WorldCat Identities

Owezarski, Philippe

Overview
Works: 23 works in 64 publications in 2 languages and 1,126 library holdings
Genres: Conference papers and proceedings 
Roles: Editor, Thesis advisor, Opponent, Author, Other, 958
Publication Timeline
.
Most widely held works by Philippe Owezarski
Traffic monitoring and analysis : first international workshop, TMA 2009, Aachen, Germany, May 11, 2009 ; proceedings by Maria Papadopouli( )

14 editions published in 2009 in English and held by 487 WorldCat member libraries worldwide

"This book constitutes the proceedings of the First International Workshop on Traffic Monitoring and Analysis, TMA 2008, held in Aachen, Germany, on May 11, 2008 in conjunction with the IFIP Networking 2008 conference. The workshop is an initiative from the COST Action IC0703 "Data Traffic Monitoring and Analysis: Theory, Techniques, Tools and Applications for the Future Networks". The 15 papers contained in this volume were carefully reviewed and selected from 34 submissions. They encompass research areas related to traffic analysis and classification, measurements, topology, discovery, detection of specific applications and events, packet inspection, and traffic inference. The papers are organized in topical sections on QoS measurement, rupture detection, traffic classification, as well as traffic analysis and topology measurements."--Publisher's website
Interactive distributed multimedia systems and telecommunication services : 6th international workshop, IDMS '99, Toulouse, France, October 12-15, 1999 : proceedings by Michel Diaz( Book )

17 editions published between 1999 and 2007 in English and held by 376 WorldCat member libraries worldwide

The 1999 International Workshop on Interactive Distributed Multimedia Sys­ tems and Telecommunication Services (IDMS) in Toulouse is the sixth in a se­ ries that started in 1992. The previous workshops were held in Stuttgart in 1992, Hamburg in 1994, Berlin in 1996, Darmstadt in 1997, and Oslo in 1998. The area of interest of IDMS ranges from basic system technologies, such as networking and operating system support, to all kinds of teleservices and distributed multimedia applications. Technical solutions for telecommunications and distributed multimedia systems are merging and quality-of-service (QoS) will play a key role in both areas. However, the range from basic system tech­ nologies to distributed mutlimedia applications and teleservices is still very broad and we have to understand the implications of multimedia applications and their requirements for middleware and networks. We are challenged to develop new and more fitting solutions for all distributed multimedia systems and telecom­ munication services to meet the requirements of the future information society
Monitoring Internet traffic and services by IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services( )

5 editions published in 2005 in English and held by 225 WorldCat member libraries worldwide

Analysis of internet traffic and usage traces Analyse de trafic et de traces d'usage de l'internet( Book )

1 edition published in 2007 in English and held by 5 WorldCat member libraries worldwide

Proceedings of the 2nd IEEE Workshop on Monitoring, Attack Detection, and Mitigation by 2007, Toulouse> MonAM <2( Book )

2 editions published in 2007 in English and held by 3 WorldCat member libraries worldwide

Conception et formalisation d'une application de visioconférence coopérative. Application et extension pour la téléformation by Philippe Owezarski( Book )

2 editions published in 1996 in French and held by 3 WorldCat member libraries worldwide

LES PROGRES RECENTS DANS LE DOMAINE DE L'INFORMATIQUE ET DES RESEAUX DE COMMUNICATIONS ONT OUVERT LA VOIE AUX APPLICATIONS DISTRIBUEES MULTIMEDIAS COOPERATIVES. LA PROBLEMATIQUE ASSOCIEE A LA CONCEPTION DE TELLES APPLICATIONS COMPORTE PLUSIEURS POINTS. TOUT D'ABORD, LES DONNEES MULTIMEDIAS SE CARACTERISENT PAR LEUR QUALITE DE SERVICE EN TERMES DE FIABILITE, DE DEBIT ENGENDRE, DE SYNCHRONISATION TEMPORELLE LES APPLICATIONS MULTIMEDIAS DOIVENT DONC GARANTIR LE RESPECT DE LA QUALITE DE SERVICE DE CHACUN DES MEDIAS, LE POINT ESSENTIEL CONSISTANT A ASSURER LE RESPECT DES CONTRAINTES DE SYNCHRONISATION INTRA ET INTER-FLUX. DE MEME, LE SUPPORT DE COMMUNICATION DOIT POUVOIR S'ADAPTER AUX CONTRAINTES DES MEDIAS TRANSPORTES ET FOURNIR UN SERVICE ADEQUAT EN TERME DE DEBIT, FIABILITE, DELAI DE BOUT EN BOUT ENFIN, LES UTILISATEURS ONT DE PLUS EN PLUS BESOIN DE TRAVAILLER EN GROUPE POUR LEURS APPLICATIONS INFORMATIQUES, ET DES MECANISMES DE COOPERATION DOIVENT ETRE INTRODUITS. DANS CETTE THESE, DES MECANISMES ONT ETE PROPOSES POUR REPONDRE A CETTE PROBLEMATIQUE ET ONT ETE MIS EN UVRE DANS LE CADRE D'UNE APPLICATION DE VISIOCONFERENCE. AINSI, LA SYNCHRONISATION MULTIMEDIA EST REALISEE PAR UN MOTEUR UTILISANT DES MECANISMES AVANCES DES SYSTEMES OPERATOIRES ET RESPECTANT UN SCENARIO MODELISE PAR UN RESEAU DE PETRI A FLUX TEMPORELS. LA COMMUNICATION UTILISE UN TRANSPORT A ORDRE PARTIEL QUI S'ADAPTE BIEN AUX CONTRAINTES DE CETTE APPLICATION AUTANT EN TERME DE DEBIT QUE DE FIABILITE, ET PERMET D'EN AUGMENTER LES PERFORMANCES. ENFIN, CETTE VISIOCONFERENCE A ETE ETENDUE POUR PRENDRE EN COMPTE DES NOTIONS DE TRAVAIL DE GROUPE ET OFFRE, EN PARTICULIER, UN CONTROLE DES ENTREES/SORTIES DES PARTICIPANTS ET DES INTERACTIONS AU SEIN DU GROUPE. UNE ARCHITECTURE GENERALE GARANTISSANT CES CONTRAINTES TEMPORELLES ET DE COOPERATION A AINSI ETE PROPOSEE ET REALISEE. ENFIN, CES TECHNIQUES ONT ETE APPLIQUEES A UNE APPLICATION DE TELEFORMATION PROFESSIONNELLE DANS LE DOMAINE DE L'AERONAUTIQUE
E2EMON '05 3rd IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services : Monitoring Internet Traffic and Services : May 15, 2005, Nice, France by IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services( )

1 edition published in 2005 in English and held by 3 WorldCat member libraries worldwide

Traffic monitoring and analysis : third international workshop, TMA 2011, Vienna, Austria, April 27, 2011 ; proceedings by Alberto Dainotti( Book )

1 edition published in 2009 in English and held by 2 WorldCat member libraries worldwide

This book constitutes the proceedings of the 6th International Workshop on Traffic Monitoring and Analysis, TMA 2014, held in London, UK, in April 2014. The thoroughly refereed 11 full papers presented in this volume were carefully reviewed and selected from 30 submissions. The contributions are organized in topical sections on tools and lessons learned from passive measurement, performance at the edge, and Web, content, and interdomain
Mécanismes de supervision distribuée pour les réseaux de communication dynamiques. by Denis Carvin( Book )

2 editions published in 2015 in French and held by 2 WorldCat member libraries worldwide

With the massive rise of wireless technologies, the number of mobile stations is constantly growing. Both their uses and their communication resources are diversified. By integrating our daily life objects, our communication networks become dynamic in terms of physical topology but also in term of resources. Furthermore, they give access to a richer information. As a result, the management task has become complex and requires shorter response time that a human administrator can not respect. It becomes necessary to develop an autonomic management behavior in next generation networks. In any manner, managing a system requires essential steps which are : its measurement and its supervision. Whatever the nature of a system, this stage of information gathering, allows its characterization and its control. The field of networks is not the exception to the rule and objects that compose them will need to acquire information on their environment for a better adaptation. In this thesis, we focus on the efficient sharing of this information, for self-analysis and distributed performance evaluation purposes. After having formalized the problem of the distributed measurement, we address in a first part the fusion and the diffusion of measures in dynamic graphs. We develop a new heuristic for the average consensus problem offering a better contraction rate than the ones of the state of the art. In a second part, we consider more stable topologies where TCP is used to convey measures. We offer a scheduling mechanism for TCP flows that guaranty the same impact on the network congestion, while reducing the average latency. Finally, we show how nodes can supervise various metrics such as the system performance based on their utilities and suggest a method to allow them to analyze the evolution of this performance
Risk assessment and intrusion detection for airbone networks by Silvia Gil Casals( Book )

2 editions published in 2014 in English and held by 2 WorldCat member libraries worldwide

Aeronautics is actually facing a confluence of events: connectivity of aircraft is graduallyincreasing in order to ease the air traffic management and aircraft fleet maintainability, andto offer new services to passengers while reducing costs. The core avionics functions are thuslinked to what we call the Open World, i.e. the non-critical network of an aircraft as well asthe air traffic services on the ground. Such recent evolutions could be an open door to cyberattacksas their complexity keeps growing. However, even if security standards are still underconstruction, aeronautical certification authorities already require that aircraft manufacturersidentify risks and ensure aircraft will remain in a safe and secure state even under threatconditions.To answer this industrial problematic, this thesis first proposes a simple semi-quantitative riskassessment framework to identify threats, assets and vulnerabilities, and then rank risk levelsaccording to threat scenario safety impact on the aircraft and their potential likelihood byusing adjustable attribute tables. Then, in order to ensure the aircraft performs securely andsafely all along its life-cycle, our second contribution consists in a generic and autonomousnetwork monitoring function for intrusion detection based on Machine Learning algorithms.Different building block options to compose this monitoring function are proposed such as:two ways of modeling the network traffic through characteristic attributes, two MachineLearning techniques for anomaly detection: a supervised one based on the One Class SupportVector Machine algorithm requiring a prior training phase and an unsupervised one based onsub-space clustering. Since a very common issue in anomaly detection techniques is thepresence of false alarms, we prone the use of the Local Outlier Factor (a density indicator) toset a threshold in order to distinguish real anomalies from false positives.This thesis summarizes the work performed under the CIFRE (Convention Industrielle deFormation par la Recherche) fellowship between THALES Avionics and the CNRS-LAAS atToulouse, France
Métrologie des réseaux sans-fil : à la frontière du signal et du numérique by Guillaume Kremer( Book )

2 editions published between 2014 and 2015 in French and held by 2 WorldCat member libraries worldwide

The multiplication of wireless networks may result in more medium contention and stronger spectral pollution. To maintain the communications quality, nodes will have to be more adaptive and take benefits of the available informations about the state of the medium and of the communications. In that optic, this thesis presents 3 contributions which respectively tackle the following fields of wireless networks research: measurements, modeling and development of new solutions for nodes adaptability. The first contribution concerns the design and implementation of a measurement test bench which complies with the requirements of these studies (i.e. it must allow cross-layer measurements starting from the physical layer and offering maximal control over the environment and its perturbations). Our solution is to perform the communications inside the RF protected environment of an anechoic room. To interfere with these communications, a modulated AWGN noise is injected inside the room with the help of a directive antenna. Inside the room, measurements are made using WIFI devices and RF equipments. The second contribution aims to take advantage of the experimental platform measurements for improving the realism of ns-3 simulations. In fact, despite a recognized lack of realism, network simulators such as ns-3 are massively used to test new wireless protocols and applications. We then propose a root cause analysis (RCA) method designed for detecting configuration, implementation or modeling anomalies between the simulator and the experimental bench. The application of this method results in a major improvement of the realism of the ns-3 WIFI model . The third contribution consists in the application of three machine learning algorithms, namely SVR, k-nn and DT, in order to predict the IP throughput on a wireless link. The estimations are based on SNR, RSS and noise measurements at the receiver side. The different algorithms are evaluated according to the accuracy of their estimations but also according to their functional characteristics (e.g. model size, training time, ...). The results show that the SVR and DT algorithms used in conjunction of the SNR metric obtain the most accurate estimates. Moreover the SVR and DT algorithms are respectively the most efficient in terms of memory and time
An outright open source approach for simple and pragmatic internet eXchange by Marc Bruyère( Book )

2 editions published in 2016 in English and held by 2 WorldCat member libraries worldwide

L'Internet, le réseaux des réseaux, est indispensable à notre vie moderne et mondialisée et en tant que ressource publique il repose sur l'inter opérabilité et la confiance. Les logiciels libres et open source jouent un rôle majeur pour son développement. Les points d'échange Internet (IXP) où tous les opérateurs de type et de taille différents peuvent s'échanger du trafic sont essentiels en tant que lieux d'échange neutres et indépendants. Le service fondamental offert par un IXP est une fabrique de commutation de niveau 2 partagée. Aujourd'hui les IXP sont obligés d'utiliser des technologies propriétaires pour leur fabrique de commutations. Bien qu'une fabrique de commutations de niveau 2 se doit d'être une fonctionnalité de base, les solutions actuelles ne répondent pas correctement aux exigences des IXPs. Cette situation est principalement dûe au fait que les plans de contrôle et de données sont intriqués sans possibilités de programmer finement le plan de commutation. Avant toute mise en œuvre, il est primordial de tester chaque équipement afin de vérifier qu'il répond aux attentes mais les solutions de tests permettant de valider les équipements réseaux sont toutes non open source, commerciales et ne répondent pas aux besoins techniques d'indépendance et de neutralité. Le "Software Defined Networking" (SDN), nouveau paradigme découplant les plans de contrôle et de données utilise le protocole OpenFlow qui permet de programmer le plan de commutation Ethernet haute performance. Contrairement à tous les projets de recherches qui centralisent la totalité du plan de contrôle au dessus d'OpenFlow, altérant la stabilité des échanges, nous proposons d'utiliser OpenFlow pour gérer le plan de contrôle spécifique à la fabrique de commutation. L'objectif principal de cette thèse est de proposer "Umbrella", fabrique de commutation simple et pragmatique répondant à toutes les exigences des IXPs et en premier lieu à la garantie d'indépendance et de neutralité des échanges. Dans la première partie, nous présentons l'architecture "Umbrella" en détail avec l'ensemble des tests et validations démontrant la claire séparation du plan de contrôle et du plan de données pour augmenter la robustesse, la flexibilité et la fiabilité des IXPs. Pour une exigence d'autonomie des tests nécessaires pour les IXPs permettant l'examen de la mise en œuvre d'Umbrella et sa validation, nous avons développé l'"Open Source Network Tester" (OSNT), un système entièrement open source "hardware" de génération et de capture de trafic. OSNT est le socle pour l"OpenFLow Operations Per Second Turbo" (OFLOPS Turbo), la plate-forme d'évaluation de commutation OpenFlow. Le dernier chapitre présente le déploiement de l'architecture "Umbrella" en production sur un point d'échange régional. Les outils de test que nous avons développés ont été utilisés pour vérifier les équipements déployés en production. Ce point d'échange, stable depuis maintenant un an, est entièrement géré et contrôlé par une seule application Web remplaçant tous les systèmes complexes et propriétaires de gestion utilisés précédemment
Contrôle de congestion et gestion du trafic à partir de mesures pour l'optimisation de la qualité de service dans l'Internet by Nicolas Larrieu( Book )

2 editions published in 2005 in French and held by 2 WorldCat member libraries worldwide

Internet monitoring has only been used for research, engineering and design of Internet networks since few years (since the beginning of years 2000), but it is more and more popular and spreads rapidly. It deals with studying, characterizing, analyzing and modeling traffic on the different Internet links in order to understand network behaviors when facing traffics which are largely unknown at this time. In particular, guarantying QoS for the Internet is currently one of the most challenging issues. This thesis aims at designing new communication protocols and architectures able to reduce the traffic LRD in order to optimize the use of communication resources. Then, new protocol and architectural mechanisms could be perfectly suited to users' needs and traffic constraints. Thus, this PhD work deals with a new approach for the Internet, aiming at improving traffic management, QoS and more generally network services. This approach, called Measurement Based Networking (MBN), is built on the use of active and passive monitoring techniques to evaluate in real time different network parameters and analyze its traffic in order to react very quickly and accurately to specific events arising in the network (for instance, congestion events). We will illustrate, in particular, the MBN approach by designing a new measurement based congestion control mechanism (MBCC) which will be evaluated thanks to NS-2 simulations. We will show, in particular, how this new mechanism can improve traffic characteristics as well as Internet QoS, despite the complexity and variability of current Internet traffics
Contributions on detection and classification of internet traffic anomalies by Silvia Farraposo( Book )

2 editions published between 2009 and 2010 in English and held by 2 WorldCat member libraries worldwide

The aim of this thesis is to develop a tool able of detecting, classifying and identifying traffic anomalies. Such occurrences are disturbing since they have potential to deviate network operations from their normal behaviour. Network Anomaly Detection Algorithm - NADA - is the approach developed. The use of NADA and its accuracy are guaranteed by considering three axis of action: multi-criteria, multi-time and multi aggregation level. Together they allow the detection of traffic anomalies in traffic traces, as well as their classification through the definition of traffic profiles, particularly, anomaly traffic profiles. The latter ones are the basis of the definition of anomaly signatures databases. Hence, anomaly detection and classification form a couple that can be applied at several areas, ranging from network security to traffic engineering or overlay networks, to name a few
Unsupervised network anomaly detection by Johan Mazel( Book )

1 edition published in 2011 in English and held by 1 WorldCat member library worldwide

La détection d'anomalies est une tâche critique de l'administration des réseaux. L'apparition continue de nouvelles anomalies et la nature changeante du trafic réseau compliquent de fait la détection d'anomalies. Les méthodes existantes de détection d'anomalies s'appuient sur une connaissance préalable du trafic : soit via des signatures créées à partir d'anomalies connues, soit via un profil de normalité. Ces deux approches sont limitées : la première ne peut détecter les nouvelles anomalies et la seconde requiert une constante mise à jour de son profil de normalité. Ces deux aspects limitent de façon importante l'efficacité des méthodes de détection existantes. Nous présentons une approche non-supervisée qui permet de détecter et caractériser les anomalies réseaux de façon autonome. Notre approche utilise des techniques de partitionnement afin d'identifier les flux anormaux. Nous proposons également plusieurs techniques qui permettent de traiter les anomalies extraites pour faciliter la tâche des opérateurs. Nous évaluons les performances de notre système sur des traces de trafic réel issues de la base de trace MAWI. Les résultats obtenus mettent en évidence la possibilité de mettre en place des systèmes de détection d'anomalies autonomes et fonctionnant sans connaissance préalable
Définition d'une infrastructure de sécurité et de mobilité pour les réseaux pair-à-pair recouvrants by Ahmat mahamat Daouda( )

1 edition published in 2014 in French and held by 1 WorldCat member library worldwide

Securing communications in distributed dynamic environments, that lack a central coordination point and whose topology changes constantly, is a major challenge.We tackle this challenge of today's P2P systems. In this thesis, we propose to define a security infrastructure that is suitable to the constraints and issues of P2P systems. The first part of this document presents the design of SEMOS, our middleware solution for managing and securing mobile sessions. SEMOS ensures that communication sessions are secure and remain active despite the possible disconnections that can occur when network configurations change or a malfunction arises. This roaming capability is implemented via the definition of a new addressing space in order to split up addresses for network entities with their names ; the new naming space is then based on distributed hash tables(DHT). The second part of the document presents a generic and distributed mechanism for a key exchange method befitting to P2P architectures. Building on disjoint paths andend-to-end exchange, the proposed key management protocol consists of a combination of the Diffie-Hellman algorithm and the Shamir's (k, n) threshold scheme. On the onehand, the use of disjoint paths to route subkeys offsets the absence of the third party's certified consubstantial to Diffie-Hellman and reduces, at the same time, its vulnerability to interception attacks. On the other hand, the extension of the Diffie-Hellman algorithm by adding the threshold (k, n) scheme substantially increases its robustness, in particular in key splitting and / or in the case of accidental or intentional subkeys routing failures. Finally, we rely on a virtual mobile network to assess the setup of secure mobile sessions.The key management mechanism is then evaluated in an environment with randomly generated P2P topologies
Architecture autonome et distribuée d'adressage et de routage pour la flexibilité des communications dans l'internet by Cyril Cassagnes( )

1 edition published in 2012 in French and held by 1 WorldCat member library worldwide

Les schémas de routage locaux basés sur des coordonnées prises dans le plan hyperbolique ont attiré un intérêt croissant depuis quelques années. Cependant, les solutions proposées sont toutes appliquées à des réseaux au topologie aléatoire et au nombre de nœuds limités. Dans le même temps, plusieurs travaux se sont concentrés sur la création de modèle topologique basé sur les lois de la géométrie hyperbolique. Dans ce cas, Il est montré que les graphes ont des topologies semblables à Internet et qu'un routage local hyperbolique atteint une efficacité proche de la perfection. Cependant, ces graphes ne garantissent pas le taux de réussite du routage même si aucune panne ne se produit. Dans cette thèse, l'objectif est de construire un système passant à l'échelle pour la création de réseau recouvrant capable de fournir à ses membres un service d'adressage et de routage résilient dans un environnement dynamique. Ensuite, nous étudions de quelle manière les réseaux P2PTV pourraient supporter un nombre d'utilisateur croissant. Dans cette thèse, nous essayons de répondre à cette question en étudiant les facteurs d'efficacité et de passage à l'échelle dans un système de diffusion vidéo P2P typique. Au travers des données fournies par Zattoo, producteur de réseau P2PTV, nous réalisons des simulations dont les résultats montrent qu'il y a encore des obstacles à surmonter avant que les réseaux P2P de diffusion vidéo puissent dépendre uniquement de leurs utilisateurs
Malicious trafic observation using a framework to parallelize and compose midpoint inspection devices by Ion Alberdi( )

1 edition published in 2010 in English and held by 1 WorldCat member library worldwide

Our Ph.D states that given the magnitude of malicious behavior in the Internet, end-host software must be monitored. To limit the number of monitoring points, we propose to monitor the software from an interconnection point, i.e. a midpoint. We have designed for this purpose Luth, a tool to compose and parallelize a set of midpoint inspectors (MI) that implement mini IDS, IPS or firewall-s, while checking the correction and optimality of the resulting inspection tree, using a configuration language, its interpreter and associated algorithms. We then configure this tool to monitor some end-host software used to observe malicious traffic. First, we demonstrate why malware downloading honeypots must be monitored by designing an original attack. Then, we show how we configure Luth to block these attacks while accepting the intrusions emulated by the honeypot. In a second step, we use Luth to implement a sandbox that analyzes dynamically and as safely as wanted malware's network communications. We show how the information obtained by this analysis enables us to cluster the analyzed malware and therefore limit the number of malware to analyze manually. Finally, we show how we automatically generate signatures from this analysis to detect those malware from a midpoint device
Malicious trafic observation using a framework to parallelize and compose midpoint inspection devices by Ion Alberdi( Book )

1 edition published in 2010 in English and held by 1 WorldCat member library worldwide

Our Ph. D states that given the magnitude of malicious behavior in the Internet, end-host software must be monitored. To limit the number of monitoring points, we propose to monitor the software from an interconnection point, i.e. a midpoint. We have designed for this purpose Luth, a tool to compose and parallelize a set of midpoint inspectors (MI) that implement mini IDS, IPS or firewall-s, while checking the correction and optimality of the resulting inspection tree, using a configuration language, its interpreter and associated algorithms. We then configure this tool to monitor some end-host software used to observe malicious traffic. First, we demonstrate why malware downloading honeypots must be monitored by designing an original attack. Then, we show how we configure Luth to block these attacks while accepting the intrusions emulated by the honeypot. In a second step, we use Luth to implement a sandbox that analyzes dynamically and as safely as wanted malware's network communications. We show how the information obtained by this analysis enables us to cluster the analyzed malware and therefore limit the number of malware to analyze manually. Finally, we show how we automatically generate signatures from this analysis to detect those malware from a midpoint device
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.61 (from 0.52 for Traffic mo ... to 0.97 for Architectu ...)

Traffic monitoring and analysis : first international workshop, TMA 2009, Aachen, Germany, May 11, 2009 ; proceedings
Covers
Interactive distributed multimedia systems and telecommunication services : 6th international workshop, IDMS '99, Toulouse, France, October 12-15, 1999 : proceedingsInteractive distributed multimedia systems and telecommunications : 6th International Workshop, IDMS'99 : Toulouse, France, October 12-15, 1999 : proceedings
Languages
English (51)

French (10)