Search Results for author: Jean-Michel Dricot

Found 8 papers, 0 papers with code

Towards an Efficient Simulation Approach for Transmission Systems with ICT Infrastructures

no code implementations24 Nov 2023 Frédéric Sabot, Pierre-Etienne Labeau, Jean-Michel Dricot, Pierre Henneaux

With the transition towards a smart grid, Information and Communications Technology (ICT) infrastructures play a growing role in the operation of transmission systems.

Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems

no code implementations13 Mar 2023 Islam Debicha, Benjamin Cochez, Tayeb Kenaza, Thibault Debatty, Jean-Michel Dricot, Wim Mees

However, many studies in the field of computer vision have shown that ML can be fooled by intentionally crafted instances, called adversarial examples.

Network Intrusion Detection

Adv-Bot: Realistic Adversarial Botnet Attacks against Network Intrusion Detection Systems

no code implementations12 Mar 2023 Islam Debicha, Benjamin Cochez, Tayeb Kenaza, Thibault Debatty, Jean-Michel Dricot, Wim Mees

As a result, the purpose of this study was to investigate the actual feasibility of adversarial attacks, specifically evasion attacks, against network-based intrusion detection systems (NIDS), demonstrating that it is entirely possible to fool these ML-based IDSs using our proposed adversarial algorithm while assuming as many constraints as possible in a black-box setting.

Image Classification Network Intrusion Detection

TAD: Transfer Learning-based Multi-Adversarial Detection of Evasion Attacks against Network Intrusion Detection Systems

no code implementations27 Oct 2022 Islam Debicha, Richard Bauwens, Thibault Debatty, Jean-Michel Dricot, Tayeb Kenaza, Wim Mees

In an attempt to detect those adversarial attacks, we design and implement multiple transfer learning-based adversarial detectors, each receiving a subset of the information passed through the IDS.

Network Intrusion Detection Transfer Learning

Adversarial Training for Deep Learning-based Intrusion Detection Systems

no code implementations20 Apr 2021 Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees

Nowadays, Deep Neural Networks (DNNs) report state-of-the-art results in many machine learning areas, including intrusion detection.

Intrusion Detection

Efficient Intrusion Detection Using Evidence Theory

no code implementations15 Mar 2021 Islam Debicha, Thibault Debatty, Wim Mees, Jean-Michel Dricot

Intrusion Detection Systems (IDS) are now an essential element when it comes to securing computers and networks.

Intrusion Detection

CSI-based versus RSS-based Secret-Key Generation under Correlated Eavesdropping

no code implementations22 Jun 2020 François Rottenberg, Trung-Hien Nguyen, Jean-Michel Dricot, François Horlin, Jérôme Louveaux

Physical-layer security (PLS) has the potential to strongly enhance the overall system security as an alternative to or in combination with conventional cryptographic primitives usually implemented at higher network layers.

Cannot find the paper you are looking for? You can Submit a new open access paper.