.


Proceedings of the 8th international conference on New technologies in distributed systems | 2008

Automatic classification of security messages based on text categorization

Fatiha Benali; Stéphane Ubéda; Véronique Legrand

The generated messages by the security devices are the necessary data for the detection of the malicious activities in an information system. The heterogeneity of the devices and the lack of a standard for the security messages make the automatic processing of the messages difficult. The messages are short, use a very wide vocabulary and have different formats. We propose in this article the application of the text categorization technics for the automatic classification of security log files messages, in categories defined by an ontology. We develop an extraction module for the message attributes to reduce the vocabulary size. Then we apply two training algorithms: the k-nearest neighbour algorithm and the naive bayes, on two corpus of security log messages.


system analysis and modeling | 2007

An Ontology for the Management of Heteregenous Alerts of Information System

Fatiha Benali; Véronique Legrand; Stéphane Ubéda


arXiv: Cryptography and Security | 2009

Comprehensive Security Framework for Global Threats Analysis

Jacques Saraydaryan; Fatiha Benali; Stéphane Ubéda


Archive | 2008

Method for Monitoring a message associated with an action generated by an element or the user of an IS, and corresponding computer software product, storage means and device

Véronique Legrand; David Maciejak; Jacques Saraydaryan; Laurent Pautet; Christophe Briguet; Fatiha Benali


Archive | 2008

Monitoring a message associated with an action

Véronique Legrand; David Maciejak; Jacques Saraydaryan; Laurent Pautet; Christophe Briguet; Fatiha Benali


Ecol'IA | 2008

Préparation des messages de sécurité pour la classification automatique de messages

Fatiha Benali; Stéphane Ubéda; Véronique Legrand


2ème journée Francophone sur les Ontologies | 2008

L'Apport d'une Ontologie pour la Sécurité des Systèmes d'Information

Jacques Saraydaryan; Fatiha Benali; Gauthier Jombart; Stéphane Ubéda


Archive | 2007

Scientific Foundations - Secured middlewares for dynamic environments

Fatiha Benali; Amira Ben Hamida; Denis Beras; Stéphane Frénot; Samuel Galice; Noha Ibrahim; Véronique Legrand; Frédéric Le Mouël; Marine Minier; Pierre Parrend; Yvan Royon; Jacques Saraydaryan; Stéphane Ubéda; Wassim Znaidi

Collaboration


Dive into the Fatiha Benali's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Véronique Legrand

Institut national des sciences Appliquées de Lyon

View shared research outputs
Top Co-Authors

Avatar

Jacques Saraydaryan

Institut national des sciences Appliquées de Lyon

View shared research outputs
Top Co-Authors

Avatar

Amira Ben Hamida

Institut national des sciences Appliquées de Lyon

View shared research outputs
Top Co-Authors

Avatar

Denis Beras

Institut national des sciences Appliquées de Lyon

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Noha Ibrahim

Institut national des sciences Appliquées de Lyon

View shared research outputs
Top Co-Authors

Avatar

Samuel Galice

Institut national des sciences Appliquées de Lyon

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge