Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nicolas Prigent is active.

Publication


Featured researches published by Nicolas Prigent.


visualization for computer security | 2015

PERCIVAL: proactive and reactive attack and response assessment for cyber incidents using visual analytics

Marco Angelini; Nicolas Prigent; Giuseppe Santucci

Situational awareness is a key concept in cyber-defence. Its goal is to make the user aware of different and complex aspects of the network he or she is monitoring. This paper proposes PERCIVAL, a novel visual analytics environment that contributes to situational awareness by allowing the user to understand the network security status and to monitor security events that are happening on the system. The proposed visualization allows for comparing the proactive security analysis with the actual attack progress, providing insights on the effectiveness of the mitigation actions the system has triggered against the attack and giving an overview of the possible attacks evolution. Moreover, the same visualization can be fruitfully used in the proactive analysis since it allows for getting details on computed attack paths and evaluating the mitigation actions that have been proactively computed by the system. A preliminary user study provided a positive feedback on the prototype implementation of the system. A video of the system is available at: https://youtu.be/uMpYCJCX95k.


Proceedings of the MWNS 2008 Workshop | 2008

AN INDUSTRIAL AND ACADEMIC JOINT EXPERIMENT ON AUTOMATED VERIFICATION OF A SECURITY PROTOCOL

Olivier Heen; Thomas Genet; Stephane Geller; Nicolas Prigent

This paper relates the collaboration between industrial and academic teams for the design and the verification of a security protocol. The protocol is about trust establishment in large communities of devices where infrastructure components are not always reachable. The collaboration covers the writing of formal specifications up to their verification, using both manual and automated verification methods embedded in the AVISPA [1] and SPAN [7] tools. At each stage, the use of the visualization and protocol animation facilities of SPAN is key to the mutual understanding of working teams. As a result, we obtain much more confidence in the security of the final protocol. We also demonstrate the usefulness of some embedded countermeasures.


visualization for computer security | 2017

STARLORD: Linked security data exploration in a 3D graph

Laetitia Leichtnam; Eric Totel; Nicolas Prigent; Ludovic Mé

In this paper, we present a novel model and visualization approach for heterogeneous sources of data. We represent our data by using a model inspired by STIX. Then, we use clustering algorithms to select interesting information to explore in a visualization panel. The visualization is based on a 3D graph representation that highlights the link between malicious event and allows to focus on relevant security artifacts. We illustrate our approach with two case studies using datasets containing network capture of the wannacry attack.


network operations and management symposium | 2016

VEGAS: Visualizing, exploring and grouping alerts

Damien Crémilleux; Christophe Bidan; Frédéric Majorczyk; Nicolas Prigent

The large quantities of alerts generated by intrusion detection systems (IDS) make very difficult to distinguish on a network real threats from noise. To help solving this problem, we propose VEGAS, an alerts visualization and classification tool that allows first line security operators to group alerts visually based on their principal component analysis (PCA) representation. VEGAS is included in a workflow in such a way that once a set of similar alerts has been collected and diagnosed, a filter is generated that redirects forthcoming similar alerts to other security analysts that are specifically in charge of this set of alerts, in effect reducing the flow of raw undiagnosed alerts.


Archive | 2005

Firewall system protecting a community of appliances, appliance participating in the system and method of updating the firewall rules within the system

Nicolas Prigent; Olivier Heen; Christophe Bidan; Olivier Courtay; Jean-Pierre Andreaux


Archive | 2005

Method for the discovery of devices connected to an IP network and device to carry out said method

Nicolas Prigent; Olivier Heen; Yves Maetz; Charles Salmon-Legagneur; Yan-Mei Tang-Talpin


Archive | 2009

Copy-protected software cartridge

Eric Diehl; Marc Eluard; Nicolas Prigent


Archive | 2007

Method for device insertion into a community of network devices

Nicolas Prigent; Olivier Heen; Jean-Pierre Andreaux; Olivier Courtay


Archive | 2005

Method for inserting a new device in a community of devices

Olivier Heen; Nicolas Prigent


Archive | 2004

Secure distributed system for management of local community representation within network devices

Nicolas Prigent; Olivier Heen; Jean-Pierre Andreaux; Christophe Bidan

Collaboration


Dive into the Nicolas Prigent's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Marc Eluard

University of Edinburgh

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge