Papers by malika bourenane
Design of a Cross Layer Intrusion Detection System for Mobile Ad Hoc Networks to Mitigate Black Hole Attack
Lecture notes in networks and systems, 2023

A new vision for intrusion detection system in information systems
2015 Science and Information Conference (SAI), 2015
In recent years, information systems have seen an amazing increase in attacks. Intrusion detectio... more In recent years, information systems have seen an amazing increase in attacks. Intrusion detection systems have become the mainstream of information assurance. While firewalls and the two basic systems of cryptography (symmetric and asymmetric) do provide some protection, they do not provide complete protection and still need to be supplemented by an intrusion detection system. Most of the work done on the IDS is based on two approaches; the anomaly approach and misuse approach. Each of these approaches whether they are implemented in HIDS or NIDS have weaknesses. To respond these limitations, we propose a new way of seeing in intrusion detection systems. This vision can be described as follows: "Instead of taking and analyzing each attack separately one from the other (have several signature for each type of attack knowing that there is various attacks and several variant of these attacks) or, instead of analyzing log files of the system, so why not see the consequences of these attacks and try to ensure that the security properties affected by these attacks will not be compromise". To do so, we will take the language which is realized by Jonathan Rouzauld Cornabas to modelize the system's entities to protect. This paper represents only the idea on which we will base on, in order to design an effective IDS in the operating system running in user space.

State-dependent packet scheduling for QoS routing in a dynamically changing environment
Telecommunication Systems, Aug 4, 2009
The packet scheduling in router plays an important role in the sense to achieve QoS differentiati... more The packet scheduling in router plays an important role in the sense to achieve QoS differentiation and to optimize the queuing delay, in particular when this optimization is accomplished on all routers of a path between source and destination. In a dynamically changing environment a good scheduling discipline should be also adaptive to the new traffic conditions. We model this problem as a multi-agent system in which each agent learns through continual interaction with the environment in order to optimize its own behaviour. So, we adopt the framework of Markov decision processes applied to multi-agent system and present a pheromone-Q learning approach which combines the Q-multi-learning technique with a synthetic pheromone that acts as a communication medium speeding up the learning process of cooperating agents.

Journal of intelligent systems, 2023
An intrusion detection system plays an essential role in system security by discovering and preve... more An intrusion detection system plays an essential role in system security by discovering and preventing malicious activities. Over the past few years, several research projects on host-based intrusion detection systems (HIDSs) have been carried out utilizing the Australian Defense Force Academy Linux Dataset (ADFA-LD). These HIDS have also been subjected to various algorithm analyses to enhance their detection capability for high accuracy and low false alarms. However, less attention is paid to the actual implementation of real-time HIDS. Our principal objective in this study is to create a performant real-time HIDS. We propose a new model, "Better Similarity Algorithm for Host-based Intrusion Detection System" (BSA-HIDS), using the same dataset ADFA-LD. The proposed model uses three classifications to represent the attack folder according to certain criteria, the entire system call sequence is used. Furthermore, this work uses textual distance and compares five algorithms like Levenshtein, Jaro-Winkler, Jaccard, Hamming, and Dice coefficient, to classify the system call trace as attack or non-attack based on the notions of interclass decoupling and intra-class coupling. The model can detect zero-day attacks because of the threshold definition. The experimental results show a good detection performance in real-time for Levenshtein/Jaro-Winkler algorithms, 99-94% in detection rate, 2-5% in false alarm rate, and 3,300-720 s in running time, respectively.

Journal of intelligent systems, 2022
Policy Interaction Graph Analysis is a Host-based Intrusion Detection tool that uses Linux MAC Ma... more Policy Interaction Graph Analysis is a Host-based Intrusion Detection tool that uses Linux MAC Mandatory access control policy to build the licit information flow graph and uses a detection policy defined by the administrator to extract illicit behaviour from the graph. The main limitation of this tool is the generation of a huge signature base of illicit behaviours; hence, this leads to the use of huge memory space to store it. Our primary goal in this article is to reduce this memory space while keeping the tool's efficiency in terms of intrusion detection rate and false generated alarms. First, the interactions between the two nodes of the graph were grouped into a single interaction. The notion of equivalence class was used to classify the paths in the graph and was compressed by using a genetic algorithm. Such an approach showed its efficiency compared to the approach proposed by Pierre Clairet, by which the detection rate obtained was 99.9%, and no false-positive with a compression rate of illicit behaviour signature database reached 99.44%. Having these results is one of the critical aspects of realizing successful host-based intrusion detection systems.

Applied Sciences
Dynamic adaptive video streaming over HTTP (DASH) plays a crucial role in delivering video across... more Dynamic adaptive video streaming over HTTP (DASH) plays a crucial role in delivering video across networks. Traditional adaptive bitrate (ABR) algorithms adjust video segment quality based on network conditions and buffer occupancy. However, these algorithms rely on fixed rules, making it challenging to achieve optimal decisions considering the overall context. In this paper, we propose a novel deep-reinforcement-learning-based approach for DASH streaming, with the primary focus of maintaining consistent perceived video quality throughout the streaming session to enhance user experience. Our approach optimizes quality of experience (QoE) by dynamically controlling the quality distance factor between consecutive video segments. We evaluate our approach through a comprehensive simulation model encompassing diverse wireless network environments and various video sequences. We also conduct a comparative analysis with state-of-the-art methods. The experimental results demonstrate signifi...
Mobile Ad Hoc Networks U sing Reinforcement learning approach
This paper presents an adaptive scheduling scheme for quality of service (QoS) provisioning in wi... more This paper presents an adaptive scheduling scheme for quality of service (QoS) provisioning in wireless ad hoc networks. Our proposed scheme models the environment as a Markov Decision Process and uses a reinforcement learning technique that considers, in occurrence of collisions, maximizing the throughput and minimizing the average transmission energy in a wireless environment, by taking into account the channel conditions.

Simulation of an Adaptive video streaming based-user control using TCP parameters
On the last few years, Media streaming services over TCP have become very popular because TCP’s c... more On the last few years, Media streaming services over TCP have become very popular because TCP’s congestion control provides remarkable stability to the Internet. To offer a high quality of Media and also a good user satisfaction, the media streaming service requires the adaptation of the bandwidth availability and other network parameters. Nowadays the streaming video can be projected on different kinds of terminal as tablet, smart phones, laptop....etc. Each user (device) has its own characteristics and parameters which must be taken in consideration on the video streaming adaptation process. The classic Adaptive video streaming services do not take in consideration the user parameters on the adaptation process. In this paper we propose an adaptive video streaming solution to improve the user satisfaction factor by adapting TCP parameters according to the user parameters on mobile networks. The user satisfaction factor is calculated according to the quality of experience (QoE) meth...
Adaptive scheduling in mobile ad hoc networks using reinforcement learning approach
2011 International Conference on Innovations in Information Technology, 2011
ABSTRACT This paper presents an adaptive scheduling scheme for quality of service (QoS) provision... more ABSTRACT This paper presents an adaptive scheduling scheme for quality of service (QoS) provisioning in wireless ad hoc networks. Our proposed scheme models the environment as a Markov Decision Process and uses a reinforcement learning technique that considers, in occurrence of collisions, maximizing the throughput and minimizing the average transmission energy in a wireless environment, by taking into account the channel conditions.
2009 IEEE Symposium on Computers and Communications, 2009
This paper describes an approach which uses a machine learning model in a packet scheduling probl... more This paper describes an approach which uses a machine learning model in a packet scheduling problem to improve the end-to-end delay. A good Packet scheduling discipline allows to achieve QoS differentiation and to optimize the queuing delay. In a dynamically changing environment this discipline should be also adaptive to the new traffic conditions. We model this problem as a multi-agent system which consists ofa whole ofautonomous learning agents that interact with the environment. We define the learning problem as a decentralized process using a general mathematical framework, namely Markovian Decision Processes which are an effective tool in the modelling of the decision-making in uncertain dynamic environments. Coordination between agents occurs through communication governed by an ant colony model.
There are many medium access control (MAC) protocols proposed to achieve fairness in presence of ... more There are many medium access control (MAC) protocols proposed to achieve fairness in presence of hidden and/or exposed nodes. In [2] a general approach to address the propblem of fairness is proposed. This approach defines a fairness index and the goal is to minimize this fairness index to achieve fairness. in this paper we propose a fairness index by taking into account both node’s data traffic and routed data traffic of the other nodes for each node and we can easily verify that the fairness index defined in this paper is always lower or equal to the fairness index defined in [2].

International Journal of Computing and Digital Systems, 2018
With the emergence of time-sensitive applications such as games and telephony, the introduction o... more With the emergence of time-sensitive applications such as games and telephony, the introduction of the Quality of Service (QoS) in general and the improvement of transmission delays in particular have become a must in wireless networks. The distributed coordination function (DCF) being the fundamental access method and the basis of the wireless LANs IEEE 802.11 MAC protocol, a great number of works have been done to improve it. In DCF, after sensing an idle channel, stations have to wait before the transmission of each frame a length of time called DIFS (DCF Inter Frame Space) followed by another called back-off. If the medium becomes busy during the back-off process, the back-off timer is paused and resumed when the medium is sensed free for a DIFS again. This time loss becomes considerable when the number of interruptions of back-off process grows. This paper proposes a contribution to improve DCF by combining IFS and back-off time. The simulation results show that the approach benefits are proportional to the contention level of the network and to the number of hops in multi-hop network topologies.
Logical EDCA: A Novel EDCA mechanism for IEEE 802.11 based Networks
2020 Second International Conference on Embedded & Distributed Systems (EDiS), 2020
This paper proposes a novel Enhanced Distributed Channel Access (EDCA) mechanism for IEEE 802.11 ... more This paper proposes a novel Enhanced Distributed Channel Access (EDCA) mechanism for IEEE 802.11 based networks. It focuses primarily on starvation issues related to low priority flows. Based on mutually exclusive logical functions, a new approach to differentiate flows is used. Each Access Category (AC) has its own logical function that determines whether it has permission to transmit or not. Access is then granted to flows in a deterministic way, taking into account the instantaneous state of the station, and therefore, the network. Logical EDCA has been modelized, implemented and simulated on NS3 Network Simulator. The results are very encouraging.
Outgoing-Flows-Number Based Service Differentiation for Fair and Efficient Medium Access Control in Wireless Ad Hoc Networks
Wireless Personal Communications
Inductive QoS Packet Scheduling for Adaptive Dynamic Networks
2008 Ieee International Conference on Communications, May 19, 2008
Abstract The packet scheduling in routing base station plays an important role in the sense to ac... more Abstract The packet scheduling in routing base station plays an important role in the sense to achieve QoS differentiation and to optimize the queuing delay, in particular when this optimization is accomplished on all base stations of a path between source and ...
TCP based-user control for adaptive video streaming
Multimedia Tools and Applications, 2015
Inductive Approaches for Packet Scheduling in Communication Networks
Focuses, 2014
A cross layer solution to improve TCP performances in Ad Hoc wireless networks
2013 International Conference on Smart Communications in Network Technologies (SaCoNeT), 2013
Differentiated Service Based on Reinforcement Learning in Wireless Networks
Advances in Intelligent Systems and Computing, 2013
Energy-efficient scheduling scheme using reinforcement learning in wireless ad hoc networks
2011 Eighth International Conference on Wireless and Optical Communications Networks, 2011
ABSTRACT In this paper we propose a scheduling scheme in wireless networks based on energy-effici... more ABSTRACT In this paper we propose a scheduling scheme in wireless networks based on energy-efficient retransmission strategy. In our approach, the scheduling algorithm traits specially the neighboring nodes of source which get involved in the retransmission, in order to reduce the consumed energy. We use the Markov Decision Process frameworks to model this problem.
Uploads
Papers by malika bourenane