Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Kamel Karoui.
Data Mining and Multi-agent Integration | 2009
Kamel Karoui; Henda Ben Ghezala
The Agents and Data Mining integration has emerged as a promising area for disributed problems solving. Applying this integration on distributed firewalls will facilitate the anomalies detection process. In this chapter, we present a set of algorithms and mining techniques to analyse, manage and detect anomalies on distributed firewalls’ policy rules using the multi-agent approach; first, for each firewall, a static agent will execute a set of data mining techniques to generate a new set of efficient firewall policy rules. Then, a mobile agent will exploit these sets of optimized rules to detect eventual anomalies on a specific firewall (intra-firewalls anomalies) or between firewalls (inter-firewalls anomalies). An experimental case study will be presented to demonstrate the usefulness of our approach.
International Journal of Computer Networks & Communications | 2013
Kamel Karoui; Henda Hajjami Ben Ghézala
To supervise and guarantee a network security, the administrator uses different security components, such as firewalls, IDS and IPS. For a perfect interoperability between these components, they must be configured properly to avoid misconfiguration between them. Nevertheless, the existence of a set of anomalies between filtering rules and alerting rules, particularly in distributed multi-component architectures is very likely to degrade the network security. The main objective of this paper is to check if a set of security components are interoperable. A case study using a firewall and an IDS as examples will illustrate the usefulness of our approach.
information integration and web-based applications & services | 2009
Kamel Karoui; Henda Ben Ghezala
Nowadays, to survey and guarantee the security policy in networks, the administrator uses different network security components, such as firewalls and intrusion detection systems (IDS). For a perfect interoperability between these components in the network, these latter must be configured properly to avoid misconfiguration anomalies between them. However, there are a set of anomalies between alerting rules in the IDS and filtering rules in firewalls, that degrade the network security policy. In this paper, we will present a mobile agent based architecture to detect misconfigurations between these distributed components and generate a new set of rules free of errors. A case study will illustrate the effectiveness of our approach.
network and system security | 2017
Kamel Karoui; Henda Ben Ghezala
Security components such as firewalls, IDS and IPS, are the mainstay and the most widely adopted technology for protecting networks. These security components are configured according to a global security policy. An error in a security policy either creates security holes that will allow malicious traffic to sneak into a private network or blocks legitimate traffic and disrupts normal business processes, which, in turn, could lead to irreparable consequences. It has been observed that most security policies on the Internet are poorly designed and have many misconfigurations. In this paper, we propose a formal process to specify, verify and correct the security policy using the decision tree formalism, which consists of four steps. First, we define the security policy specifications and write it in a natural language. Second, the security policy will be translated into a formal language. Third, we verify the security policy correctness. If this latter is plugged with anomalies, we correct it in the last step.
International Journal of Security and Networks | 2016
Kamel Karoui; Henda Ben Ghezala
Networks security organisation and management is a hard and complex task. This is due to the diversity of security components and activities such as security policy specification, anomalies detection, vulnerability assessment, etc. In this paper, we propose to organise and gather these activities in a unique framework called network security life-cycle. Security components, especially firewalls, deployment should respect the network security life-cycle. It is necessary to check that the firewalls policys state or quality is accurately representative of all deployed firewalls. This activity is based on a set of individual metrics that allow us to evaluate and classify the security policy and firewalls according to the accurately implemented rules. Those metrics are gathered and classified to provide a unique reversible representativeness metric. In case of bad representative metric value, we can use the reversible metric to find back the individual metrics classifications and then detect the cause of this deficiency.
International Conference on Mobile, Secure and Programmable Networking | 2016
Abir Khaldi; Kamel Karoui; Henda Ben Ghezala
Cloud security is very challenging and is becoming a research hot topic. Thus, the adoption of the security assessment would be the key to evaluate and to enhance the cloud security level. The security assessment can be quantitative or qualitative. This paper proposes a cloud security quantitative assessment (CSQA) model. This proposed model evaluates the security of any cloud service (XaaS) exposed to attacks and vulnerabilities affecting its quality and specially its availability. It is based on mobile agent and web service interaction framework.
International Journal of Security and Networks | 2014
Kamel Karoui; Henda Ben Ghezala
Firewalls are the most widely adopted security devices for network protection. These components are often implemented with several errors (or anomalies) that are sometimes critical. To ensure the security of their networks, administrators should detect these anomalies and correct them. Before correcting the detected anomalies, the administrator should evaluate and classify these latter to determine the best strategy to correct them. In this work, we propose a process to evaluate and classify the detected anomalies using a three evaluation criteria: a quantitative evaluation, a semantic evaluation and multi-anomalies evaluation. The proposed process, convenient in an audit process, will be detailed by a case study to demonstrate its usefulness.
conference on risks and security of internet and systems | 2008
F. Ben Ftima; Kamel Karoui; H. Ben Ghzela
Firewalls are core elements in network security. However, detecting anomalies, particularly in distributed firewalls has become a complex task. Mobile agents promise an interesting approach for communications between different distributed systems specially Web services applications. In this work, we propose a firewall anomaliespsila detection system based on interactions between the Web services and the mobile agents technologies. Then, we highlight the trumps of this approach compared to the client/server model.
INTERNATIONAL JOURNAL OF DATA & NETWORK SECURITY | 2013
Kamel Karoui; Henda Ben Ghezala
Archive | 2009
Kamel Karoui