no code implementations • 24 Nov 2023 • Frédéric Sabot, Pierre-Etienne Labeau, Jean-Michel Dricot, Pierre Henneaux
With the transition towards a smart grid, Information and Communications Technology (ICT) infrastructures play a growing role in the operation of transmission systems.
no code implementations • 13 Mar 2023 • Islam Debicha, Benjamin Cochez, Tayeb Kenaza, Thibault Debatty, Jean-Michel Dricot, Wim Mees
However, many studies in the field of computer vision have shown that ML can be fooled by intentionally crafted instances, called adversarial examples.
no code implementations • 12 Mar 2023 • Islam Debicha, Benjamin Cochez, Tayeb Kenaza, Thibault Debatty, Jean-Michel Dricot, Wim Mees
As a result, the purpose of this study was to investigate the actual feasibility of adversarial attacks, specifically evasion attacks, against network-based intrusion detection systems (NIDS), demonstrating that it is entirely possible to fool these ML-based IDSs using our proposed adversarial algorithm while assuming as many constraints as possible in a black-box setting.
no code implementations • 27 Oct 2022 • Islam Debicha, Richard Bauwens, Thibault Debatty, Jean-Michel Dricot, Tayeb Kenaza, Wim Mees
In an attempt to detect those adversarial attacks, we design and implement multiple transfer learning-based adversarial detectors, each receiving a subset of the information passed through the IDS.
no code implementations • 22 Dec 2021 • Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees, Tayeb Kenaza
In the last decade, the use of Machine Learning techniques in anomaly-based intrusion detection systems has seen much success.
no code implementations • 20 Apr 2021 • Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees
Nowadays, Deep Neural Networks (DNNs) report state-of-the-art results in many machine learning areas, including intrusion detection.
no code implementations • 15 Mar 2021 • Islam Debicha, Thibault Debatty, Wim Mees, Jean-Michel Dricot
Intrusion Detection Systems (IDS) are now an essential element when it comes to securing computers and networks.
no code implementations • 22 Jun 2020 • François Rottenberg, Trung-Hien Nguyen, Jean-Michel Dricot, François Horlin, Jérôme Louveaux
Physical-layer security (PLS) has the potential to strongly enhance the overall system security as an alternative to or in combination with conventional cryptographic primitives usually implemented at higher network layers.