Lyes Khoukhi - IEEE Xplore Author Profile

Showing 1-25 of 127 results

Filter Results

Show

Results

The rapid advancement of digital technologies in maritime operations has led to an urgent demand for specialized cybersecurity strategies, particularly to counter Distributed Denial of Service (DDoS) attacks targeting critical communication protocols like NMEA 2000. This paper presents a distinctive approach utilizing stochastic semi-Markov processes specifically designed to enhance the cybersecur...Show More
The advent of the QUIC protocol may herald a significant shift in the composition of online traffic in the years to come. The transport layer encryption of the QUIC protocol is one of its main evolutions, especially for metadata that was previously transmitted over TCP traffic without encryption. This new protocol has the potential to require significant alterations in future internet traffic anal...Show More
In today’s rapidly evolving cyber landscape, the growing sophistication of attacks, including the rise of zero-day exploits, poses critical challenges for network intrusion detection. Traditional Intrusion Detection Systems (IDSs) often struggle with the complexity and high dimensionality of modern cyber threats. Quantum Machine Learning (QML) seamlessly integrates the computational power of quant...Show More
O-RAN (Open Radio Access Network) is an initiative that promotes the development of open and interoperable radio access technologies. The O-RAN Alliance has undertaken specification efforts that align with O-RAN principles, incorporating the near-real-time RAN Intelligent Controller (RIC) to manage extensible applications (xApps) owned by various ORAN operators and vendors. However, this integrati...Show More
In order to ensure dependability of connected devices, machine learning is used in the analysis of network traffic to enable faster detection of abnormal behavior and congestion. The use of machine learning techniques enhances the capacity for handling traffic and helps to maintain service quality. Additionally, the purpose of machine learning on securing networks is to detect anomalies, classify ...Show More
Intelligent Transportation Systems (ITSs) are transforming the global monitoring of road safety. These systems, including vehicular networks and transportation infrastructure, are vulnerable to several security issues, which could disrupt services and potentially cause harm to the users. It is crucial to establish robust security measures to protect against evolving attacks and ensure the safe and...Show More
The implication of cyber-physical systems into industrial processes has introduced some security breaches due to the lack of security mechanisms. This article aims to come up with a novel methodology to detect false data injection attacks on cyber-physical systems. To reach this goal, we propose an efficient anomaly-based approach for detecting false data injection attacks against industrial cyber...Show More
The rapid expansion of the Internet of Things (IoT) has increased the demand for robust intrusion detection systems. Federated learning (FL) has appeared as a potential solution to improve the security of IoT networks by facilitating collaboration between multiple devices in training a unified model while keeping their data secure. As the training process of FL occurs locally on individual devices...Show More
With the increasing interconnectivity and digitalization of critical infrastructures, such as smart grids, ensuring robust cybersecurity measures is of paramount importance. Industrial Control Systems (ICS) security plays a crucial role in safeguarding the reliable operation of smart grids. In recent years, Machine learning (ML) and deep learning (DL) has emerged as a powerful tool for detecting a...Show More
The recent advancements in networking technologies have brought a substantial transformation in the manner in which we interact and communicate with one another. The highly anticipated 6G networks are poised to bring about a revolutionary change to the world with their advanced features and capabilities. However, with the rising complexity of networks and the explosive growth of IoT, the threat of...Show More
Federated learning (FL) is a distributed machine learning technique that allows multiple devices or nodes in a network to collaboratively train a machine learning model while keeping their data local to the device. This is particularly useful in the context of the Internet of Things (IoT) systems, where devices may have limited computational resources and may not be able to transmit their data to ...Show More
Access control, both physical and virtual, has always been a crucial aspect in maintaining the security of corporate information systems. Recently, several solutions have been proposed to address physical and virtual access control, including the use of electronic badges that can be costly to produce and easily misplaced. Additionally, numerous, sometimes expensive, cloud-based solutions have also...Show More
Over the past few decades, Intelligent Transportation System (ITS) has become a vital and extensive element of daily human life and activity. Vehicular Ad hoc Networks (VANETs) have become the most promising components of ITS, which promises to enhance transport efficiency, passenger safety, and comfort by exchanging traffic and infotainment information to intelligent vehicles. Moreover, VANETs ha...Show More
Internet of Things (IoT) is a promising paradigm that is considered as major enabler of smart cities. However, with the emergence of IoT botnets, the number of unsecured IoT devices is increasing rapidly. This can give attackers more advanced tools to carry out large scale damaging IoT attacks. Advanced Machine Learning (ML) techniques can help enhance the effectiveness of conventional intrusion d...Show More
Distributed denial-of-service (DDoS) attacks continue to grow at a rapid rate plaguing Internet Service Providers (ISPs) and individuals in a stealthy way. Thus, intrusion detection systems (IDSs) must evolve to cope with these increasingly sophisticated and challenging security threats. Traditional IDSs are prone to zero-day attacks since they are usually signature-based detection systems. The re...Show More
Data-driven Machine and Deep Learning (ML/DL) is an emerging approach that uses medical data to build robust and accurate ML/DL models that can improve clinical decisions in some critical tasks ($e.g.,$ cancer diagnosis). However, ML/DL-based healthcare models still suffer from poor adoption due to the lack of realistic and recent medical data. The privacy nature of these medical datasets makes it...Show More
In a time where data traffic is booming, Software-defined Networking (SDN) is becoming the most plausible solution to cope with the conventional networks’ shortcomings. The separation of the control (software) and the data (hardware) planes makes of SDN a technology-enabled to a multitude of new and promising applications and use cases for 5G network technology. Yet, initial SDN deployments consid...Show More
Several works are aiming to develop techniques allowing detecting False Data Injection Attacks, which represents one of the most harmful attacks due to its ability to damage a Cyber Physical Systems (CPS). Among these techniques the watermarking represents one of the most used ones. This paper proposes the design of a False Data Injection Attack (FDIA) against a CPS protected by a watermark-based ...Show More
The vehicle adhoc network (VANET) is a promising technology that enables numerous vehicular network applications to improve road safety, navigation, and many other purposes. Android automotive supports many applications for vehicles. Each application has a list of accesses, called permissions, required for specific interfaces or sensitive data. However, some applications request permissions unrela...Show More
Vehicle Ad-hoc Network (VANET) is the main component of the intelligent transportation system. With the development of the next-generation intelligent vehicular networks, the latter aims to provide strategic and secure services and communications in roads and smart cities. Due to VANET’s unique characteristics, such as high mobility of its nodes, self-organization, distributed network, and frequen...Show More
Attacks against the IoT network are increasing rapidly, leading to an exponential growth in the number of unsecured IoT devices. Existing security mechanisms are facing several issues due to the lack of real-time decisions, high energy consumption, and high time delays. In this context, we propose a novel Low-Latency Fog-based Framework, called FogFed, to secure IoT applications using Fog computin...Show More
Software-defined network (SDN) is widely deployed on Smart Grid (SG) systems. It consists in decoupling control and data planes, to automate the monitoring and management of the communication network, and thus enabling zero touch management of SG systems. However, SDN-based SG is prone to several security threats and varios type of new attacks. To alleviate these issues, various Machine/Deep learn...Show More
In recent years, there has been a huge demand to secure Internet of Things (IoT) applications against the new emerging threats and attacks; these attacks are becoming increasingly sophisticated and have caused tremendous damage to academic and business organizations. Intrusion detection systems (IDS) have an essential role in ensuring network security. As new types of security threats emerge, conv...Show More
Internet of Things (IoT) is an emerging paradigm that is turning and revolutionizing worldwide cities into smart cities. However, this emergence is accompanied with several cybersecurity concerns due mainly to the data sharing and constant connectivity of IoT networks. To address this problem, multiple Intrusion Detection Systems (IDSs) have been designed as security mechanisms, which showed their...Show More
When cybersecurity is neglected, any network system loses its efficiency, reliability, and resilience. With the huge integration of the Information, Communication and Technology capabilities, the Connected Electric Vehicle (CEV) as a transportation form in cities is becoming more and more efficient and able to reply to citizen and environmental expectations which improve the quality of citizens’ l...Show More