Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Véronique Legrand is active.

Publication


Featured researches published by Véronique Legrand.


international workshop on security | 2006

A History-Based Framework to Build Trust Management Systems

Samuel Galice; Véronique Legrand; Marine Minier; John Mullins; Stéphane Ubéda

In the context of ambient networks where each small device must trust its neighborhood rather than a fixed network, we propose in this paper a trust management framework based upon social patterns. As in human interactions model, our proposal build trust using history elements of past interactions with a local reputation model. The main features of our framework is the non transitivity of the trust bond and the non transferability of the history. The elements of history are also cryptographically proved as a criterion to enforce the trust notion. This gives a general framework that permits the implementation of various trust models


international conference on emerging security information, systems and technologies | 2008

Collaborative Approach to Automatic Classification of Heterogeneous Information Security

Fatiha Benali; Stéphane Ubéda; Véronique Legrand

The messages generated by the security devices represent the necessary data for the detection of the malicious activities in an information system. The heterogeneity of the devices and the lack of a standard for the security messages make the automatic processing of the messages difficult. The messages are short, use a very wide vocabulary and have different formats. We propose in this article the collaboration between classifiers to increase the accuracy of the classification. We apply the text categorization technics for the automatic classification of security log files messages, in categories defined by an ontology. We develop an extraction module for the message attributes to reduce the vocabulary size. Then we apply two training algorithms: the k-nearest neighbour algorithm and the naive Bayes, on two corpus of security log messages. Finally we propose to collaborate the classifiers to produce a single classifier with better accuracy.


Proceedings of the 8th international conference on New technologies in distributed systems | 2008

Modeling of information system correlated events time dependencies

Jacques Saraydaryan; Véronique Legrand; Stéphane Ubéda

Many works have been carried out in events correlation and intrusion detection. Although they use different methods or correlation approaches, they all highlight the importance of time in their modeling process. In this paper, we suggest a new time consideration for our previous works Bayesian behavior intrusion detection. Using a probabilistic approach, we introduce time consideration in the profile of user/system interactions. This enriched profile will integrate all time dependencies among correlated alerts. Some works provide attack graphs scenarios where time dependencies are explicitly defined. In our case, they are learnt during a training period.


international conference on internet monitoring and protection | 2007

Enriched Diagnosis and Investigation Models for Security Event Correlation

Véronique Legrand; Stéphane Ubéda

This paper describes a diagnosis model and architecture for enterprise level security event correlation called DIM (Diagnostic and Investigation Models). Our work is motivated by the existing limits of holistic Information System security surveillance solutions suited to monitoring information systems. We address this issue in this paper and propose an architectural foundation. Our approach is based on an ontology-driven diagnosis process coupled with enriched CIM (Common Information Model) derived information model and a policy model.


international conference on internet monitoring and protection | 2008

A Dangerousness-Based Investigation Model for Security Event Management

Véronique Legrand; Radu State; Luc Paffumi

The current landscape of security management solutions for large scale networks is limited by the lack of supporting approaches capable to deal with the huge number of alarms and events that are generated on current networks. In this paper we propose a security management architecture, capable to reconstruct causal dependencies from captured network and service alarms. The key idea is based on mapping events in semantic spaces, where a novel algorithm can determine such dependencies. We have implemented a prototype and tested it on a operational network within an outsourced security management suite protecting multiple networks.


information security conference | 2008

Behavioral Intrusion Detection Indicators

Jacques Saraydaryan; Luc Paffumi; Véronique Legrand; Stéphane Ubéda

Monitoring and analysing Information system(IS)’s security events has become more and more difficult in the last few years. As IS complexity rises, the number of mandatory monitoring points has increased along with the number of deployed probes. Consequently, a huge amount of information is reported to the analyst which subsequently floods him and implies the implementation of very complex event analysis engines. In the behaviour analysis context in which sequences of events are studied, this information quantity issue makes it difficult to build automatable - not too complex - models. In order to cope with this increasing amount of information, we will describe a method to reduce the observation perimeter through the selection of most relevant indicators. Such indicators, which are defined thanks to users and attackers behaviour analysis, represent different actions that users or attackers perform in the IS. This method implies neither information loss nor significant detection rate decline. We experienced this indicators selection with a behaviour anomaly detection engines injecting few days of events. Results show that model complexity issues are significantly reduced while keeping detection rate almost the same.


Proceedings of the 8th international conference on New technologies in distributed systems | 2008

Automatic classification of security messages based on text categorization

Fatiha Benali; Stéphane Ubéda; Véronique Legrand

The generated messages by the security devices are the necessary data for the detection of the malicious activities in an information system. The heterogeneity of the devices and the lack of a standard for the security messages make the automatic processing of the messages difficult. The messages are short, use a very wide vocabulary and have different formats. We propose in this article the application of the text categorization technics for the automatic classification of security log files messages, in categories defined by an ontology. We develop an extraction module for the message attributes to reduce the vocabulary size. Then we apply two training algorithms: the k-nearest neighbour algorithm and the naive bayes, on two corpus of security log messages.


international conference on emerging security information, systems and technologies | 2007

Evaluation of Deviating Alerts coming from Behavioral Intrusion Detection System

Jacques Saraydaryan; Véronique Legrand; Stéphane Ubéda

The growth of behavioral intrusion detection solutions raises a new issue. The update of normal references is necessary and determines the flexibility and accuracy of the detection. This paper describes a decision block function used to update a behavioral intrusion detection method. Based on a risk analysis and support vector machines, our approach completes the behavioral anomaly detection using Bayesian modeling based on a global vision of the system approach.


Archive | 2003

Trusted Ambient community for self-securing hybrid networks

Véronique Legrand; D. Hooshmand; Stéphane Ubéda


7ème Conférence Internationale sur les NOuvelles TEchnologies de la REpartition | 2007

Behavioral anomaly detection using Bayesian modelization based on a global vision of the system

Jacques Saraydaryan; Véronique Legrand; Stéphane Ubéda

Collaboration


Dive into the Véronique Legrand's collaboration.

Top Co-Authors

Avatar

Stéphane Ubéda

Institut national des sciences Appliquées de Lyon

View shared research outputs
Top Co-Authors

Avatar

Jacques Saraydaryan

Institut national des sciences Appliquées de Lyon

View shared research outputs
Top Co-Authors

Avatar

Fatiha Benali

Institut national des sciences Appliquées de Lyon

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Samuel Galice

Institut national des sciences Appliquées de Lyon

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Amira Ben Hamida

Institut national des sciences Appliquées de Lyon

View shared research outputs
Top Co-Authors

Avatar

Denis Beras

Institut national des sciences Appliquées de Lyon

View shared research outputs
Top Co-Authors

Avatar

Noha Ibrahim

Institut national des sciences Appliquées de Lyon

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge