References of "Abdelnur, Humberto J"
     in
Bookmark and Share    
Peer Reviewed
See detailMachine Learning Techniques for Passive Network Inventory
François, Jérôme UL; Abdelnur, Humberto J.; State, Radu UL et al

in IEEE Transactions on Network and Service Management (2010), 7(4), 244-257

Being able to fingerprint devices and services, i.e., remotely identify running code, is a powerful service for both security assessment and inventory management. This paper describes two novel ... [more ▼]

Being able to fingerprint devices and services, i.e., remotely identify running code, is a powerful service for both security assessment and inventory management. This paper describes two novel fingerprinting techniques supported by isomorphic based distances which are adapted for measuring the similarity between two syntactic trees. The first method leverages the support vector machines paradigm and requires a learning stage. The second method operates in an unsupervised manner thanks to a new classification algorithm derived from the ROCK and QROCK algorithms. It provides an efficient and accurate classification. We highlight the use of such classification techniques for identifying the remote running applications. The approaches are validated through extensive experimentations on SIP (Session Initiation Protocol) for evaluating the impact of the different parameters and identifying the best configuration before applying the techniques to network traces collected by a real operator. [less ▲]

Detailed reference viewed: 153 (3 UL)
Full Text
Peer Reviewed
See detailAn Autonomic Testing Framework for IPv6 Configuration Protocols
Becker, Sheila UL; Abdelnur, Humberto J.; State, Radu UL et al

in Lecture Notes in Computer Science 6155 (2010)

Detailed reference viewed: 83 (2 UL)
Full Text
Peer Reviewed
See detailAbusing SIP authentication
Abdelnur, Humberto J.; Avanesov, Tigran UL; Rusinowitch, Michael et al

in Journal of Information Assurance and Security (2009), 4

The recent and massive deployment of Voice over IP infrastructures had raised the importance of the VoIP security and more precisely of the underlying signalisation protocol SIP. In this paper, we will ... [more ▼]

The recent and massive deployment of Voice over IP infrastructures had raised the importance of the VoIP security and more precisely of the underlying signalisation protocol SIP. In this paper, we will present a new attack against the authentication mechanism of SIP. This attack allows to perform toll fraud and call hijacking. We will detail the formal specification method that allowed to detect this vulnerability, highlight a simple usage case and propose a mitigation technique. [less ▲]

Detailed reference viewed: 146 (2 UL)