scispace - formally typeset
Search or ask a question
Author

Alexandre Dulaunoy

Other affiliations: Astra
Bio: Alexandre Dulaunoy is an academic researcher from SES S.A.. The author has contributed to research in topics: Honeypot & Malware. The author has an hindex of 10, co-authored 22 publications receiving 449 citations. Previous affiliations of Alexandre Dulaunoy include Astra.

Papers
More filters
Proceedings ArticleDOI
24 Oct 2016
TL;DR: The aim of MISP is to help in setting up preventive actions and counter-measures used against targeted attacks, and to Enable detection via collaborative-knowledge-sharing about existing malware and other threats.
Abstract: The IT community is confronted with incidents of all kinds and nature, new threats appear on a daily basis. Fighting these security incidents individually is almost impossible. Sharing information about threats among the community has become a key element in incident response to stay on top of the attackers. Reliable information resources, providing credible information, are therefore essential to the IT community, or even at broader scale, to intelligence communities or fraud detection groups. This paper presents the Malware Information Sharing Platform (MISP) and threat sharing project, a trusted platform, that allows the collection and sharing of important indicators of compromise (IoC) of targeted attacks, but also threat information like vulnerabilities or financial indicators used in fraud cases. The aim of MISP is to help in setting up preventive actions and counter-measures used against targeted attacks. Enable detection via collaborative-knowledge-sharing about existing malware and other threats.

166 citations

Journal ArticleDOI
TL;DR: This paper proposes a flexible and automated approach to extract malware behaviour by observing all the system function calls performed in a virtualized execution environment and shows how the accuracy of the classification process can be improved using a phylogenetic tree.
Abstract: Several malware analysis techniques suppose that the disassembled code of a piece of malware is available, which is however not always possible. This paper proposes a flexible and automated approach to extract malware behaviour by observing all the system function calls performed in a virtualized execution environment. Similarities and distances between malware behaviours are computed which allows to classify malware behaviours. The main features of our approach reside in coupling a sequence alignment method to compute similarities and leverage the Hellinger distance to compute associated distances. We also show how the accuracy of the classification process can be improved using a phylogenetic tree. Such a tree shows common functionalities and evolution of malware. This is relevant when dealing with obfuscated malware variants that have often similar behaviour. The phylogenetic trees were assessed using known antivirus results and only a few malware behaviours were wrongly classified.

115 citations

Book ChapterDOI
05 Nov 2009
TL;DR: This paper addresses the issue of self adaptive honeypots, that can change their behavior and lure attackers into revealing as much information as possible about themselves through the configuration and reciprocal actions of high-interaction honeypots.
Abstract: High-interaction honeypots are relevant to provide rich and useful information obtained from attackers. Honeypots come in different flavors with respect to their interaction potential. A honeypot can be very restrictive, but then only a few interactions can be observed. If a honeypot is very tolerant though, attackers can quickly achieve their goal. Having the best trade-off between attacker freedom and honeypot restrictions is challenging. In this paper, we address the issue of self adaptive honeypots, that can change their behavior and lure attackers into revealing as much information as possible about themselves. The key idea is to leverage game-theoretic concepts for the configuration and reciprocal actions of high-interaction honeypots.

59 citations

Proceedings ArticleDOI
16 Apr 2012
TL;DR: A framework that leverages state of the art distributed processing facilities with clustering techniques in order to detect anomalies in both online and offline DNS traffic is described and implemented and operational on several networks.
Abstract: We present a monitoring approach and the supporting software architecture for passive DNS traffic. Monitoring DNS traffic can reveal essential network and system level activity profiles. Worm infected and botnet participating hosts can be identified and malicious backdoor communications can be detected. Any passive DNS monitoring solution needs to address several challenges that range from architectural approaches for dealing with large volumes of data up to specific Data Mining approaches for this purpose. We describe a framework that leverages state of the art distributed processing facilities with clustering techniques in order to detect anomalies in both online and offline DNS traffic. This framework entitled DNSSM is implemented and operational on several networks. We validate the framework against two large trace sets1.

37 citations

Proceedings ArticleDOI
23 May 2011
TL;DR: This paper proposes a high-interaction honeypot capable of learning from attackers and capable of dynamically changing its behavior using a variant of reinforcement learning.
Abstract: Honeypot evangelists propagate the message that honeypots are particularly useful for learning from attackers. However, by looking at current honeypots, most of them are statically configured and managed, which requires a priori knowledge about attackers. In this paper we propose a high-interaction honeypot capable of learning from attackers and capable of dynamically changing its behavior using a variant of reinforcement learning. It can strategically block the execution of programs, lure the attacker by substituting programs and insult attackers with the intent of revealing the attacker's nature and ethnic background. We also investigated the fact that attackers could learn to defeat the honeypot and discovered that attacker and honeypot interests sometimes diverge.

29 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The potential for blockchain technology in facilitating secure sharing of IoT datasets and securing IoT systems is posited, before presenting two conceptual blockchain-based approaches.

418 citations

Journal ArticleDOI
TL;DR: It is shown in this paper why having a standardized representation of threat information can improve the quality of TTI, thus providing better automated analytics solutions on large volumes of T TI which are often non-uniform and redundant.

259 citations

Journal ArticleDOI
TL;DR: This paper presents the first classification method integrating static and dynamic features into a single test and concludes that to achieve acceptable accuracy in classifying the latest malware, some older malware should be included in the set of data.

233 citations

Journal ArticleDOI
TL;DR: This survey has revealed that network security has been an important research topic since the beginning and advanced methodologies, such as machine learning, have been very promising.

216 citations

Journal ArticleDOI
TL;DR: This paper finds that an ensemble of recurrent neural networks are able to predict whether an executable is malicious or benign within the first 5 seconds of execution with 94% accuracy, which enables cyber security endpoint protection to be advanced to use behavioural data for blocking malicious payloads rather than detecting them post-execution and having to repair the damage.

205 citations