<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE raweb PUBLIC "-//INRIA//DTD " "raweb2.dtd">
<raweb xml:lang="en" year="2010">
  <identification id="madynes" isproject="true">
    <shortname>madynes</shortname>
    <projectName>Management of dynamic networks and
    services</projectName>
    <domaine-de-recherche>Networks, Systems and Services,
    Distributed Computing</domaine-de-recherche>
    <theme-de-recherche>Networks and
    Telecommunications</theme-de-recherche>
    <UR name="Nancy"/>
  </identification>
  <team id="uid1">
    <person key="madynes-2006-idm72374457424">
      <firstname>Olivier</firstname>
      <lastname>Festor</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Team Leader, Research Director (DR),
      INRIA</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="madynes-2006-idm72374453680">
      <firstname>Isabelle</firstname>
      <lastname>Chrisment</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Professor, ESIAL, Henri Poincaré - Nancy 1
      University</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="calligramme-2006-idm133559971616">
      <firstname>Céline</firstname>
      <lastname>Simon</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Assistant</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Project Assistant, INRIA</moreinfo>
    </person>
    <person key="madynes-2006-idm72374443216">
      <firstname>Laurent</firstname>
      <lastname>Andrey</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Associate Professor, Nancy 2 University</moreinfo>
    </person>
    <person key="madynes-2006-idm72374419456">
      <firstname>Rémi</firstname>
      <lastname>Badonnel</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Associate Professor, ESIAL, Henri Poincaré - Nancy
      1 University</moreinfo>
    </person>
    <person key="madynes-2006-idm72374440480">
      <firstname>Laurent</firstname>
      <lastname>Ciarletta</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Associate Professor, ENSMN - Lorraine National
      Polytechnic Institute</moreinfo>
    </person>
    <person key="madynes-2010-idm163901556320">
      <firstname>Abdelkader</firstname>
      <lastname>Lahmadi</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Associate Professor, ENSEM - Lorraine National
      Polytechnic Institute</moreinfo>
    </person>
    <person key="madynes-2006-idm72374434624">
      <firstname>Emmanuel</firstname>
      <lastname>Nataf</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Associate Professor, Nancy 2 University</moreinfo>
    </person>
    <person key="madynes-2006-idm72374431984">
      <firstname>André</firstname>
      <lastname>Schaff</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Professor, ESIAL,Henri Poincaré - Nancy 1
      University</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="madynes-2006-idm72374425456">
      <firstname>Frédéric</firstname>
      <lastname>Beck</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Technique</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Engineer, Industrial grant (-11/2010)</moreinfo>
    </person>
    <person key="madynes-2010-idm163901543568">
      <firstname>Alexandre</firstname>
      <lastname>Boeglin</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Technique</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Engineer, Industrial grant</moreinfo>
    </person>
    <person key="madynes-2010-idm163901540512">
      <firstname>Jérôme</firstname>
      <lastname>Fran cois</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Technique</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Research Engineer, Industrial grant
      (-03/2010)</moreinfo>
    </person>
    <person key="madynes-2006-idm72374408832">
      <firstname>Mohamed</firstname>
      <lastname>Nassar</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Technique</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Research Engineer, Industrial grant</moreinfo>
    </person>
    <person key="madynes-2010-idm163901534320">
      <firstname>Humberto</firstname>
      <lastname>Abdelnur</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Technique</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Research Engineer, Industrial grant
      (-09/2010)</moreinfo>
    </person>
    <person key="madynes-2010-idm163901531232">
      <firstname>Cyril</firstname>
      <lastname>Auburtin</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Technique</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Engineer, Industrial grant</moreinfo>
    </person>
    <person key="madynes-2008-idm507633090576">
      <firstname>Sheila</firstname>
      <lastname>Becker</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Co-tutelle with University of Luxembourg (10/2008-
      )</moreinfo>
    </person>
    <person key="madynes-2006-idm72374388848">
      <firstname>Thibault</firstname>
      <lastname>Cholez</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Industrial grant with regional co-sponsoship
      (10/2007- )</moreinfo>
    </person>
    <person key="madynes-2009-idm231958288896">
      <firstname>Oussema</firstname>
      <lastname>Dabbebi</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Industrial grant (10/2009- )</moreinfo>
    </person>
    <person key="madynes-2007-idm860520384">
      <firstname>Tom</firstname>
      <lastname>Leclerc</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Industrial grant with regional co-sponsoship
      (10/2007- )</moreinfo>
    </person>
    <person key="madynes-2007-idm860523488">
      <firstname>Julien</firstname>
      <lastname>Siebert</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>MADYNES-MAIA cooperation. Industrial grant with
      regional co-sponsoship (10/2007- )</moreinfo>
    </person>
    <person key="madynes-2009-idm231957303456">
      <firstname>Juan Pablo</firstname>
      <lastname>Timpanaro</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Industrial grant with regional co-sponsoship
      (01/2010- )</moreinfo>
    </person>
    <person key="madynes-2007-idm860494368">
      <firstname>Gérard</firstname>
      <lastname>Wagener</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Co-tutelle with University of Luxembourg (10/2007-
      )</moreinfo>
    </person>
  </team>
  <presentation id="uid2">
    <bodyTitle>Overall Objectives</bodyTitle>
    <subsection id="uid3" level="1">
      <bodyTitle>Introduction</bodyTitle>
      <p>The goal of the MADYNES research group is to design, to
      validate and to deploy novel management and security
      paradigms together with supporting software architectures and
      solutions that are able to cope with the growing dynamicity
      and the scalability issues induced by the ubiquitous
      Internet.</p>
      <p>The project develops applied research activities in the
      following areas :</p>
      <simplelist>
        <li id="uid4">
          <p noindent="true"><b>Autonomous Management</b>:</p>
          <simplelist>
            <li id="uid5">
              <p noindent="true">the design of models and methods
              enabling 
              <b>self organization and self-management</b>of
              networked entities and services,</p>
            </li>
            <li id="uid6">
              <p noindent="true">the evaluation of management
              architectures based on 
              <b>peer-to-peer and overlay principles</b>,</p>
            </li>
            <li id="uid7">
              <p noindent="true">the investigation of novel
              approaches to the representation of 
              <b>management information</b>,</p>
            </li>
            <li id="uid8">
              <p noindent="true">the modeling and 
              <b>performance evaluation</b>of management
              infrastructures and activities.</p>
            </li>
          </simplelist>
        </li>
        <li id="uid9">
          <p noindent="true"><b>Functional Areas</b>instanciate autonomous management
          functions :</p>
          <simplelist>
            <li id="uid10">
              <p noindent="true">the 
              <b>security plane</b>where we focus on buidling
              closed-loop approaches to protect networking
              assets,</p>
            </li>
            <li id="uid11">
              <p noindent="true">the 
              <b>service configuration</b>where we aim at providing
              solutions covering the delivery chain from discovery
              to delivery in dynamic networks,</p>
            </li>
            <li id="uid12">
              <p noindent="true"><b>monitoring</b>where we aim at building solutions
              to characterize and detect unwanted service
              behaviour.</p>
            </li>
          </simplelist>
        </li>
      </simplelist>
      <p>The next generation Internet is the main application field
      of our research. Its architecture and the services that it is
      planned to support offer all dynamic and scalability features
      that we address in the complementary research directions of
      the project.</p>
    </subsection>
    <subsection id="uid13" level="1">
      <bodyTitle>Highlights</bodyTitle>
      <p>In addition to the great scietnific achievements thatw ill
      be presented in the results section of this report, we had
      two major highlights this year.</p>
      <p>The first one is the official inauguration of the High
      Security Laboratory in the INRIA Nancy Grand Est premises.
      The team was highly involved in the setup of this lab for
      which we did design, deploy and now operate the whole network
      probes and data collection infrastructure 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid0" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. The lab is now running for
      about a year collecting more than 14.000 malwares a day,
      hosting several long term experiments (MAPE project P2P
      monitoring, High-interaction honeypots in cooperation with
      the university of Luxemburg, Voice-over-IP probes with the
      VAMPIRE project).</p>
      <p>The second major achievement of 2010 is the successful
      completion of the EMANICS Network of Excellence in may 2010.
      EMANICS which we managed over the last four years was, for
      the fourth year in a row awarded by the european commission
      as an outstanding project and put forward as an example of
      what a network of excellence should be. The network made
      numerous achievements in joint research, integration,
      dissemination and setup of joint testbeds.</p>
    </subsection>
  </presentation>
  <fondements id="uid14">
    <bodyTitle>Scientific Foundations</bodyTitle>
    <subsection id="uid15" level="1">
      <bodyTitle>Evolutionary needs in network and service
      management</bodyTitle>
      <p>The foundation of the MADYNES research activity is the
      ever increasing need for automated monitoring and control
      within networked environments. This need is mainly due to the
      increasing dependency of both people and goods towards
      communication infrastructures as well as the growing demand
      towards services of higher quality. Because of its strategic
      importance and crucial requirements for interoperability, the
      management models were constructed in the context of strong
      standardization activities by many different organizations
      over the last 15 years. This has led to the design of most of
      the paradigms used in today's deployed approaches. These
      paradigms are the Manager/Agent interaction model, the
      Information Model paradigm and its container, together with a
      naming infrastructure called the Management Information Base.
      In addition to this structure, five functional areas known
      under the FCAPS 
      <footnote id="uid16" id-text="1">Fault, Configuration,
      Accounting, Performance and Security</footnote>acronym are
      associated to these standards.</p>
      <p>While these models were well suited for the specific
      application domains for which they were designed
      (telecommunication networks or dedicated protocol stacks),
      they all show the same limits. Especially they are
      unable:</p>
      <orderedlist>
        <li id="uid17">
          <p noindent="true">to deal with any form of dynamicity in
          the managed environment,</p>
        </li>
        <li id="uid18">
          <p noindent="true">to master the complexity, the
          operating mode and the heterogeneity of the emerging
          services,</p>
        </li>
        <li id="uid19">
          <p noindent="true">to scale to new networks and service
          environments.</p>
        </li>
      </orderedlist>
      <p>These three limits are observed in all five functional
      areas of the management domain (fault, configuration,
      accounting, performance and security) and represent the major
      challenges when it comes to enable effective automated
      management and control of devices, networks and services in
      the next decade.</p>
      <p>MADYNES addresses these challenges by focusing on the
      design of management models that rely on inherently dynamic
      and evolving environments. The project is centered around two
      core activities. These activities are, as mentioned in the
      previous section, the design of an autonomous management
      framework and its application to three of the standard
      functional areas namely security, configuration and
      performance.</p>
    </subsection>
    <subsection id="uid20" level="1">
      <bodyTitle>Autonomous management</bodyTitle>
      <subsection id="uid21" level="2">
        <bodyTitle>
          <b>Models and methods for a self-management plane</b>
        </bodyTitle>
        <p>Self organization and automation are fundamental
        requirements within the management plane in today's dynamic
        environments. It is necessary to automate the management
        processes and enable management frameworks to operate in
        time sensitive evolving networks and service environments.
        The automation of the organization of devices, software
        components, networks and services is investigated in many
        research projects and has already led to several solution
        proposals. While these proposals are successful at several
        layers, like IP auto-configuration or service discovery and
        binding facilities, they did not enhance the management
        plane at all. For example, while self-configuration of IP
        devices is commonplace, no solution exists that provides
        strong support to the management plane to configure itself
        (e.g. finding the manager to which an agent has to send
        traps or organizing the access control based on locality or
        any other context information). So, this area represents a
        major challenge in extending current management approaches
        so that they become self-organized.</p>
        <p>Our approach is bottom-up and consists in identifying
        those parameters and framework elements (manager data,
        information model sharing, agent parameters, protocol
        settings, ...) that need dynamic configuration and
        self-organization (like the address of a trap sink). For
        these parameters and their instantiation in various
        management frameworks (SNMP, Netconf, WBEM, ...), we
        investigate and elaborate novel approaches enabling fully
        automated setup and operation in the management plane.</p>
      </subsection>
      <subsection id="uid22" level="2">
        <bodyTitle>
          <b>Design and evaluation of P2P-based management
          architectures</b>
        </bodyTitle>
        <p>Over the last years, several models have emerged and
        gained wide acceptance in the networking and service world.
        Among them, the overlay networks together with the P2P
        paradigms appear to be very promising. Since they rely
        mainly on fully decentralized models, they offer excellent
        fault tolerance and have a real potential to achieve high
        scalability. Mainly deployed in the content delivery and
        the cooperation and distributed computation disciplines,
        they seem to offer all features required by a management
        framework that needs to operate in a dynamic world. This
        potential however needs an in depth investigation because
        these models have also many characteristics that are
        unusual in management (e.g. a fast and uncontrolled
        evolution of the topology or the existence of a distributed
        trust relationship framework rather than a standard
        centralized security framework).</p>
        <p>Our approach envisions how a complete redesign of a
        management framework is done given the characteristics of
        the underlying P2P and overlay services. Among the topics
        of interest we study the concept of management information
        and operations routing within a management overlay as well
        as the distribution of management functions in a
        multi-manager/agent P2P environment. The functional areas
        targeted in our approach by the P2P model are network and
        service configuration and distributed monitoring. The
        models are to be evaluated against highly dynamic
        frameworks such as ad-hoc environments (network or
        application level) and mobile devices.</p>
      </subsection>
      <subsection id="uid23" level="2">
        <bodyTitle>
          <b>Integration of management information</b>
        </bodyTitle>
        <p>Representation, specification and integration of
        management information models form a foundation for network
        and service management and remains an open research domain.
        The design and specification of new models is mainly driven
        by the appearance of new protocols, services and usage
        patterns. These need to be managed and exposed through well
        designed management information models. Integration
        activities are driven by the multiplication of various
        management approaches. To enable automated management,
        these approaches need to inter-operate which is not the
        case today.</p>
        <p>The MADYNES approach to this problem of modelling and
        representation of management information aims at:</p>
        <orderedlist>
          <li id="uid24">
            <p noindent="true">enabling application developers to
            establish their management interface in the same
            workspace, with the same notations and concepts as the
            ones used to develop their application,</p>
          </li>
          <li id="uid25">
            <p noindent="true">fostering the use of standard models
            (at least the structure and semantics of well defined
            models),</p>
          </li>
          <li id="uid26">
            <p noindent="true">designing a naming structure that
            allows the routing of management information in an
            overlay management plane, and</p>
          </li>
          <li id="uid27">
            <p noindent="true">evaluating new approaches for
            management information integration especially based on
            management ontologies and semantic information
            models.</p>
          </li>
        </orderedlist>
      </subsection>
      <subsection id="uid28" level="2">
        <bodyTitle>
          <b>Modeling and benchmarking of management
          infrastructures and activities</b>
        </bodyTitle>
        <p>The impact of a management approach on the efficiency of
        the managed service is highly dependent on three
        factors:</p>
        <simplelist>
          <li id="uid29">
            <p noindent="true">the distribution of the considered
            service and their associated management tasks,</p>
          </li>
          <li id="uid30">
            <p noindent="true">the management patterns used (e.g.
            monitoring frequency, granularity of the management
            information considered),</p>
          </li>
          <li id="uid31">
            <p noindent="true">the cost in terms of resources these
            considered functions have on the managed element (e.g.
            method call overhead, management memory footprint).</p>
          </li>
        </simplelist>
        <p>While the first factor was investigated in several
        research projects so far, none of the other two were
        investigated at all. The lack of such benchmarking data and
        models simply makes the objective evaluation of the
        operational costs of a management approach impossible. This
        may be acceptable in backbone networks where processing and
        communication resources can be tuned very easily (albeit
        sometimes at a non negligible cost). This is not true in
        constrained environments like devices constrained by
        battery or processing power as found in wireless networks
        for which the lack of management cost models is a serious
        concern.</p>
        <p>MADYNES addresses this problem from multiple viewpoints:
        communication patterns, processing and memory resources
        consumption. Our goal is to provide management patterns
        combining several management technologies if needed so as
        to optimize the resources consumed by the management
        activity imposed by the operating environment.</p>
        <p>Therefore, we establish 
        <i>abacuses</i>for management frameworks and in parallel we
        collect data on current management practice. These data
        will form the core of the “Constraints-based management
        tuning activity” that we are working on and can be used for
        rigorous comparison among distribution and processing of
        management activities.</p>
      </subsection>
    </subsection>
    <subsection id="uid32" level="1">
      <bodyTitle>Functional areas</bodyTitle>
      <subsection id="uid33" level="2">
        <bodyTitle>
          <b>Security management</b>
        </bodyTitle>
        <p>Securing the management plane is vital. While several
        proposals are already integrated in the existing management
        frameworks, they are rarely used. This is due to the fact
        that these approaches are completely detached from the
        enterprise security framework. As a consequence, the
        management framework is “managed” separately with different
        models; this represents a huge overhead. Moreover the
        current approaches to security in the management plane are
        not inter-operable at all, multiplying the operational
        costs in a heterogeneous management framework.</p>
        <p>The primary goal of the research in this activity is the
        design and the validation of a security framework for the
        management plane that will be open and capable to integrate
        the security services provided in today's management
        architectures. Management security interoperability is of
        major importance in this activity.</p>
        <p>Our activity in this area aims at designing a generic
        security model in the context of multi-party /
        multi-technology management interactions. Therefore, we
        develop research on the following directions:</p>
        <orderedlist>
          <li id="uid34">
            <p noindent="true">Abstraction of the various access
            control mechanisms that exist in today's management
            frameworks. We are particularly interested in extending
            these models so that they support event-driven
            management, which is not the case for most of them
            today.</p>
          </li>
          <li id="uid35">
            <p noindent="true">Extension of policy and trust models
            to ease and to ensure coordination among managers
            towards one agent or a subset of the management tree.
            Provisional policies are of great interest to us in
            this context.</p>
          </li>
          <li id="uid36">
            <p noindent="true">Evaluation of the adequacy of key
            distribution architectures to the needs of the
            management plane as well as selecting reputation models
            to be used in the management of highly dynamic
            environments (e.g. multicast groups, ad-hoc
            networks).</p>
          </li>
        </orderedlist>
        <p>A strong requirement towards the future generic model is
        that it needs to be instantiated (with potential
        restrictions) into standard management platforms like SNMP,
        WBEM or Netconf and to allow interoperability in
        environments where these approaches coexist and even
        cooperate. A typical example of this is the security of an
        integration agent which is located in two management
        worlds.</p>
        <p>Since 2006 we have also started an activity on security
        assessment. The objective is to investigate new methods and
        models for validating the security of large scale dynamic
        networks and services. The first targeted service is
        VoIP.</p>
      </subsection>
      <subsection id="uid37" level="2">
        <bodyTitle>
          <b>Configuration: automation of service configuration and
          provisioning</b>
        </bodyTitle>
        <p>Configuration covers many processes which are all
        important to enable dynamic networks. Within our research
        activity, we focus on the operation of tuning the
        parameters of a service in an automated way. This is done
        together with the activation topics of configuration
        management and the monitoring information collected from
        the underlying infrastructure. Some approaches exist today
        to automate part of the configuration process (download of
        a configuration file at boot time within a router, on
        demand code deployment in service platforms). While these
        approaches are interesting they all suffer from the same
        limits, namely:</p>
        <orderedlist>
          <li id="uid38">
            <p noindent="true">they rely on specific service life
            cycle models,</p>
          </li>
          <li id="uid39">
            <p noindent="true">they use proprietary interfaces and
            protocols.</p>
          </li>
        </orderedlist>
        <p noindent="true">These two basic limits have high impacts
        on service dynamics in a heterogeneous environment.</p>
        <p>We follow two research directions in the topic of
        configuration management. The first one aims at
        establishing an abstract life-cycle model for either a
        service, a device or a network configuration and to
        associate with this model a generic command and programming
        interface. This is done in a way similar to what is
        proposed in the area of call control in initiatives such as
        Parlay or OSA.</p>
        <p>In addition to the investigation of the life-cycle
        model, we work on technology support for distributing and
        exchanging configuration management information.
        Especially, we investigate policy-driven approaches for
        representing configurations and constraints while we study
        XML-based protocols for coordinating distribution and
        synchronization. Off and online validation of configuration
        data is also part of this effort.</p>
      </subsection>
      <subsection id="uid40" level="2">
        <bodyTitle>
          <b>Performance and availability monitoring</b>
        </bodyTitle>
        <p>Performance management is one of the most important and
        deployed management function. It is crucial for any service
        which is bound to an agreement about the expected delivery
        level. Performance management needs models, metrics,
        associated instrumentation, data collection and aggregation
        infrastructures and advanced data analysis algorithms.</p>
        <p>Today, a programmable approach for end-to-end service
        performance measurement in a client server environment
        exists. This approach, called Application Response
        Measurement (ARM) defines a model including an abstract
        definition of a unit of work and related performance
        records; it offers an API to application developers which
        allows easy integration of measurement within their
        distributed application. While this approach is
        interesting, it is only a first step toward the automation
        of performance management.</p>
        <p>We are investigating two specific aspects. First we are
        working on the coupling and possible automation of
        performance measurement models with the upper service level
        agreement and specification levels. Second we are working
        on the mapping of these high level requirements to the
        lower level of instrumentation and actual data collection
        processes available in the network. More specifically we
        are interested in providing automated mapping of service
        level parameters to monitoring and measurement
        capabilities. We also envision automated deployment and/or
        activation of performance measurement sensors based on the
        mapped parameters. This activity also incorporates
        self-instrumentation (and when possible on the fly
        instrumentation) of software components for performance
        monitoring purpose.</p>
      </subsection>
    </subsection>
  </fondements>
  <domaine id="uid41">
    <bodyTitle>Application Domains</bodyTitle>
    <subsection id="uid42" level="1">
      <bodyTitle>Mobile, ad-hoc and constrained
      networks</bodyTitle>
      <p>The results coming out from MADYNES can be applied to any
      dynamic infrastructure that contributes to the delivery of
      value added services. While this is a potentially huge
      application domain, we focus on the following environments at
      the network level:</p>
      <orderedlist>
        <li id="uid43">
          <p noindent="true">multicast services,</p>
        </li>
        <li id="uid44">
          <p noindent="true">ad-hoc networks,</p>
        </li>
        <li id="uid45">
          <p noindent="true">mobile devices and IPv6 networks,</p>
        </li>
        <li id="uid46">
          <p noindent="true">voice over IP infrastructure.</p>
        </li>
      </orderedlist>
      <p>All these selected application areas exhibit different
      dynamicity features. In the context of multicast services, we
      focus on distribution, monitoring and accounting of key
      distribution protocols. On 
      <i>ad -hoc</i>and dynamic networks we are investigating the
      provisioning, monitoring, configuration and performance
      management issues.</p>
      <p>Concerning mobile devices, we are interested in their
      configuration, provisioning and monitoring. IPv6 work goes on
      in Information Models and, combined with SNMPv3, on
      self-configuration of the agents.</p>
    </subsection>
    <subsection id="uid47" level="1">
      <bodyTitle>Dynamic service infrastructures</bodyTitle>
      <p>At the service level, dynamics is also increasing very
      fast. We apply the results of our work on autonomous
      management on infrastructures which support dynamic
      composition and for which self-instrumentation and management
      automation is required.</p>
      <p>The target service environments are:</p>
      <simplelist>
        <li id="uid48">
          <p noindent="true">Voice over IP networks,</p>
        </li>
        <li id="uid49">
          <p noindent="true">peer-to-peer infrastructures,</p>
        </li>
        <li id="uid50">
          <p noindent="true">ambiant environments.</p>
        </li>
      </simplelist>
    </subsection>
  </domaine>
  <logiciels id="uid51">
    <bodyTitle>Software</bodyTitle>
    <subsection id="uid52" level="1">
      <bodyTitle>KiF: an advanced protocol fuzzing
      framework</bodyTitle>
      <participants>
        <person key="madynes-2006-idm72374443216">
          <firstname>Laurent</firstname>
          <lastname>Andrey</lastname>
        </person>
        <person key="madynes-2010-idm163901534320">
          <firstname>Humberto</firstname>
          <lastname>Abdelnur</lastname>
          <moreinfo>contact</moreinfo>
        </person>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
        </person>
        <person key="madynes-2010-idm163901556320">
          <firstname>Abdelkader</firstname>
          <lastname>Lahmadi</lastname>
        </person>
      </participants>
      <p>KiF 
      <footnote id="uid53" id-text="2"><ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://kif.gforge.inria.fr/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
        <allowbreak/>kif. 
        <allowbreak/>gforge. 
        <allowbreak/>inria. 
        <allowbreak/>fr/ 
        <allowbreak/></ref></footnote>is an advance protocol fuzzer developed by the
      team. The tool builds on novel algorithms to make stateful,
      in depth fuzzing of remote devices. In its current version,
      it offers stateful fuzzing for Voice Over IP systems using
      the SIP signalling protocol. It offers smart fuzzing using
      either on the fly data generation or using pre-generated test
      suites to enable performant fuzzed messages issuance. The
      environment also enables easy specification, addition and
      execution of new fuzzing scenarios.</p>
      <p>The tool is entirely developed in Python. The current
      distribution is provided as a fully pre-installed and running
      framework packaged in a VMware image.</p>
      <p>As of today, a dozen companies and universities signed the
      NDA and are actively using the KiF framework. More details on
      KIF can be found on the environment's web site 
      <footnote id="uid54" id-text="3"><ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://kif.gforge.inria.fr" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
        <allowbreak/>kif. 
        <allowbreak/>gforge. 
        <allowbreak/>inria. 
        <allowbreak/>fr</ref></footnote>.</p>
      <p>In 2010, we added several capabilities to KiF including
      new protocols support : HTTP, DNS and DHCP. We have also
      enriched the feedback loop by remote instrumentation : mtrace
      and Javascript-aware mtracing. The GUI of KIF was also
      heavily improved.</p>
      <p>Despite the large availability of Open source fuzzers and
      fuzzing frameworks and despite the recent announce made by
      the CERT regarding the Open Source distribution of a fuzzing
      framework, our request to make KIF freely available was
      refused by the industrial relationships department of INRIA.
      This decision to prevent us from distributing the software in
      the same conditions as the competitors had two direct
      impacts: (1) the community of developers we built around KiF
      decided to suspend their contribution and (2) some industrial
      partners in joint projects decided to move to 3rd party open
      source frameworks, despite the power gap between KiF and its
      competition. KiF remains today the most powerful fuzzer on
      the market but given the distribution constraints imposed by
      our administration, we had to suspend the developments on the
      framework until further notice.</p>
    </subsection>
    <subsection id="uid55" level="1">
      <bodyTitle>Voip bots</bodyTitle>
      <participants>
        <person key="madynes-2006-idm72374408832">
          <firstname>Mohamed</firstname>
          <lastname>Nassar</lastname>
          <moreinfo>contact</moreinfo>
        </person>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
        </person>
      </participants>
      <p>VoIPbot is a VoIP security tool created as a demonstrator
      of how attacks can be launched against VoIP/SIP services and
      users in a remotely and distributed manner. The environment
      contains bots that can be remotely managed over an Internet
      Relay Chat (IRC) channel from a cental manager. Our bots are
      currently able to perform the following tasks :</p>
      <simplelist>
        <li id="uid56">
          <p noindent="true">send SPAM over IP Telephony
          (SPIT),</p>
        </li>
        <li id="uid57">
          <p noindent="true">distributed denial of service through
          intensive generation of invite messages to a target
          device,</p>
        </li>
        <li id="uid58">
          <p noindent="true">active scanning of users through
          incremental options messages issuance to servers and
          response analysis,</p>
        </li>
        <li id="uid59">
          <p noindent="true">cracking through brute-force testing
          of passwords against an identified user account,</p>
        </li>
        <li id="uid60">
          <p noindent="true">simple device scanning and
          fingerprinting,</p>
        </li>
        <li id="uid61">
          <p noindent="true">target aware device fuzzing.</p>
        </li>
      </simplelist>
      <p>The tool is developed using the Java programming language.
      It uses the JAIN-SIP, JMF and PIRCBOT libraries. The tool is
      distributed under a GPL2 Open Source license. Reports show
      its use mainly in the testing business so far.</p>
    </subsection>
    <subsection id="uid62" level="1">
      <bodyTitle>SecSIP</bodyTitle>
      <participants>
        <person key="madynes-2010-idm163901556320">
          <firstname>Abdelkader</firstname>
          <lastname>Lahmadi</lastname>
          <moreinfo>contact</moreinfo>
        </person>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
        </person>
      </participants>
      <p><i>SecSip</i><footnote id="uid63" id-text="4"><ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://secsip.gforge.inria.fr/doku.php" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
        <allowbreak/>secsip. 
        <allowbreak/>gforge. 
        <allowbreak/>inria. 
        <allowbreak/>fr/ 
        <allowbreak/>doku. 
        <allowbreak/>php</ref></footnote>is developed by the team to defend SIP-based (The
      Session Initiation Protocol) services from known
      vulnerabilities. It presents a proactive point of defense
      between a SIP-based network of devices (servers, proxies,
      user agents) and the open Internet. Therefore, all SIP
      traffic is inspected and analyzed against authored Veto
      specification before it is forwarded to these devices. When
      initializing, the SecSIP runtime starts loading and parsing
      authored VeTo blocks to identify different variables, event
      patterns, operations and actions from each rule. It
      implements an input and output layer, to capture, inject,
      send and receive SIP packets from and to the network.
      Intercepted packets are moved to the SIP Packet parser
      module. The main function of this module is to extract
      different fields within a SIP message and trigger events
      specified within the definition blocks. During each execution
      cycle when a SIP message arrives, the SecSIP runtime uses a
      data flow acyclic graph network to find definition matching
      rules and triggers defined events. The paired events in each
      operator node are propagated over the graph until a pattern
      is satisfied. When the pattern is satisfied, the respective
      rule is fired and the set of actions is executed.</p>
      <p>In 2010 we have finalized the development of the
      framework. We have extended the execution engine and the
      language and have built a complete management interface to
      the environment. This interface offers both NETCONF and
      Web-based configuration of the service.</p>
    </subsection>
    <subsection id="uid64" level="1">
      <bodyTitle>NDPMon</bodyTitle>
      <participants>
        <person key="madynes-2006-idm72374425456">
          <firstname>Frédéric</firstname>
          <lastname>Beck</lastname>
          <moreinfo>contact</moreinfo>
        </person>
        <person key="madynes-2006-idm72374453680">
          <firstname>Isabelle</firstname>
          <lastname>Chrisment</lastname>
        </person>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
        </person>
        <person key="madynes-2006-idm72374388848">
          <firstname>Thibault</firstname>
          <lastname>Cholez</lastname>
        </person>
      </participants>
      <p>The Neighbor Discovery Protocol Monitor ( 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://ndpmon.sf.net" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">NDPMon</ref>) is an IPv6
      implemention of the well-known ArpWatch tool. NDPMon monitors
      the pairing between IPv6 and Ethernet addresses (NDP
      activities: new station, changed Ethernet address, flip
      flop...). NDPMon also detects attacks on the NDP protocol, as
      defined in RFC 3756 (bogon, fake Router Advertisements...).
      New attacks based on the Neighbor Discovery Protocol and
      Address Auto-configuration (RFC 2461 and RFC 2462) have been
      identified and integrated in the tool. An XML file describes
      the default behavior of the network, with the authorized
      routers and prefixes, and a second XML document containing
      the neighbors database is used. This second file can be
      filled during a learning phase. All NDP activities are logged
      in the syslog utility, and so the attacks, but these ones are
      also reported by mail to the administrator. Finally, NDPMon
      can detect stack vulnerabilities, like the assignment of an
      Ethernet broadcast address on an interface.</p>
      <p>NDPMon comes along with a WEB interface acting as a GUI to
      display the informations gathered by the tool, and give an
      overview of all alerts and reports. Thanks to color codes,
      the WEB interface makes possible for the administrator to
      have an history of what happened on his network and identify
      quickly problems. All the XML files used or produced by the
      daemon (neighbor cache, configuration file and alerts list)
      are translated in HTML via XSL for better readability. A
      statistic module is also integrated and gives informations
      about the discovery of the nodes and their type (MAC
      manufacturer distribution ...).</p>
      <p>The software package and its source code is freely
      distributed under an opensource license (LGPL). It is
      implemented in C, and is available through a SourceForge
      project at 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://ndpmon.sf.net" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
      <allowbreak/>ndpmon. 
      <allowbreak/>sf. 
      <allowbreak/>net</ref>. An open source community is now
      established for the tool which has distributions for several
      Operating Systems (Linux, FreeBSD, OpenBSD, NetBSD and Mac OS
      X). It is also integrated in FreeBSD ports at 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.freebsd.org/cgi/cvsweb.cgi/ports/net-mgmt/ndpmon/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
      <allowbreak/>www. 
      <allowbreak/>freebsd. 
      <allowbreak/>org/ 
      <allowbreak/>cgi/ 
      <allowbreak/>cvsweb. 
      <allowbreak/>cgi/ 
      <allowbreak/>ports/ 
      <allowbreak/>net-mgmt/ 
      <allowbreak/>ndpmon/ 
      <allowbreak/></ref>. Binary distributions are also available
      for .deb and .rpm based Linux flavors.</p>
    </subsection>
    <subsection id="uid65" level="1">
      <bodyTitle>6Tea</bodyTitle>
      <participants>
        <person key="madynes-2006-idm72374425456">
          <firstname>Frédéric</firstname>
          <lastname>Beck</lastname>
          <moreinfo>contact</moreinfo>
        </person>
        <person key="madynes-2006-idm72374453680">
          <firstname>Isabelle</firstname>
          <lastname>Chrisment</lastname>
        </person>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
        </person>
      </participants>
      <p>6Tea 
      <footnote id="uid66" id-text="5"><ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://gforge.inria.fr/projects/v4-to-v6/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https:// 
        <allowbreak/>gforge. 
        <allowbreak/>inria. 
        <allowbreak/>fr/ 
        <allowbreak/>projects/ 
        <allowbreak/>v4-to-v6/ 
        <allowbreak/></ref></footnote>is a transition engine designed to help
      administrators of business networks to transition their
      network for IPv4 to IPv6. The tool implements the transition
      algorithms defined in our team, takes as input a network
      topology and network devices information (like firewall
      configurations, device types, access protocols for their
      configuration) and generates a safe Ipv6 configuration for
      that network. The tool is able to propagate the configuration
      to the networked devices under the condition of availability
      of specific plugins. 6tea provides plugins for CISCO routers
      and firewalls as well as plugins for all major Open Source
      routers and firewalls. An online version of the tool is also
      available for third party users interested in generating
      configurations and addressing plans for their network.</p>
    </subsection>
    <subsection id="uid67" level="1">
      <bodyTitle>AA4M</bodyTitle>
      <participants>
        <person key="madynes-2007-idm860523488">
          <firstname>Julien</firstname>
          <lastname>Siebert</lastname>
          <moreinfo>contact</moreinfo>
        </person>
      </participants>
      <p>AA4MM (Agents and Artefacts for Multi-modeling and
      Multi-simulation) is a framework for coupling existing and
      heterogeneous models and simulators in order to model and
      simulate complex systems. This is the first implementation of
      the AA4MM meta-model proposed in Julien Siebert's PhD. AA4M
      is written in Java and relies upon Java Messaging Services
      (JMS).</p>
      <p>AA4MM can be downloaded at 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.loria.fr/~siebertj" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
      <allowbreak/>www. 
      <allowbreak/>loria. 
      <allowbreak/>fr/ 
      <allowbreak/>~siebertj</ref>.</p>
    </subsection>
  </logiciels>
  <resultats id="uid68">
    <bodyTitle>New Results</bodyTitle>
    <subsection id="uid69" level="1">
      <bodyTitle>Advanced device fingerprinting</bodyTitle>
      <participants>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
          <moreinfo>contact</moreinfo>
        </person>
        <person key="madynes-2010-idm163901540512">
          <firstname>Jérôme</firstname>
          <lastname>Fran cois</lastname>
        </person>
      </participants>
      <p>The objective of device fingerprinting is to uniquely
      identify device types by looking at captured traffic from
      devices implementing that protocol. The main novelty of our
      approach consists in leveraging both temporal and behavioral
      features for this purpose. We have proposed a method that can
      automatically and passively extract these features. Our
      approach is based on a conceptual model for capturing
      behavior and related temporal information from devices that
      implement a given protocol. The key contribution is a
      fingerprinting scheme, where individual fingerprints are
      represented by tree-based temporal finite state machines. We
      have developed a fingerprinting scheme that leverages
      supervised learning approaches based on support vector
      machines for this purpose 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid1" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid2" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
    </subsection>
    <subsection id="uid70" level="1">
      <bodyTitle>Smart protocol fuzzing</bodyTitle>
      <participants>
        <person key="madynes-2010-idm163901534320">
          <firstname>Humberto</firstname>
          <lastname>Abdelnur</lastname>
          <moreinfo>contact</moreinfo>
        </person>
        <person key="madynes-2008-idm507633090576">
          <firstname>Sheila</firstname>
          <lastname>Becker</lastname>
        </person>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
        </person>
      </participants>
      <p>The first extension we made to our fuzzing approach was to
      provide an extended feedback machanism to the KIF fuzzing
      framework and by building advanced models that exploit this
      feedback channel to improve the fuzzing strategies and
      impact. For the first target (improved feedback) we have
      finalized Mtrace, a fine-grained backtrace-oriented
      application tracer, able to trace the propagation of injected
      data into the target application. Mtrace was build for
      linux-executable code as well as for Javascript tracing. To
      optimize the fuzzing strategy, we have proposed a game
      theoretical model for fuzz testing, consisting in generating
      unexpected input to search for software vulnerabilities. As
      of today, no performance guarantees or assessment frameworks
      for fuzzing were reported in the litterature. We have
      addressed this issue by building a simple model that can be
      used to assess and identify optimal fuzzing strategies, by
      leveraging game theory. In this context, payoff functions are
      obtained using a tainted data analysis and instrumentation of
      a target application to assess the impact of different
      fuzzing strategies 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid3" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
      <p>A second direction in our research on fuzzing, was to
      target new network level protocols. In 2010, we designed a
      fuzzing framework for IPv6 protocols. Our approach follows a
      machine learning approach, that leverages reinforcement based
      fuzzing method. We built a reinforcement learning algorithm
      to allow the framework to autonomically learn the best
      fuzzing mechanisms and to automatically test stability and
      reliability of IPv6 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid4" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
    </subsection>
    <subsection id="uid71" level="1">
      <bodyTitle>Anomaly and attack detection in SIP</bodyTitle>
      <participants>
        <person key="madynes-2006-idm72374419456">
          <firstname>Rémi</firstname>
          <lastname>Badonnel</lastname>
        </person>
        <person key="madynes-2009-idm231958288896">
          <firstname>Oussema</firstname>
          <lastname>Dabbebi</lastname>
        </person>
        <person key="madynes-2006-idm72374408832">
          <firstname>Mohamed</firstname>
          <lastname>Nassar</lastname>
          <moreinfo>contact</moreinfo>
        </person>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
        </person>
      </participants>
      <p>We have pursued our efforts in SIP/VoIP intrusion
      detection. We have mainly provided two main
      contributions:</p>
      <simplelist>
        <li id="uid72">
          <p noindent="true">a labeled data-set for intrusion
          detection evaluation. Given the lack of a common labeled
          data-set similar to what is available in TCP/IP
          network-based intrusion detection, the different
          algorithms proposed in the litterature for SIP-based
          intrustion detection cannot be jointly evaluated and
          compared on a common basis.</p>
          <p>VoIP providers are not able to publicly share their
          data essentially because of privacy constraints. To
          overcome this limitation, we designed and built a
          framework for customizing and generating VoIP traffic in
          controlled environments. Using this framework we did
          generate a labeled data-set covering multiple features
          (Normal, Flood, SPIT, etc.). The data-set was generated
          in accordance with two different SIP network technologies
          (Asterisk-based and SER-based). Our data-set is composed
          of signaling and supporting protocol traces, Call Detail
          Records (CDRs) and server logs. This dataset is openly
          available and can be used by the community to evalute its
          anomaly and intrusion detection algorithms 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid5" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
        </li>
        <li id="uid73">
          <p noindent="true">a novel monitoring framework for SIP
          enterprise networks. In this work, we aimed to foster
          security within SIP enterprise domains by providing
          monitoring capabilities at three levels: the network
          traffic, the server logs and the billing records. We
          proposed an anomaly detection approach based on
          appropriate feature extraction/selection and one-class
          Support Vector Machines (SVM). We proposed methods for
          anomaly/attack type classification and attack source
          identification. Our approach was validated through
          experiments on a controlled test-bed using a customized
          normal traffic generation model and synthesized attacks.
          The results showed promising performances in terms of
          accuracy, efficiency and usability 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid6" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
        </li>
      </simplelist>
      <p>We were also developing a VoIP honeypot software named
      Artemisa. The honeypot is designed to connect to a VoIP
      enterprise domain as a back-end user-agent in order to detect
      malicious activity at an early stage. The honeypot can play
      an efficient role in the real-time adjustment of the security
      policies of the enterprise domain where it is deployed. We
      aimed, by this contribution, to encourage the deployment of
      such honeypots at large scale and the collection of attack
      traces. We tested the capacity of the honeypot to handle a
      series of known SIP script-kiddies attacks and presented
      results from diverse scenarios 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid7" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
    </subsection>
    <subsection id="uid74" level="1">
      <bodyTitle>High security lab telescope and network
      experimentation facility</bodyTitle>
      <participants>
        <person key="madynes-2006-idm72374425456">
          <firstname>Frédéric</firstname>
          <lastname>Beck</lastname>
          <moreinfo>contact</moreinfo>
        </person>
        <person key="madynes-2010-idm163901543568">
          <firstname>Alexandre</firstname>
          <lastname>Boeglin</lastname>
        </person>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
        </person>
      </participants>
      <p>The objective of the High Security Lab at INRIA Nancy
      Grant Est is to provide both the infrastructure and the legal
      envelope to researchers to perform sensitive security
      oriented experimentations. We do contribute to this
      laboratory by (1) designing and operating a large network
      telescope and (2) performing vulnerability assessment
      research, network data and malware collection and
      analysis.</p>
      <p>In 2010, in the scope of the inauguration of the High
      Security Lab in July, we moved the telescope to a dedicated,
      secured and isolated room built in the basement. This room
      includes a servers' room, an open space office and a room
      dedicated to access control and electrical management. All
      DSL lines have been moved alongside to the infrastructure
      itself. Both sub-projects are now coexisting within this new
      room.</p>
      <p>Moreover, we also performed a full software upgrade of the
      telescope. The new version is now able to support various
      honeypots of different kinds, all logging in the same
      centralized collector. This operation allowed us to diversify
      the emulated vulnerabilities (known vulnerabilities for usual
      services) and deploy a new type of honeypot logging brute
      force attacks on SSH servers, and log the shell session after
      successful login (the session is limited to a small set of
      emulated commands on a virtual file system, no further
      attacks can be performed). Due to that upgrade, the SDSL
      connection has saturated, which is why we initiated the
      upgrade from the existing 1Mbit/sec connection to the maximum
      bandwidth allowed on the line, 2Mbit/sec. In order to
      diversify even more the data collected, we also join the
      leurrecom.org Honeypot Project by deploying an instance of
      their honeypot in the telescope. We keep on collecting
      networks flows and traces on all these honeypots and are
      initiating their analysis.</p>
      <p>We continued the experimentations on the dedicated cluster
      with experiments on the Tor network (anonymisation through
      onion routing, experiments suspended as we already collected
      enough data), Peer-to-Peer monitoring on KAD and Bit-torrent
      networks in the scope of the MAPE ANR Project and VoIP
      honeypots (several honeypots deployed and compared) in the
      scope of the Vampire ANR project.</p>
      <p>The full specification of the telescope is publicly
      available. The details of the infrastructure updates made in
      2010 can be found in 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid0" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
      <p>As of today, we have deployed more than 80 sensors based
      on 4 different honeypots. Almost 1.5M of malwares (146 000
      unique binaries) and 1.1T Bytes of network traces have been
      collected (including 20GB of network flows). After the
      upgrade, the telescope undergoes around 200 000 attacks
      leading to around 18 000 malwares downloaded daily.</p>
    </subsection>
    <subsection id="uid75" level="1">
      <bodyTitle>Collaborative SPAM filtering on
      smart-phones</bodyTitle>
      <participants>
        <person key="madynes-2010-idm163901556320">
          <firstname>Abdelkader</firstname>
          <lastname>Lahmadi</lastname>
          <moreinfo>contact</moreinfo>
        </person>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
        </person>
      </participants>
      <p>Text-based messaging services are highly popular and
      heavily used today. These services are widely provided by
      emerging social networks like Twitter, Facebook or simply by
      the the most known SMS service on mobile phones. Nowadays,
      the cost of SMS is decreasing and many providers offer
      unlimited texting plans. These costs cut make mobile-phone
      users a more attractive target for spammers. In addition,
      modern SmartPhones offer more capabilities than traditional
      mobile phones. They are able to compute and communicate using
      different communication means. By focusing on these
      communication capabilities, spammers are interested in
      delivering abusive or malicious SMS content to smartphone
      users.</p>
      <p>Our team has developed a model implemented in a tool
      called Hinky available for Android-based mobiles, to help
      users to filter SMS and call spams using a local black list.
      The filtering method behind Hinky is user centric, i.e. the
      user himself tags the SMS messages as spam. The next time an
      SMS is received from this sender, it is automatically treated
      as spam and the SMS is discarded. This preliminary approach
      was limited since each user does not benefit from other users
      black lists.</p>
      <p>We have extended our method to filter spam on smartPhones
      with a collaborative approach. When a user tags an SMS as
      spam, then this human effort is shared among other users.
      When a message is identified as spam by somebody elsewhere,
      other users of the collaborative platform are protected from
      this undesired message. Our collaborative filtering solution
      relies on a mixture of distributed Bloom filters and hashing
      based lists to store, query and publish SMS spam content
      between users using a simple friendship mechanism. We
      evaluated the efficiency of our solution regarding the
      storage space and the rate of false positive which is an
      important metric due to the criticality of an SMS 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid8" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
    </subsection>
    <subsection id="uid76" level="1">
      <bodyTitle>SecSIP: a SIP exploit prevention
      engine</bodyTitle>
      <participants>
        <person key="madynes-2010-idm163901543568">
          <firstname>Alexandre</firstname>
          <lastname>Boeglin</lastname>
        </person>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
        </person>
        <person key="madynes-2010-idm163901556320">
          <firstname>Abdelkader</firstname>
          <lastname>Lahmadi</lastname>
          <moreinfo>contact</moreinfo>
        </person>
      </participants>
      <p>SECSIP  
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid9" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>is developed by the team to
      defend SIP-based services from known vulnerabilities. It
      presents a proactive point of defense between a SIP-based
      network of devices (servers, proxies, user agents) and the
      open Internet. The preventions schemes within the SecSIP tool
      are authored using our developed domain-specific language,
      called VeTo 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid10" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. The VeTo language relies on an
      event-driven and rule-based approach to specify in a
      flexible, and a scalable manner preventions schemes from
      existing vulnerabilities within a SIP network. The language
      combines context, definition and events blocks extracted from
      vulnerabilities properties to provide the ability to prevent
      against its exploitation. The context block exhibits the
      vulnerability surrounding environment properties. The
      definition block provides the vulnerability related
      assumptions on its behavior such as the involved SIP messages
      and their respective fields. The prevention block describes
      the vulnerable behavior within its context and includes a
      response action.We have shown through real discovered
      vulnerabilities the usage of VeTo specifications to protect
      different deployed SIP devices on a target testbed.</p>
      <p>Therefore, all SIP traffic is inspected and analyzed
      against authored Veto specification before it is forwarded to
      these devices. When initializing, the SecSIP runtime starts
      loading and parsing authored VeTo specifications to identify
      different variables, event patterns, operations and actions
      from each rule.</p>
      <p>Manually writing and generating these prevention
      specifications is tedious and error-prone. Therefore, we have
      developed a method which automatically infers these
      specifications by analyzing exploit SIP protocol messages and
      then provide them to the detection engine. Our approach
      relies on a genetic algorithm applied to regular expressions
      to characterize malformed messages. We automatically generate
      a set of candidate regular expressions to match a malformed
      pattern within a SIP message, and evaluate their quality to
      ensure that their are specific enough to only match exploit
      messages. The genetic algorithm is used to optimize the set
      of candidate regular expressions. The algorithm considers
      each candidate regular expression as a chromosome which is
      evaluated using an appropriate fitness function. A selection
      algorithm is then applied to select the best regular
      expression. Finally, we apply a set of recombination and
      mutation rules on the selected regular expressions to produce
      a new generation. The evolution cycle is repeated until a
      defined number of evolution is reached.</p>
      <p>While the genetic process terminates and we obtain the
      best set of regular expressions which only matches exploit
      messages, the tool generates a set of VeTo specifications
      over these regular expressions.</p>
    </subsection>
    <subsection id="uid77" level="1">
      <bodyTitle>Netconf-based Configuration Management</bodyTitle>
      <participants>
        <person key="madynes-2006-idm72374434624">
          <firstname>Emmanuel</firstname>
          <lastname>Nataf</lastname>
          <moreinfo>contact</moreinfo>
        </person>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
        </person>
        <person key="madynes-2010-idm163901556320">
          <firstname>Abdelkader</firstname>
          <lastname>Lahmadi</lastname>
        </person>
      </participants>
      <p>The work on configuration data modeling language that was
      finalized last year and that led to the implementation of a
      new YANG parser (jYang) has been used to improve the open
      source EnSuite configuration management framework supported
      by MADYNES. Previous version of EnSuite didn't make use of
      YANG but just has an XML based interface. The work that has
      been done was on the two sides of the NETCONF protocol, first
      at the server side it was necessary to enhance a message in
      order to annonce which YANG data models are implemented
      within the server. Second at the client side we have build a
      visualization tools based on YANG data models. The framework
      is now enable to show the data model of a configuration
      either with a static view, like a specification browser,
      either on real network devices 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid11" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, like an usual MIB browser in
      the network supervision domain.</p>
      <p>YANG is now an IETF Request For Comment (RFC6020) and will
      probably be very much used by network devices vendors to
      specify their configuration data model. We are working on a
      YANG oriented editor in the Eclipse environement through the
      creation of a plug-in that will help YANG data modellers in
      their work. 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid12" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. MADYNES is in relationship with
      the IETF working group on YANG and will probably have to
      evaluate several YANG data models that will be proposed to
      the Internet standardization.</p>
    </subsection>
    <subsection id="uid78" level="1">
      <bodyTitle>Risk Management in VoIP Architectures</bodyTitle>
      <participants>
        <person key="madynes-2009-idm231958288896">
          <firstname>Oussema</firstname>
          <lastname>Dabbebi</lastname>
        </person>
        <person key="madynes-2006-idm72374419456">
          <firstname>Rémi</firstname>
          <lastname>Badonnel</lastname>
          <moreinfo>contact</moreinfo>
        </person>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
        </person>
      </participants>
      <p>IP telephony has known a large scale deployment since the
      standardization of dedicated signalling protocols. This
      telephony service is less confined than traditional PSTN. It
      is therefore more exposed to security attacks. These ones can
      be specific to VoIP protocols such as SPIT, or can be
      inherited from the IP layer such as ARP poisoning. A large
      variety of protection mechanisms is available, but their
      activation may seriously impact on the quality of service of
      such critical environments 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid13" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. Our work focuses on exploiting
      and automating risk management methods and techniques for
      VoIP infrastructures, in order to protect them while
      maintaining their usability 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid14" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. In this context, we have
      extended our runtime risk modelling to cover a larger
      spectrum of security attacks 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid15" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. We have then evaluated how the
      observability properties of these attacks influence the
      performance of our solution, in particular in the case of low
      attack signature size. Our approach relies on a set of
      security safeguards that can be activated or deactivated with
      respect to threat potentiality. We have quantified the impact
      of these safeguards and their characteristics on our runtime
      risk management. We have also observed how the
      parametrization of such a risk modelling can be difficult to
      maintain. As a consequence, we have proposed a
      self-configuration strategy based on an econometric feedback
      mechanism. The objective is to simplify the configuration of
      our risk management modelling by dynamically refining the
      model parameters at runtime. We have defined this econometric
      feedback mechanism in a theoretical manner and have shown how
      it can be integrated into our solution 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid16" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. Finally, we have investigated
      the coupling with anomaly detection techniques based on
      support vector machines (SVM). SVM has already been proven to
      be efficient and accurate in monitoring VoIP signalling
      traffic. We have determined to what extent the detection
      sensitivity and specificity affect our risk management 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid17" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
    </subsection>
    <subsection id="uid79" level="1">
      <bodyTitle>Safe Configuration in Autonomic
      Networks</bodyTitle>
      <participants>
        <person key="PASUSERID">
          <firstname>Martin</firstname>
          <lastname>Barrere</lastname>
        </person>
        <person key="madynes-2006-idm72374419456">
          <firstname>Rémi</firstname>
          <lastname>Badonnel</lastname>
        </person>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
          <moreinfo>contact</moreinfo>
        </person>
      </participants>
      <p>The main research challenge addressed in this work has
      focused on integrating configuration vulnerability
      descriptions into the management plane of autonomic networks
      and systems. The continuous growth of networks and their
      services significantly increases the complexity of their
      management and requires the delegation of management
      functionalities to the networks themselves. Networks and
      systems have therefore to take in charge their own
      management, by optimizing their parameters, adapting their
      configurations and ensuring their protection against security
      attacks. Operations and changes executed by autonomic
      networks during these activities may however generate
      vulnerable configurations. In this context, we have proposed
      a new prevention strategy for dealing with configuration
      vulnerabilities in autonomic networks and systems 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid18" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. We have considered the Open
      Vulnerability Assessment Language (OVAL) which has known a
      strong standardization effort. This language permits to
      specify in a standardized manner the description of
      configuration vulnerabilities, seen as a set of forbidden
      combinations of configuration parameters. We have shown how
      these standardized descriptions can be integrated into an
      autonomic environment in order to ensure a safer
      self-configuration. In particular, we have formalized the
      translation of OVAL vulnerability descriptions into policies
      and policy rules, which are interpretable by an autonomic
      configuration tool (Cfengine). We have proposed a functional
      architecture for supporting this vulnerability prevention
      mechanism into an autonomic infrastructure, and have
      experimented and evaluated this approach through a first
      implementation prototype focusing on the case of IOS
      vulnerability descriptions.</p>
    </subsection>
    <subsection id="uid80" level="1">
      <bodyTitle>Safe IPv6 transition</bodyTitle>
      <participants>
        <person key="madynes-2006-idm72374425456">
          <firstname>Frédéric</firstname>
          <lastname>Beck</lastname>
        </person>
        <person key="madynes-2006-idm72374453680">
          <firstname>Isabelle</firstname>
          <lastname>Chrisment</lastname>
          <moreinfo>Contact</moreinfo>
        </person>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
        </person>
      </participants>
      <p>Despite its slow start, IPv6 is the most mature network
      protocol for the future Internet. To foster its acceptance
      and deployment, it has however to offer capabilities reducing
      and often eliminating the man in the loop.We are convinced
      that such features are also required for the evolutionary
      aspects of an IP network, the transition from IPv4to IPv6
      being an essential one. Many network administrators are
      indeed reluctant to deploy IPv6 because they do not fully
      master the protocol itself and because they do not have
      sufficiently rich algorithmic support to seamlessly manage
      the transition from their IPv4 networks to IPv6. To address
      this issue, we worked on the design of a transition framework
      with the objective of making this network function
      self-managed. The results of this work are :</p>
      <orderedlist>
        <li id="uid81">
          <p noindent="true">a set of algorithms that automate the
          generation of the IPv6 addressing scheme for an IPv4
          enterprise network that can be enriched with on-the fly
          administrator constraints;</p>
        </li>
        <li id="uid82">
          <p noindent="true">an algorithm that generates the
          security configuration of firewalls for the newly created
          IPv6 addressing plan,</p>
        </li>
        <li id="uid83">
          <p noindent="true">a fully operational, openly available
          and extensively tested in real environments transition
          engine that also propagates on-demand the configuration
          to the devices.</p>
        </li>
      </orderedlist>
      <p>The algorithms have been published in CNSM'2010 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid19" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, the most selective conference
      in network and service management having an acceptance rate
      below 14%. The monitoring components were published in 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid20" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
    </subsection>
    <subsection id="uid84" level="1">
      <bodyTitle>Pervasive computing</bodyTitle>
      <participants>
        <person key="madynes-2006-idm72374440480">
          <firstname>Laurent</firstname>
          <lastname>Ciarletta</lastname>
          <moreinfo>contact</moreinfo>
        </person>
        <person key="madynes-2007-idm860520384">
          <firstname>Tom</firstname>
          <lastname>Leclerc</lastname>
        </person>
        <person key="madynes-2007-idm860523488">
          <firstname>Julien</firstname>
          <lastname>Siebert</lastname>
        </person>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
        </person>
        <person key="madynes-2010-idm163901531232">
          <firstname>Cyril</firstname>
          <lastname>Auburtin</lastname>
        </person>
        <person key="PASUSERID">
          <firstname>Vincent</firstname>
          <lastname>Chevrier</lastname>
          <moreinfo>MAIA Team</moreinfo>
        </person>
      </participants>
      <p>In Pervasive or Ubiquitous Computing, a growing number of
      communicating/computing devices are collaborating to provide
      users with enhanced and ubiquitous services in a seamless
      way. Madynes is focussing on the networking aspects of
      ubiquitous systems. We cooperate with with the Maia to be
      able to encompass issues and research questions that combine
      both networking and cognitive aspects.</p>
      <p>In 2010 we worked on the following research topics :</p>
      <simplelist>
        <li id="uid85">
          <p noindent="true">Multi-models of these Pervasive
          computing environments (including the users in the
          modeling and the simulations). We have been focusing on
          the collaborative simulations of dynamic
          networks/elements, namely P2P and adhoc networks using
          agents to drive those simulations. This work is done in
          collaboration with the MAIA team. The results have been
          published in 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid21" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid22" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>and 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid23" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. In parallel we are
          exploring how the behavior and other factors such as
          spatial and temporal dimensions are mutually influencing
          and the impact of parameters variability of our models 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid24" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>in environment where
          collective behaviors can emerge.</p>
        </li>
        <li id="uid86">
          <p noindent="true">Specification of core-engine
          requirements for co-simulation and how it can be applied
          to cooperation of applications in general. Our goal is to
          provide a usable framework that would serve as a
          reference implementation and would scale up to complex
          settings.</p>
        </li>
        <li id="uid87">
          <p noindent="true">Study of service discovery protocols,
          contextual metrics in adhoc networks, and Service
          Discovery in adhoc networks using an hybrid between
          cluster-like (WCPD) and MPR-based (OLSR) broadcasting.
          The SLSF (Stable Linked Structured Flooding) protocol and
          its improved version with error correction have been
          published in 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid25" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>and 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid26" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
        </li>
        <li id="uid88">
          <p noindent="true">Energy-constraint geolocalization of
          wireless devices: a research collaboration with Fireflies
          RTLS was started in March 2009 and is ongoing. The work
          will be extended to routing and energy-cost function with
          a joint work with the TRIO Team.</p>
        </li>
      </simplelist>
      <p>
        <b>Multi-modeling and multi-simulation</b>
      </p>
      <p>Pervasive Computing Systems and Ambiant Networks can be
      studied as Complex systems. They are built around a
      user-centric model. In distributed, dynamic networks,
      services and applications, such as Peer-to-Peer (P2P)
      networks or Mobile Ad hoc NETworks (MANET), the users
      behavior has a strong influence on the quality of service
      (QoS) and reciprocally.</p>
      <p>Complex systems generally require to use different points
      of view (abstraction levels) at the same time on the system
      in order to capture and to understand all the dynamics and
      the complexity. Being made of different interacting parts, a
      model of a complex systems also requires simultaneously
      modeling and simulation (M&amp;S) tools from different
      scientific fields.</p>
      <p>Building a model and a simulation of a complex system from
      the interaction of the different existing M&amp;S tools
      present in each scientific field involved, is also a complex
      task. To represent a complex system, we need to couple
      several models (multi-modeling) that each represent a part of
      the whole system. Each model has been designed by and for a
      specific scientific domain. And making different models
      interact raise hard issues on model interoperability
      (semantic coherence, formalism compatibility). As many
      simulators exist in the scientific fields evolved, a good
      approach to make a simulation of a complex system is to reuse
      and make interact these existing simulators. Also, each
      simulator has been developed for specific purposes and making
      them interact raise hard issues (interoperability,
      synchronization). The multiagent paradigm allows the
      designers to model a complex system as a set of autonomous,
      proactive and heterogeneous entities, called the agents, that
      interact and self-organize in an environment.</p>
      <p>The contribution of this work is to propose an homogeneous
      multiagent meta-model (called AA4MM) that provides solutions
      both for multi-modeling and multi-simulation of complex
      systems by reusing existing and heterogeneous M&amp;S tools.
      AA4MM has been implemented and used both for proof of concept
      and a real case study. A proof of concept has been made by
      coupling different simulators together to develop a
      multi-model of prey-predator model. This has permitted us to
      show both conceptual and operational properties of AA4MM such
      as interaction of heterogeneous models, modularity,
      interoperability. This multiagent meta-model for
      multi-modeling and multi-simulation by reusing existing and
      heterogeneous M&amp;S tools has been applied to model complex
      systems integrating user behavior, node mobility, radio
      propagation in ubiquitous networks.</p>
      <p>
        <b>From co-simulation to collaborative applications</b>
      </p>
      <p>While AA4MM is conceptually decentralized, the actual
      implementation is centralized and is a proof of concept. A
      Master student from ENSG (Ecole Nationale Supérieure de
      Geography) has explored the requirements of the the core
      engine and applied his results to a computer vision chain of
      applications 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid27" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
      <p>The co-simulations and their current architectures do not
      provide sufficient flexibility and modularity. Because of
      their important centralization, they are difficult to use on
      a larger scale. The emergence or the improvement of
      technologies like multi-agents systems or web services allow
      to propose networks of independent applications, supervised
      by an artificial intelligence. Complex systems could be built
      by assembling basic modules driven by agents. This work uses
      results obtained in the field of co-simulations to validate
      choices made to define our co-simulation platform. Among
      different possible technological solutions we have chosen a
      combination of them that answer to our scope statement. We
      extend this solution for co-simulations to a cooperation of
      applications. Moreover, in order to fulfill the need of
      developing a chain of image processing and to prove the
      feasibility of such architecture, we have proposed a platform
      that allows to heterogenous applications to collaborate. The
      chain of image processing, that we studied, rebuilds a 3D
      environment using images provided by a camera. The created
      data are shared with other customer applications that
      increased this way their knowledge. This chain uses
      applications of computer vision able to process the
      informations very quickly, allowing thus a (almost) real time
      reactivity.</p>
      <p>
        <b>Service discovery</b>
      </p>
      <p>The objective of this work is to design and implemented a
      set of tools and solutions regarding service discovery in
      mobile ad hoc networks. Improvements are on the information
      dissemination throughout the network, by proposing a stable
      and robust connected dissemination structure and on the
      service discovery, especially the end user experience, by
      considering node and user context. As a matter of fact,
      dynamicity in ad hoc network is mainly induced by the human
      factor of those network. Human behavior, network and node
      information together represent the context to be considered
      in order to obtain relevant service discovery and improved
      overall performances.</p>
      <p>Metrics are proposed to capture the context of nodes in
      their environment. Metrics can be of different nature at
      different levels. For example they can measure the available
      bandwidth of a link at the network level or capture
      information about the goals of the user (e.g. destination) at
      the user level. Moreover levels can influence each other,
      human relations (e.g. groups, friends) can become network
      connections (e.g. neighbor nodes). If the network is bad
      human relation might become less stable (e.g. user moving to
      find better network connectivity) which in turn worsen the
      network. On the other hand, a good network connectivity might
      attract more user thus improving ad hoc network performances
      and robustness.</p>
      <p>To be able to study those elements and their specific
      aspects different tools from various domains are combined
      and/or adapted to the specific service discovery in ad hoc
      network case. Therefore, additional to a classic network
      simulation, tools capable of modeling and simulating user
      interactions, user behaviors and service usage are required.
      Simulating, using one or more coupled simulators or tools, a
      complete scenario from the network protocol to the high level
      user behavior permits to study and further analyze protocol
      performances.</p>
      <p>A first part of this work has been to build a stable
      structure on top of spontaneously created ad hoc networks. A
      major challenge is to reach a satisfactory stability by
      keeping the bandwidth low to create this stable structure. An
      out of the box definition of stability for ad hoc networks
      doesn't exist, even worse the definition of stability is
      closely related to the usage or application of the ad hoc
      network.</p>
      <p>Another peculiarity of MANETs is the human part. Devices
      are humanly operated on the application level but also the
      mobility is directly dependent on the human behavior. Most
      research done in MANETs tend to forget about this human part.
      We take this into account using the multiagent paradigm to
      couple simulators and to represent rich users' behavior in
      our simulations.</p>
    </subsection>
    <subsection id="uid89" level="1">
      <bodyTitle>Monitoring content access in Peer-to-Peer
      networks</bodyTitle>
      <participants>
        <person key="madynes-2006-idm72374388848">
          <firstname>Thibault</firstname>
          <lastname>Cholez</lastname>
        </person>
        <person key="madynes-2006-idm72374453680">
          <firstname>Isabelle</firstname>
          <lastname>Chrisment</lastname>
          <moreinfo>contact</moreinfo>
        </person>
        <person key="madynes-2009-idm231957303456">
          <firstname>Juan Pablo</firstname>
          <lastname>Timpanaro</lastname>
        </person>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
        </person>
      </participants>
      <p>Peer-to-peer (P2P) networks are now commonly used to share
      files within the Internet. They offer lots of advantages
      compared to the client-server scheme by giving possibility to
      gather and share a large amount of resources with the
      collaboration of many individual peers. However, peer-to-peer
      networks also provide support for harmful and malicious
      activities that can voluntarily propagate strongly
      undesirable contents.</p>
      <p>As peer-to-peer systems are self-organized, dynamic and do
      not have a centralized infrastructure, it is not obvious to
      collect information to measure them and to observe the
      behavior of malicious users. With passive monitoring we can
      observe, from one point, the P2P traffic without sending
      additional data into the network. However, these approaches
      do not allow to study specific contents at the network scale.
      Active monitoring removes this drawback but is more intrusive
      in the sense that some traffic (queries, files) is injected
      in the network to gather more information concerning the P2P
      system.</p>
      <p>P2P honeypots are another way of monitoring contents in
      P2P networks. The common solutions consist in advertising
      fake files as normal peers in order to log the download
      queries received for these files, but without any guarantee
      that these files will attract all peers looking for the
      studied content.</p>
      <p>MADYNES proposed a new monitoring approach, called HAMACK
      (Honeynet Architecture for Monitoring content ACcess in KAD),
      to control content access in a distributed hash table (DHT)
      and more specifically in a real P2P network called KAD.</p>
      <p>In 2010, we pursued our work on HAMACK. Our solution is
      based on distributed honeypots that passively monitor, with
      few resources (around 20 nodes), all the requests issued by
      the peers for a specific content (keyword or file). We showed
      that we can control the DHT at a local level with a new
      strategy bypassing the Sybil attack protections inserted in
      KAD. For the targeted DHT entries, we monitor all requests
      emitted by the peers, from the initial content publication or
      search, to the final download request of fake files,
      assessing accurately peers interest to access it. We
      demonstrated the efficiency of our approach through large
      scale experiments performed on the worldwide KAD network 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid28" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
      <p>In parallel, we designed a new solution to protect the
      widely deployed KAD DHT against localized attacks which can
      take control over DHT entries 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid29" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. We showed through measurements
      that the IDs distribution of the best peers found after a
      lookup process follows a geometric distribution. We then used
      this result to detect DHT attacks by comparing real peers'ID
      distributions to the theoretical one thanks to the
      Kullback-Leibler divergence. Our method detects the most
      efficient attacks with a very small false negative rate,
      while countermeasures successfully filter almost all
      malicious peers involved in an attack. Besides, our solution
      introduces no networkd overhead, it can be applied to any P2P
      network based on a DHT and is fully backward compatible with
      older clients.</p>
      <p>This solution was implemented in a KAD client and was able
      to successfully protect the emitted requests from attackers
      that we inserted on few DHT entries. We also used our method
      which analyzes peers' ID distribution to detect the contents
      under attack in the KAD network. First, we developed a
      crawler able to discover with a high accuracy all peers
      participating to KAD P2P network   
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid30" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. Then, we analyzed the
      distribution of the peers' identifiers close to a set of
      keywords related to popular contents (provided by a database
      from a e-business site) and we searched for the discovered
      suspcious peers in the rest of the DHT. We estimate that
      around 1500 contents are either monitored or attacked in this
      network.</p>
    </subsection>
  </resultats>
  <contrats id="uid90">
    <bodyTitle>Contracts and Grants with Industry</bodyTitle>
    <subsection id="uid91" level="1">
      <bodyTitle>EMANICS</bodyTitle>
      <participants>
        <person key="madynes-2006-idm72374419456">
          <firstname>Rémi</firstname>
          <lastname>Badonnel</lastname>
        </person>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
          <moreinfo>contact</moreinfo>
        </person>
      </participants>
      <descriptionlist>
        <label>Dates</label>
        <li id="uid92">
          <p noindent="true">January 2006 - April 2010</p>
        </li>
        <label>Partners</label>
        <li id="uid93">
          <p noindent="true">12 european universities and one
          financial institute</p>
        </li>
      </descriptionlist>
      <p>EMANICS is an FP6 Network of Excellence which brings
      together most of the best european research teams on
      management. It is built around 13 research teams and one
      financial coordination entity and led by Olivier Festor. The
      network aims at shaping the European research in the area of
      device, network and service management to provide the
      necessary coordination and integration so as to enable the
      participants, while maintaining and enhancing their
      excellence in their respective field, to contribute in a
      unified way to the design of management solutions covering
      all of the challenges arising in this field.</p>
      <p>EMANICS has been running for four and a half years and has
      reached many great successes in the area of researchers and
      community integration, joint research results, outstanding
      publications quality and score, standard contributions,
      operational testbeds, visibility and recognition. Details on
      the networks and its achievements can be found on the network
      Web site at: 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.emanics.org" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
      <allowbreak/>www. 
      <allowbreak/>emanics. 
      <allowbreak/>org</ref>. The final evaluation took place in
      april 2010. For the fourth time in a row, the network
      received the highest mark a project can get in an evaluation
      stating that it did fully achieve its objectives and
      technical goals for the period and that it has largely
      exceeded expectations.</p>
      <p>In addition to the management and animation of the network
      , we did contribute in 2010 as in previous years, in the
      activities related to the EMANICS virtual laboratory, Open
      Source developments coordination and support, scalable
      management as well as autonomic management.</p>
    </subsection>
    <subsection id="uid94" level="1">
      <bodyTitle>SARAH</bodyTitle>
      <participants>
        <person key="madynes-2006-idm72374440480">
          <firstname>Laurent</firstname>
          <lastname>Ciarletta</lastname>
          <moreinfo>contact</moreinfo>
        </person>
        <person key="madynes-2007-idm860520384">
          <firstname>Tom</firstname>
          <lastname>Leclerc</lastname>
        </person>
        <person key="madynes-2007-idm860523488">
          <firstname>Julien</firstname>
          <lastname>Siebert</lastname>
        </person>
      </participants>
      <descriptionlist>
        <label>Dates</label>
        <li id="uid95">
          <p noindent="true">February 2007 - February 2010</p>
        </li>
        <label>Partners</label>
        <li id="uid96">
          <p noindent="true">INRIA Lorraine (MADYNES), INRIA
          Rocquencourt (HIPERCOM) , LRI, LIP6, INT Ucopia, Orange
          Labs</p>
        </li>
      </descriptionlist>
      <p>SARAH is an ANR (Agence Nationale pour la Recherche,
      French National Research Agency) collaborative research
      project, in the area of Pervasive Computing and Ubiquitous
      Networks. It has been researching, implementing,
      experimenting and evaluating (a) novel hybrid ad hoc
      architecture(s) for the deployment of advanced multimedia
      services.</p>
      <p>These services will be secured and use geo-localized
      context-aware information provided by Service Discovery
      protocols and follow some Pervasive Computing requirements
      :</p>
      <simplelist>
        <li id="uid97">
          <p noindent="true">Ubiquitous availability,</p>
        </li>
        <li id="uid98">
          <p noindent="true">Context awareness,</p>
        </li>
        <li id="uid99">
          <p noindent="true">Self-adaptation to the users needs
          (the technology adapts and is available to provide
          services to the user and not the other way around)</p>
        </li>
        <li id="uid100">
          <p noindent="true">Disappearing computing (discreetly,
          almost naturally embedded in our daily environment)</p>
        </li>
        <li id="uid101">
          <p noindent="true">Ease of use.</p>
        </li>
      </simplelist>
      <p>Therefore it is not only necessary to extend the reach,
      the availability and the functionality of applications and
      services but also to ubiquitously offer them in the most
      secure and easy (natural) possible way.</p>
      <p>The project was successfully completed in february 2010.
      All deliverables were delivered on time and a final demo
      including co-simulation and service discovery is available.
      In addition, we spend quite some resources to finalize a demo
      in a telecom museum building on our service discovery
      techniques.</p>
    </subsection>
    <subsection id="uid102" level="1">
      <bodyTitle>CISCO CARD</bodyTitle>
      <participants>
        <person key="madynes-2006-idm72374425456">
          <firstname>Frédéric</firstname>
          <lastname>Beck</lastname>
        </person>
        <person key="madynes-2006-idm72374453680">
          <firstname>Isabelle</firstname>
          <lastname>Chrisment</lastname>
          <moreinfo>contact</moreinfo>
        </person>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
        </person>
      </participants>
      <descriptionlist>
        <label>Dates</label>
        <li id="uid103">
          <p noindent="true">January 2008 - June 2010</p>
        </li>
        <label>Partners</label>
        <li id="uid104">
          <p noindent="true">CISCO, INRIA Nancy Grand-Est
          (MADYNES)</p>
        </li>
      </descriptionlist>
      <p>This project is follow-up to a previous CISCO CARD project
      related to the monitoring and management of IPv6 network
      renumbering. In this continuation, we propose to revisit and
      investigate the self-management capabilities in the root
      scenario of IPv6 deployment, namely transition. This project
      initially planned to end in december 2009 was extended by 6
      months in 2010.</p>
      <p>During this period, we finalized a novel algorithm that
      enables fully automated and safe IPv6 transition for
      enterprise networks. This algorithm takes as input the
      network topology and the IPv6 prefix the network inherits.
      Given these informations, the algorithm generates the
      adressing scheme together with the security policies (in
      terms of firewall policies) to apply to automate the network
      renumbering.</p>
      <p>The algorithm has been implemented in a tool entitled
      6Tea. 6Tea is distributed in Open Source and an online
      transition engine service is also available. The transition
      algorithm and its implementation have been published in 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid20" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
    </subsection>
    <subsection id="uid105" level="1">
      <bodyTitle>INRIA-ALBLF HIMA</bodyTitle>
      <participants>
        <person key="madynes-2010-idm163901534320">
          <firstname>Humberto</firstname>
          <lastname>Abdelnur</lastname>
        </person>
        <person key="madynes-2006-idm72374419456">
          <firstname>Rémi</firstname>
          <lastname>Badonnel</lastname>
        </person>
        <person key="madynes-2009-idm231958288896">
          <firstname>Oussema</firstname>
          <lastname>Dabbebi</lastname>
        </person>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
          <moreinfo>Contact</moreinfo>
        </person>
      </participants>
      <descriptionlist>
        <label>Dates</label>
        <li id="uid106">
          <p noindent="true">July 2008 - December 2011</p>
        </li>
        <label>Partners</label>
        <li id="uid107">
          <p noindent="true">Alcatel Lucent, INRIA.</p>
        </li>
      </descriptionlist>
      <p>This joint lab brings together research teams from INRIA
      and Alcatel Lucent Bell Labs for addressing the key
      challenges of autonomous networking in three critical areas:
      semantic networking, high manageability and self-organized
      networks. Our activity is part of the joint initiative
      dedicated to high manageability, and focuses on security
      management aspects with the Alcatel-Lucent Bell Labs teams on
      network security. Our work in this joint lab concerns the
      automation of security management. It includes a first
      activity related to fuzzing, which includes the improvement
      of the KiF framework as well as the design of novel fuzzing
      models for Alcatel-Lucent specific protocols. A second
      activity of the joint lab aims at investigating to what
      extent risk management strategies can be applied to VoIP
      infrastructures. The objective is to design and experiment
      dynamic risk management methods and techniques for voice
      oriented critical services.</p>
      <p>In 2010, we have built a specific branch of both KIF and
      the feedback engine working on specific Alcatel-Lucent Linux
      environments. This environment was succesfully transfered to
      the industrial partner and a training session was organized
      in the Alcatel-Lucent premises to sutstain the transfer. This
      activity was succesfully completed.</p>
      <p>A second achievement within the cooperation is the amount
      of results obtained in the area of risk management models
      applied to Voice over IP services (see related results
      section for the details). Our efforts on risk management
      concerned the generalization of our risk modelling to cover a
      larger variety of attacks, the specification of a
      self-configuration strategy for dynamically refining
      parameters based on an econometric feedback mechanism, and
      the integration of anomaly detection techniques using support
      vector machines. These results were published in the most
      selective conference in network and service management.</p>
    </subsection>
    <subsection id="uid108" level="1">
      <bodyTitle>FIREFLIES RTLS</bodyTitle>
      <participants>
        <person key="madynes-2010-idm163901531232">
          <firstname>Cyril</firstname>
          <lastname>Auburtin</lastname>
        </person>
        <person key="madynes-2006-idm72374440480">
          <firstname>Laurent</firstname>
          <lastname>Ciarletta</lastname>
          <moreinfo>contact</moreinfo>
        </person>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
        </person>
      </participants>
      <descriptionlist>
        <label>Dates</label>
        <li id="uid109">
          <p noindent="true">March 2009 - December 2013</p>
        </li>
        <label>Partners</label>
        <li id="uid110">
          <p noindent="true">FIREFLIES RTLS</p>
        </li>
      </descriptionlist>
      <p>As part of our effort in Pervasive Computing research,
      we've started to work with Firelies RTLS, a French startup
      specialized in advanced geolocation services. They aim at
      providing long-term and resilient location service for high
      value assets using active RFID tags.</p>
      <p>In 2010, the work led to the design of improved algorithms
      for location computing of sensors. These algorithms were
      implemented and tested in both indoor and outdoor conditions
      and the associated implementation was transfered to the
      industrial partner  
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid31" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
      <p>A second achievement of 2010 in this cooperation is the
      design and implementation of a full-fledged SNMP-based
      management framework for the Fireflies sensor networks. This
      includes a complete information model, a tunable SNMP proxy
      implmeneting the model and aninstantiation with standard
      monitoring tools.</p>
    </subsection>
    <subsection id="uid111" level="1">
      <bodyTitle>VAMPIRE</bodyTitle>
      <participants>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
          <moreinfo>contact</moreinfo>
        </person>
        <person key="madynes-2010-idm163901534320">
          <firstname>Humberto</firstname>
          <lastname>Abdelnur</lastname>
        </person>
        <person key="madynes-2006-idm72374443216">
          <firstname>Laurent</firstname>
          <lastname>Andrey</lastname>
        </person>
      </participants>
      <descriptionlist>
        <label>Dates</label>
        <li id="uid112">
          <p noindent="true">March 2000 - February 2012</p>
        </li>
        <label>Partners</label>
        <li id="uid113">
          <p noindent="true">EURECOM, INRIA Nancy Grand-Est
          (MADYNES), Orange Labs, Symantec</p>
        </li>
      </descriptionlist>
      <p>VAMPIRE is a research project funded by the French
      Research Agency (ANR, VERSO ANR-08-VERS-017) coordinated by
      the team. The goal of the project to investigate new thread
      security issues induced by Voice Over IP (VoIP) protocols and
      web2.0. Madynes has the lead on this project.</p>
      <p>In this project we have delivered a framework for protocol
      fuzzing (test by fault injection) with a better feedback than
      the simple ping usually used in the domain. A grey-box
      approach is proposed which uses tainted data analysis to
      observe the impact on memory of an injection of one or
      several protocol message. More informations are extracted to
      build graph where node a tainted memory states and edges
      sequences of system calls that leads to the states. On these
      informations some metrics can be calculated and they allows
      comparisons of sequences of injections generated by several
      fuzzers (sequences generators). These informations also gives
      feedback to the generation process in order to get a better
      test coverage for a given quantity of injections.</p>
      <p>All the proposed mechanisms have been implemented in the
      Madynes KIF fuzzing framework and used on some open source
      SIP implementations.. One publication describing this work is
      submitted and all details are given in a research report 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid32" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
      <p>The last task started in september 2010 relates to the
      deployment of various VoIP honypots on the Loria-Inria Grand
      Est's High Security Lab infrastructure. A first round of
      network traces collection has been achieved and some
      improvements on the honeypots interactions have been
      identified for the next collection round.</p>
    </subsection>
    <subsection id="uid114" level="1">
      <bodyTitle>MAPE</bodyTitle>
      <participants>
        <person key="madynes-2006-idm72374453680">
          <firstname>Isabelle</firstname>
          <lastname>Chrisment</lastname>
          <moreinfo>contact</moreinfo>
        </person>
        <person key="madynes-2006-idm72374388848">
          <firstname>Thibault</firstname>
          <lastname>Cholez</lastname>
        </person>
      </participants>
      <descriptionlist>
        <label>Dates</label>
        <li id="uid115">
          <p noindent="true">January 2008 - Mars 2011</p>
        </li>
        <label>Partners</label>
        <li id="uid116">
          <p noindent="true">LIP6-CNRS UPMC Paris 6, INRIA Nancy
          Grand-Est (MADYNES)</p>
        </li>
      </descriptionlist>
      <p>MAPE (Measurement and Analysis of Peer-to-peer Exchanges
      for pedocriminality fighting and traffic profiling) is a
      research project funded by the French Research Agency (ANR).
      The goal of the project is to measure and analyze
      peer-to-peer exchanges for paedocriminality fighting and
      traffic profiling.</p>
      <p>The main MADYNES contributions to this project are related
      to the active measurements and the analysis at the
      application level. The active measurement requires the design
      of a distributed measurement infrastructure, in order to
      achieve the best complementarity among the different
      measurement clients. The issues in the analysis at the
      application level raises some research questions about how
      communities are structured and how this can be observed both
      active and passive measurements.</p>
      <p>In 2010, we focused on the deployment of HAMACK, a
      distributed architecture that aims to investigate and control
      the spread of contents in the real KAD network. We launched
      an large-scale experiment to collect data related to the
      paedophile contents. We monitored the activity (files shared
      and requested) of 72 keywords (half of them being related to
      paedophilia) over two weeks. This experiment was done within
      the context of the High Security Laboratory at INRIA Nancy
      Grand Est. The ongoing analysis of the collected data aims to
      characterize paedophiles' sharing behavior in P2P
      networks.</p>
    </subsection>
    <subsection id="uid117" level="1">
      <bodyTitle>Univerself</bodyTitle>
      <participants>
        <person key="PASUSERID">
          <firstname>Martin</firstname>
          <lastname>Barrere</lastname>
        </person>
        <person key="madynes-2006-idm72374419456">
          <firstname>Rémi</firstname>
          <lastname>Badonnel</lastname>
        </person>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
        </person>
        <person key="madynes-2006-idm72374434624">
          <firstname>Emmanuel</firstname>
          <lastname>Nataf</lastname>
        </person>
      </participants>
      <descriptionlist>
        <label>Dates</label>
        <li id="uid118">
          <p noindent="true">September 2010 - August 2013</p>
        </li>
        <label>Partners</label>
        <li id="uid119">
          <p noindent="true">18 Industrial or Academic Partners,
          Project Leader : Alcatel Lucent Bell Labs</p>
        </li>
      </descriptionlist>
      <p>This FP7 european integrated project aims at consolidating
      the autonomic methods and techniques supporting the
      management of the future Internet, and at integrating these
      methods into a unified management framework. The objective of
      this framework is to address the management issues of the
      evolving Internet through the self-organisation of the
      control plane and the empowerment of the management plane
      with cognition. Our work in the Univerself project mainly
      concerns the security and safety challenges posed by the
      unified management framework, in particular the prevention of
      configuration vulnerabilities. Since the beginning of the
      project, we have analysed through a state of the art
      different vulnerability management strategies for supporting
      the self-configuration of autonomic networks and systems. We
      have distinguished methods for identifying known
      vulnerabilities (based on knowledge repositories) and methods
      for discovering unknown vulnerabilities (performed at an
      earlier stage). We are particularly interested in the recent
      standardization efforts done for specifying the description
      of configuration vulnerabilities (Open Vulnerability
      Assessment Language). We have also considered the large
      variety of techniques already proposed in the area of change
      management, such as techniques for evaluating the impact of a
      change or for assessing the risks associated to that
      change.</p>
    </subsection>
    <subsection id="uid120" level="1">
      <bodyTitle>ACDA-P2P</bodyTitle>
      <participants>
        <person key="madynes-2006-idm72374453680">
          <firstname>Isabelle</firstname>
          <lastname>Chrisment</lastname>
          <moreinfo>contact</moreinfo>
        </person>
        <person key="madynes-2006-idm72374388848">
          <firstname>Thibault</firstname>
          <lastname>Cholez</lastname>
        </person>
        <person key="PASUSERID">
          <firstname>Andreea</firstname>
          <lastname>Orosanu</lastname>
        </person>
      </participants>
      <descriptionlist>
        <label>Dates</label>
        <li id="uid121">
          <p noindent="true">Avril 2010 - Décembre 2011</p>
        </li>
        <label>Partners</label>
        <li id="uid122">
          <p noindent="true">UTT , LORIA (MADYNES)</p>
        </li>
      </descriptionlist>
      <p>ACDA P2P (Approche collaborative pour la détection
      d'attaques dans les réseaux pair à pair) is a research
      project funded by the GIS 3SGS which aims at strengthening
      and developing a multidisciplinary community in the field of
      the surveillance, of the safety and of the safety(security)
      of the big systems.</p>
      <p>The goal of this project is to propose a new monitoring
      architecture, which is able to observe the peers behavior and
      to collect measurements relevant to detect attacks while not
      being intrusive and detectable. KAD and BitTorrent will be
      studied as target P2P networks. We focus more specifically on
      collaboration between distributed probes in charge of
      directly detecting attacks if possible, or collecting data
      for a further analyzis. This collaboration induces new
      challenges:</p>
      <simplelist>
        <li id="uid123">
          <p noindent="true">coordination of collected measurements
          in order to have a global view of the network;</p>
        </li>
        <li id="uid124">
          <p noindent="true">design of indicators revealing a
          malicious behavior;</p>
        </li>
        <li id="uid125">
          <p noindent="true">optimization of data collection
          through learning methods;</p>
        </li>
        <li id="uid126">
          <p noindent="true">security issues to avoid
          vulnerabilities and weaknesses.</p>
        </li>
      </simplelist>
      <p>In 2010, we established a state of the art related to the
      monitoring architectures and approaches for P2P networks, the
      related security issues and some existing collaborative
      approaches for attack detection  
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid33" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. We also studied attacks and
      monitoring actions on the KAD DHT to determine the origin of
      these suspicious peers and their operating mode  
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid30" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. As the popular files and the
      associated keywords are generally the main target of these
      attacks, in a first time, we performed experiments that aims
      to establish a correlation between content popularity and
      attacks.</p>
    </subsection>
    <subsection id="uid127" level="1">
      <bodyTitle>SCAMSTOP</bodyTitle>
      <participants>
        <person key="madynes-2006-idm72374457424">
          <firstname>Olivier</firstname>
          <lastname>Festor</lastname>
          <moreinfo>contact</moreinfo>
        </person>
        <person key="madynes-2006-idm72374408832">
          <firstname>Mohamed</firstname>
          <lastname>Nassar</lastname>
        </person>
      </participants>
      <descriptionlist>
        <label>Dates</label>
        <li id="uid128">
          <p noindent="true">Avril 2010 - Décembre 2011</p>
        </li>
        <label>Partners</label>
        <li id="uid129">
          <p noindent="true">INRIA Nancy Grand Est (MADYNES)</p>
        </li>
      </descriptionlist>
      <p>In traditional telecommunication, various experts estimate
      that fraud accounts for annual losses at an average of 5% of
      the operators revenue and still increasing at a rate of more
      than 10% yearly. Hence, with the openness and low cost
      structure of voice over IP (VoIP) service one can expect an
      even higher threat of fraud and higher losses of revenue
      making fraud and misuse of services one of the main
      challenges to VoIP providers. Fraud detection has been an
      active research and development area in the world of banking
      and credit card industry. In the VoIP area, there is still
      hardly any research or products that can assist providers in
      detecting anomalous behaviour. To fill in this gap, SCAMSTOP
      will provide a complete framework/solution for automatic
      fraud detection that alarms providers when suspicious
      behaviour is detected. The design of the SCAMSTOP fraud
      detection tools will be based on two aspects. On the one
      side, SCAMSTOP will use well known methods for statistical
      behavioural modelling and anomaly detection that have proven
      their efficiency in the area of credit card, banking and
      telecommunication and apply them to Internet telephony
      services. Of special interest here is characterizing the
      normal usage behaviour while taking into consideration the
      offered service plans and service structure. On the other
      side, innovative approaches based on multi-protocol event
      correlation that takes into account the specific nature of
      VoIP protocols and components will be developed. This
      solution will not only be designed to achieve a high
      detection rate but it will also be optimized to be resource
      efficient as well. To assess the efficiency and usability of
      the developed tools and mechanisms, the SCAMSTOP fraud
      detection system will be intensively tested and probed
      throughout the project. The consortium is a healthy mixture
      of SMEs including VoIP service provider, VoIP security and
      signalling products manufacturers as well as reputed research
      organizations.</p>
      <p>In 2010 we have designed the full functional and physical
      architecture of the fraud protection framework 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#madynes-2010-bid34" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
    </subsection>
  </contrats>
  <international id="uid130">
    <bodyTitle>Other Grants and Activities</bodyTitle>
    <subsection id="uid131" level="1">
      <bodyTitle>Regional Initiatives</bodyTitle>
      <p>The TEAM is involved in several actions of the regional
      CPER (Contrat Plan Etat Region) initiative on networked
      security and more recently security of industrial networked
      systems. We are also involved in the smart living intiative
      of the CPER where we provide our expertise on embedded
      operating systems and sensors.</p>
    </subsection>
    <subsection id="uid132" level="1">
      <bodyTitle>National Initiatives</bodyTitle>
      <p>The team is participating in several national research
      projects : ANR MAPE, ANR SARAH and coordinator of the ANR
      VAMPIRE project. In addition the team is involved in one P2P
      project with the University of Troyes (GIS 3S).</p>
      <p>Olivier Festor is member of the board of the Next
      Generation Internet RESCOM CNRS-INRIA summer school. The team
      is regularly contributing to the organization of the school
      and is a contributor to several tutorials given during the
      school week. Olivier Festor is member of the board of the
      INRIA-Alcatel cooperation as part of the Alcatel research
      partnership. He is also member of the french national
      alliance on digital science (ALLISTENE) commission on future
      networks.</p>
    </subsection>
    <subsection id="uid133" level="1">
      <bodyTitle>European Initiatives</bodyTitle>
      <p>EMANICS, the europea network of excellence managed by the
      team, was completed in May 2010. The network of excellence
      was awared by the review team aof the european commission s
      an outstanding project and for the third year in a row, as an
      example of integration and joint executed research
      activites.</p>
      <p>A follow-up to EMANICS called MOOSE was submitted in call
      5. The proposal passed the evaluation but was ranked 2nd out
      of 10 proposals while ony one got funded.</p>
      <p>MADYNES has an ongoing collaboration with the university
      of Luxembourg on network security. Two joint thesis are part
      of this collaboration : the thesis of Gerard Wagener on high
      interaction honeypot models and the thesis of Sheila Becker
      on game theory-based protocol fuzzing.</p>
      <p>We are also members of the EUNICE consortium. EUNICE has
      been established to foster the mobility of students, faculty
      members and research scientists working in the field of
      information and communication technologies and to promote
      educational and research cooperations between its member
      institutions. The major event of EUNICE is an annual summer
      school which brings together lecturers, researchers, students
      and people from the industry across Europe for one week of
      presentations, discussions and networking. Isabelle Chrisment
      is member of EUNICE technical committee.</p>
    </subsection>
    <subsection id="uid134" level="1">
      <bodyTitle>International Initiatives</bodyTitle>
      <p>We actively participate to the Internet Research Task
      Force (IRTF) Network Management Research Group ( 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.irtf.org/charter?gtype=rg&amp;group=nmrg" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">NMRG</ref>).</p>
      <p>We maintain several international relationships, either
      through a formal cooperation or on an informal basis. The
      largest international cooperation is currenlty performed
      under the EMANICS network of excellence described earlier in
      this report.</p>
      <p>In the context of a cooperation between the MADYNES EPI
      and the MASECNESS team, Emmanuel Nataf spent one week at the
      Polytechnical Superior National School (PSNS) of the Yaoundé
      University in august 2010. During this period he worked with
      phD and master students and animated a tutorial on network
      supervision. The goal of this stay was to carry on with the
      last comming in september 2009 of Mr Thomas Djotio, assistant
      professor at PSNS. One objective was to prepare the arrival
      in Nancy of two phD an one master students for one month in
      october 2010 and for Mr Djotio that cames from october to
      december 2010.</p>
      <p>This collaboration has permitted the finalization of a
      common research project. Two main researches directions are
      considered, one is on the configuration management and the
      other is on intrusion detection system. These topics are both
      in the wireless sensors networks (WSN) scope and are focused
      to the widespread technology 6LowPan. One phD student from
      the PSNS is working for each research subject.</p>
      <p>The research on configuration management aims to study the
      integration between the Internet standardized configuration
      management and the configuration of WSN. The main motivation
      is that WSN in general and particuarly 6LowPan based WSN
      extend the Internet and so should be managed like it. The
      main difficulty envisioned is that WSN are very resources
      restricted networks more than the Internet and so Internet
      standards solutions could not be implemented without specific
      adaptation. A first step will be to identify what is a
      configuration of a WSN and to propose a data model and
      associated semantic. The standard YANG data model language
      will be the modeling tool because of its expressivity and
      data constraints specification capabilities (and because it
      is the Internet standard for configuration data modeling).
      Following will be the study of a rigth sized architecture for
      configuration management that can support both the Internet
      standard NETCONF protocol and its use on WSN.</p>
      <p>The research on Intrusion Detection System (IDS) in WSN
      aims to study a new model for intrusion detection in WSN. IDS
      systems have already been widely invesitgated in the last
      five years, especially on WSN, but there is no result on the
      6LowPan technology. So there is an important gap to fill
      because WSN will be an easy starting point for intruder to
      abuse, corrupt, destroy either the WSN either the part of the
      Internet that is connected with it. WSN are usually resources
      to much restricted to have robust security mechanisms (like
      an RSA key) and the first work to do is to stand a model to
      detect an intrusion from alterations on the WSN it involves
      with the less number of false positive (an intrusion that is
      not an intrusion but an usual behavior deviation). The main
      second part of the work will be to define and deploy an IDS
      architecture generic enough to be used by any 6LowPan based
      WSN and applications.</p>
    </subsection>
    <subsection id="uid135" level="1">
      <bodyTitle>Mobility</bodyTitle>
      <p>Italo Da Costa from Georgia Tech, spent 3 months in the
      team, working on PhP-based applications fuzzing.</p>
      <p>Jérôme François spent three weeks at the University of
      Twente to work with the team of Aiko Pras on intrusion
      detection based on flow analysis.</p>
      <p>Thomas Djotio from the Polytecnic Institute of Yaoundé,
      Cameroun spent two months in the team together with three of
      his students, working sensor networks configuration and
      monitoring.</p>
    </subsection>
  </international>
  <diffusion id="uid136">
    <bodyTitle>Dissemination</bodyTitle>
    <subsection id="uid137" level="1">
      <bodyTitle>Animation of the scientific community</bodyTitle>
      <p>Olivier Festor is the Co-Chair together with Aiko Pras
      from University of Twente of the IFIP Working-Group 6.6 on
      Network and systems management. This working group is
      actively involved the animation of most major conferences in
      this research area and organizes frequent meetings and
      workshops on the domain.</p>
      <p>Olivier Festor chaired sessions at the following
      conferences: IFIP/IEEE NOMS'2010 (session on Routing),
      Mobiquitous'2010 (session on Energy efficiency and
      awareness), IEEE/IFIP CNSM'2010 (session on Energy
      Management).</p>
      <p>Olivier Festor served as a TPC Member of the following
      2010 events: IFIP Autonomous Infrastructures Management and
      Security (AIMS'2010), IEEE/IFIP International Conference on
      Network and Service Management (CNSM'2010), IEEE/IFIP Network
      Operations and Management Symposium (NOMS'2010), IEEE
      Globecom, Communications Software, Services and Multimedia
      Applications Symposium (CSSMA), Malware 2010, IEEE/IFIP
      IEEE/IFIP International Workshop on Network Embedded
      Management and Applications(NEMA'2010), Francophone
      COnference on Network and Service Management (GRES'2010),
      CloudMan 2010, EUNICE'2010, 2010 IEEE Wireless Communications
      and Networking Conference.</p>
      <p>Olivier Festor has been appointed General Chair for IFIP
      AIMS'2011 and TPC Co-Chair for IEEE/IFIP CNSM'2011.</p>
      <p>Olivier Festor is member of the board of editors of the
      Springer Journal of Network and Systems Management. In
      october 2010, he was appointed as a member of the editorial
      board of the IEEE Transactions on Network and Service
      Management.</p>
      <p>Isabelle Chrisment was member of the following technical
      program committees : ACM/IEEE/IFIP AIMS'2010 (International
      Conference on Autonomous Infrastructure, Management and
      Security), NOTERE 2010. She was also member of the steering
      committee of SARSSI 2010.</p>
    </subsection>
    <subsection id="uid138" level="1">
      <bodyTitle>Teaching</bodyTitle>
      <p>There is a high demand on networking courses in the
      various universities in which LORIA is par. This puts high
      pressure on MADYNES members which are all in charge of
      numerous courses in this domain. Especially the team
      professors and associate professors ensure more than the
      required amount of teaching obligation in their respective
      institutions: IUT, bachelor, master, ESIAL and École des
      Mines de Nancy engineering schools. In this section, we only
      enumerate the courses that are directly related to our
      research activity.</p>
      <p>Within the Master degree, SSR (Services, Security and
      Networks) specialization, Isabelle Chrisment is in charge of
      the course entitled 
      <i>Advanced Networking</i>. This course is one of the five
      foundation courses given to the students that follow a
      research and professional cursus in Networking in Nancy.</p>
      <p>André Schaff is the Director of the ESIAL Engineering
      School. Isabelle Chrisment is co-directing the school and is
      in charge of the students recruitement process. Remi Badonnel
      is heading the Telecommunications and Networks specialization
      of the 2nd and 3rd years at the ESIAL engineering school.
      They teach the networking related courses in this cursus.</p>
      <p>Laurent Ciarletta is heading the specialization Safe
      Systems Architecture of the Computer Science and IT
      department of the Ecole des Mines de Nancy ("Grande Ecole",
      Engineering School, Master degree level). He is most notably
      in charge of Advanced Networking, Middleware, Component-based
      software development, Pervasive Computing, Networking and
      Systems courses at the Ecole des Mines de Nancy. He is also
      co-responsible for the IPISO Master (Ecole des Mines de Paris
      - Nancy - Saint Etienne) and specifically the Software
      Architecture class. Notably, he is co-responsible for the
      "Businesses: the digital challenge 
      <i>Entreprises : le défi numérique</i>, a class within the
      ARTEM alliance (ICN - Business School, Ecole des Mines de
      Nancy, Ecole d'Art / School of Art).</p>
      <p>In 2010, the team was involved in the setup of new courses
      on : Android programming (Abdelkader Lahmadi and Laurent
      Ciarletta) and Distributed Algorithms (Abdelkader Lahmadi and
      Olivier Festor).</p>
    </subsection>
    <subsection id="uid139" level="1">
      <bodyTitle>Tutorials, invited talks, panels,
      presentations</bodyTitle>
      <p>In addition to the presentation of all papers published in
      conferences in 2010, the team members made the following
      public talks:</p>
      <simplelist>
        <li id="uid140">
          <p noindent="true">Olivier Festor was a panelist at
          IEEE/IFIP NOMS'2010 is Osaka in the panel on Programmable
          Networks;</p>
        </li>
        <li id="uid141">
          <p noindent="true">Olivier Festor and Humberto Abdlenur
          gave a talk on fuzzing-based vulnerability at a joint
          INRIA-Safe River workshop.</p>
        </li>
        <li id="uid142">
          <p noindent="true">Olivier Festor presented the LHS
          architecture and performed experiments at the LHS
          inaugural event in july 2010.</p>
        </li>
        <li id="uid143">
          <p noindent="true">Remi Badonnel gave a talk on the
          challenges of risk management in VoIP networks at the ONR
          FCNS conference in June in Prague, Czech Republic.</p>
        </li>
        <li id="uid144">
          <p noindent="true">Laurent Andrey presented the progress
          of the Vampire project at the ANR days in december 2010
          in Rennes, France.</p>
        </li>
        <li id="uid145">
          <p noindent="true">Olivier Festor participated to a
          public panel on Cybercrime and Internet fear at the Café
          des Sciences in Metz in december 2010 and gave several
          interviews to journals and TV channels on the research in
          Internet Security.</p>
        </li>
        <li id="uid146">
          <p noindent="true">Isabelle Chrisment and Olivier Festor
          presented MADYNES work on monitoring and controlling
          paedophile contents in the KAD P2P network. Journée
          d'échange entre spécialistes en informatique et
          Gendarmerie Nationale, Police Judiciaire et Douane
          Judiciaire organisée par le LERTI et INRIA Grenoble.
          Septembre 2010.</p>
        </li>
      </simplelist>
    </subsection>
    <subsection id="uid147" level="1">
      <bodyTitle>Commissions</bodyTitle>
      <p>Team members participated to the following Ph.D. defense
      committees :</p>
      <simplelist>
        <li id="uid148">
          <p noindent="true">Patrick 
          <span class="smallcap" align="left">Graatz</span>, Ph.D.
          in Computer Science from the University of Luxemburg.
          Title: 
          <i>: Approaches for Collaborative Filtering in
          distributed environments</i>, february 2010. (Laurent
          Ciarletta)</p>
        </li>
        <li id="uid149">
          <p noindent="true">Tiago 
          <span class="smallcap" align="left">Fioreze</span>, Ph.D.
          in Computer Science from the University of Twente, The
          Netherlands. Title: 
          <i>Self-management of hybrid optical and packet switching
          networks</i>, february 2010. (Olivier Festor)</p>
        </li>
        <li id="uid150">
          <p noindent="true">Shahab 
          <span class="smallcap" align="left">Gashti</span>, Ph.D.
          in Computer Science from Université Pierre et Marie
          Curie, France. Title: 
          <i>Architecture de la découverte de services pour les
          réseaux de domicile communautaires</i>, Mars 2010,
          (Isabelle 
          <span class="smallcap" align="left">
          Chrisment</span>).</p>
        </li>
        <li id="uid151">
          <p noindent="true">Ion 
          <span class="smallcap" align="left">Alberdi</span>, Ph.D.
          in Computer Science from INSA Toulouse. Title: 
          <i>Malicious trafic observation using a framework
          toparallelize and compose midpoint inspection
          devices</i>, april 2010. (Olivier Festor)</p>
        </li>
        <li id="uid152">
          <p noindent="true">Stere 
          <span class="smallcap" align="left">Preda</span>, Ph.D.
          in Computer Science from Institut Telecom - Telecom
          Bretagne . Title: 
          <i>Reliable Context Aware Security Policy Deployment with
          Applications to IPv6 Environments</i>, april 2010.
          (Olivier Festor)</p>
        </li>
        <li id="uid153">
          <p noindent="true">Stephane 
          <span class="smallcap" align="left">Weiss</span>, Ph.D.
          in Computer Science from Henri Poincaré - Nancy 1
          University. Title: 
          <i>Edition collaborative massive sur réseaux
          Pair-a-Pair</i>, october 2010. (Olivier Festor)</p>
        </li>
        <li id="uid154">
          <p noindent="true">Venkatesan 
          <span class="smallcap" align="left">
          Balakrishnan</span>Ph.D. in Computer Science from
          Macquarie University, Australia, Title: 
          <i>Trust enhanced security framework for mobile ad hoc
          wireless networks</i>, November 2010, (Isabelle 
          <span class="smallcap" align="left">
          Chrisment</span>).</p>
        </li>
        <li id="uid155">
          <p noindent="true">Charbel 
          <span class="smallcap" align="left">Rahhal</span>, Ph.D.
          in Computer Science from Henri Poincaré - Nancy 1
          University. Title: 
          <i>Wikis sémantiques distribués sur réseaux
          pair-à-pair</i>, november 2010. (Isabelle Chrisment,
          Olivier Festor)</p>
        </li>
      </simplelist>
      <p>Team members participated to the following Habilitation
      Degree defense committees:</p>
      <simplelist>
        <li id="uid156">
          <p noindent="true">Yacine 
          <span class="smallcap" align="left">Ghamri
          Doudane</span>, Hailitation Degree in Computer Science
          from Paris-Est University. Title: 
          <i>Contributions a l'amélioration de l'utilisation des
          ressources dans les réseaux de paquets sans fil</i>,
          december 2010. (Olivier Festor)</p>
        </li>
      </simplelist>
    </subsection>
  </diffusion>
  <biblio id="bibliography" html="bibliography" numero="10" titre="Bibliography">
    <biblStruct dedoublkey="0743" id="madynes-2010-bid35" type="article" rend="year" n="cite:desaquisannes:2010:hal-00447682:1">
      <identifiant type="hal" value="hal-00447682"/>
      <analytic>
        <title level="a">Formal Verification of Secure Group
        Communications Using AVISPA and TURTLE</title>
        <author>
          <persName>
            <foreName>Pierre</foreName>
            <surname>De Saqui-Sannes</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>Thierry</foreName>
            <surname>Villemur</surname>
            <initial>T.</initial>
          </persName>
          <persName>
            <foreName>Benjamin</foreName>
            <surname>Fontan</surname>
            <initial>B.</initial>
          </persName>
          <persName>
            <foreName>Sara</foreName>
            <surname>Mota</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Mohamed Salah</foreName>
            <surname>Bouassida</surname>
            <initial>M. S.</initial>
          </persName>
          <persName key="cassis-2006-idm102849234000">
            <foreName>Najah</foreName>
            <surname>Chridi</surname>
            <initial>N.</initial>
          </persName>
          <persName key="madynes-2006-idm72374453680">
            <foreName>Isabelle</foreName>
            <surname>Chrisment</surname>
            <initial>I.</initial>
          </persName>
          <persName key="cassis-2006-idm102849262976">
            <foreName>Laurent</foreName>
            <surname>Vigneron</surname>
            <initial>L.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid00910" x-editorial-board="yes" x-international-audience="yes">
        <title level="j">The Innovations in Systems and Software
        Engineering journal</title>
        <imprint>
          <dateStruct>
            <year>2010</year>
          </dateStruct>
          <biblScope type="pages">125-133</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/hal-00447682" type="hal" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>hal-00447682</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="0319" id="madynes-2010-bid20" type="article" rend="year" n="cite:BECK:2010:INRIA-00531215:1">
      <identifiant type="hal" value="inria-00531215"/>
      <analytic>
        <title level="a">Autonomic Renumbering in the Future
        Internet</title>
        <author>
          <persName key="madynes-2006-idm72374425456">
            <foreName>Frédéric</foreName>
            <surname>Beck</surname>
            <initial>F.</initial>
          </persName>
          <persName key="madynes-2006-idm72374453680">
            <foreName>Isabelle</foreName>
            <surname>Chrisment</surname>
            <initial>I.</initial>
          </persName>
          <persName>
            <foreName>Ralph</foreName>
            <surname>Droms</surname>
            <initial>R.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid00757" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0163-6804</idno>
        <title level="j">IEEE Communications Magazine</title>
        <imprint>
          <biblScope type="volume">48</biblScope>
          <dateStruct>
            <month>07</month>
            <year>2010</year>
          </dateStruct>
          <biblScope type="pages">86-92</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00531215/PDF/renumbering_cameraReadyv2.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00531215/ 
          <allowbreak/>PDF/ 
          <allowbreak/>renumbering_cameraReadyv2. 
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="2074" id="madynes-2010-bid1" type="inbook" rend="year" n="cite:FRANCOIS:2010:INRIA-00536067:1">
      <identifiant type="hal" value="inria-00536067"/>
      <identifiant type="doi" value="10.1007/978-3-642-16626-6_12"/>
      <analytic>
        <author>
          <persName key="madynes-2006-idm72374402896">
            <foreName>Jérôme</foreName>
            <surname>François</surname>
            <initial>J.</initial>
          </persName>
          <persName key="madynes-2010-idm163901534320">
            <foreName>Humberto</foreName>
            <surname>Abdelnur</surname>
            <initial>H.</initial>
          </persName>
          <persName key="madynes-2006-idm72374446480">
            <foreName>Radu</foreName>
            <surname>State</surname>
            <initial>R.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
        <title level="a">Semi-Supervised Fingerprinting of Protocol
        Messages</title>
      </analytic>
      <monogr>
        <title level="m">Computational Intelligence in Security for
        Information Systems 2010</title>
        <imprint>
          <biblScope type="volume">85</biblScope>
          <publisher>
            <orgName>Springer-Verlag</orgName>
          </publisher>
          <dateStruct>
            <month>11</month>
            <year>2010</year>
          </dateStruct>
          <biblScope type="pages">107-115</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00536067/PDF/cisis10.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00536067/ 
          <allowbreak/>PDF/ 
          <allowbreak/>cisis10. 
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="2780" id="madynes-2010-bid19" type="inproceedings" rend="year" n="cite:BECK:2010:INRIA-00531212:1">
      <identifiant type="hal" value="inria-00531212"/>
      <analytic>
        <title level="a">Automated and Secure IPv6 Configuration in
        Enterprise Networks</title>
        <author>
          <persName key="madynes-2006-idm72374425456">
            <foreName>Frédéric</foreName>
            <surname>Beck</surname>
            <initial>F.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
          <persName key="madynes-2006-idm72374453680">
            <foreName>Isabelle</foreName>
            <surname>Chrisment</surname>
            <initial>I.</initial>
          </persName>
          <persName>
            <foreName>Ralph</foreName>
            <surname>Droms</surname>
            <initial>R.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">6th International Conference on Network
        and Service Management - CNSM 2010</title>
        <loc>Niagara Falls Canada</loc>
        <imprint>
          <dateStruct>
            <month>10</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00531212/PDF/PID1466223.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00531212/ 
          <allowbreak/>PDF/ 
          <allowbreak/>PID1466223. 
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid293260">
          <title>International Conference on Networking and Services</title>
          <num>6</num>
          <abbr type="sigle">ICNS CNSM</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="3763" id="madynes-2010-bid3" type="inproceedings" rend="year" n="cite:BECKER:2010:INRIA-00546174:1">
      <identifiant type="hal" value="inria-00546174"/>
      <analytic>
        <title level="a">Improving Fuzz Testing using Game
        Theory</title>
        <author>
          <persName key="madynes-2008-idm507633090576">
            <foreName>Sheila</foreName>
            <surname>Becker</surname>
            <initial>S.</initial>
          </persName>
          <persName key="madynes-2010-idm163901534320">
            <foreName>Humberto</foreName>
            <surname>Abdelnur</surname>
            <initial>H.</initial>
          </persName>
          <persName key="madynes-2009-idm231957306560">
            <foreName>Jorge Lucangeli</foreName>
            <surname>Obes</surname>
            <initial>J. L.</initial>
          </persName>
          <persName key="madynes-2006-idm72374446480">
            <foreName>Radu</foreName>
            <surname>State</surname>
            <initial>R.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-editorial-board="yes" x-international-audience="yes" x-proceedings="yes">
        <title level="m">NSS'2010</title>
        <loc>Mebourne Suisse</loc>
        <imprint>
          <dateStruct>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00546174/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00546174/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid397064">
          <title>International Conference on Network and System Security</title>
          <num>4</num>
          <abbr type="sigle">NSS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="2546" id="madynes-2010-bid40" type="inproceedings" rend="year" n="cite:SHEILA:2010:INRIA-00546171:1">
      <identifiant type="hal" value="inria-00546171"/>
      <analytic>
        <title level="a">An Autonomic Testing Framework for IPv6
        Configuration Protocols</title>
        <author>
          <persName key="madynes-2008-idm507633090576">
            <foreName>Sheila</foreName>
            <surname>Becker</surname>
            <initial>S.</initial>
          </persName>
          <persName key="madynes-2010-idm163901534320">
            <foreName>Humberto</foreName>
            <surname>Abdelnur</surname>
            <initial>H.</initial>
          </persName>
          <persName key="madynes-2006-idm72374446480">
            <foreName>Radu</foreName>
            <surname>State</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>Thomas</foreName>
            <surname>Engel</surname>
            <initial>T.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">IFIP AIMS'2010</title>
        <loc>Zurich Suisse</loc>
        <imprint>
          <publisher>
            <orgName>Springer LNCS</orgName>
          </publisher>
          <publisher>
            <orgName type="organisation">University of
            Zurich</orgName>
          </publisher>
          <dateStruct>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00546171/PDF/fulltext.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00546171/ 
          <allowbreak/>PDF/ 
          <allowbreak/>fulltext. 
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid27069">
          <title>AIMS International Conference</title>
          <num>8</num>
          <abbr type="sigle"/>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="2546" id="madynes-2010-bid4" type="inproceedings" rend="year" n="cite:BECKER:2010:INRIA-00546171:1">
      <identifiant type="hal" value="inria-00546171"/>
      <identifiant type="doi" value="10.1007/978-3-642-13986-4_7"/>
      <analytic>
        <title level="a">An Autonomic Testing Framework for IPv6
        Configuration Protocols</title>
        <author>
          <persName key="madynes-2008-idm507633090576">
            <foreName>Sheila</foreName>
            <surname>Becker</surname>
            <initial>S.</initial>
          </persName>
          <persName key="madynes-2010-idm163901534320">
            <foreName>Humberto</foreName>
            <surname>Abdelnur</surname>
            <initial>H.</initial>
          </persName>
          <persName key="madynes-2006-idm72374446480">
            <foreName>Radu</foreName>
            <surname>State</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>Thomas</foreName>
            <surname>Engel</surname>
            <initial>T.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-editorial-board="yes" x-international-audience="yes" x-proceedings="yes">
        <title level="m">IFIP AIMS'2010</title>
        <loc>Zurich Suisse</loc>
        <imprint>
          <biblScope type="volume">6155/2010</biblScope>
          <publisher>
            <orgName>Springer LNCS</orgName>
          </publisher>
          <publisher>
            <orgName type="organisation">University of
            Zurich</orgName>
          </publisher>
          <dateStruct>
            <year>2010</year>
          </dateStruct>
          <biblScope type="pages">65-76</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00546171/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00546171/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid27069">
          <title>AIMS International Conference</title>
          <num>8</num>
          <abbr type="sigle"/>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="3330" id="madynes-2010-bid29" type="inproceedings" rend="year" n="cite:CHOLEZ:2010:INRIA-00490509:1">
      <identifiant type="hal" value="inria-00490509"/>
      <analytic>
        <title level="a">Efficient DHT attack mitigation through
        peers' ID distribution</title>
        <author>
          <persName key="madynes-2006-idm72374388848">
            <foreName>Thibault</foreName>
            <surname>Cholez</surname>
            <initial>T.</initial>
          </persName>
          <persName key="madynes-2006-idm72374453680">
            <foreName>Isabelle</foreName>
            <surname>Chrisment</surname>
            <initial>I.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-editorial-board="yes" x-international-audience="yes" x-proceedings="yes">
        <title level="m">Seventh International Workshop on Hot
        Topics in Peer-to-Peer Systems - HotP2P 2010</title>
        <loc>Atlanta États-Unis</loc>
        <imprint>
          <publisher>
            <orgName type="organisation">IEEE International
            Parallel &amp; Distributed Processing
            Symposium</orgName>
          </publisher>
          <dateStruct>
            <month>04</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00490509/PDF/HotP2P10-KAD_DHT_attack_mitigation-cholez.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00490509/ 
          <allowbreak/>PDF/ 
          <allowbreak/>HotP2P10-KAD_DHT_attack_mitigation-cholez. 
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid327526">
          <title>International Workshop on Hot Topics in Peer-to-Peer Systems</title>
          <num>7</num>
          <abbr type="sigle">Hot-P2P</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="4107" id="madynes-2010-bid28" type="inproceedings" rend="year" n="cite:CHOLEZ:2010:INRIA-00490347:1">
      <identifiant type="hal" value="inria-00490347"/>
      <analytic>
        <title level="a">Monitoring and Controlling Content Access
        in KAD</title>
        <author>
          <persName key="madynes-2006-idm72374388848">
            <foreName>Thibault</foreName>
            <surname>Cholez</surname>
            <initial>T.</initial>
          </persName>
          <persName key="madynes-2006-idm72374453680">
            <foreName>Isabelle</foreName>
            <surname>Chrisment</surname>
            <initial>I.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">International Conference on Communications
        - ICC 2010</title>
        <loc>Capetown Afrique Du Sud</loc>
        <imprint>
          <publisher>
            <orgName type="organisation">IEEE</orgName>
          </publisher>
          <dateStruct>
            <month>05</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00490347/PDF/ICC10-Monitoring_KAD_Contents-Cholez.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00490347/ 
          <allowbreak/>PDF/ 
          <allowbreak/>ICC10-Monitoring_KAD_Contents-Cholez. 
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid81826">
          <title>IEEE International Conference on Communications</title>
          <num>2010</num>
          <abbr type="sigle">ICC</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="4672" id="madynes-2010-bid31" type="inproceedings" rend="year" n="cite:CIARLETTA:2010:INRIA-00547474:1">
      <identifiant type="hal" value="inria-00547474"/>
      <analytic>
        <title level="a">Rssi Positioning Technics in
        Networks</title>
        <author>
          <persName key="madynes-2006-idm72374440480">
            <foreName>Laurent</foreName>
            <surname>Ciarletta</surname>
            <initial>L.</initial>
          </persName>
          <persName key="madynes-2010-idm163901531232">
            <foreName>Cyril</foreName>
            <surname>Auburtin</surname>
            <initial>C.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="no" x-proceedings="no">
        <title level="m">RESCOM 2010</title>
        <loc>GIENS France</loc>
        <imprint>
          <dateStruct>
            <month>06</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00547474/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00547474/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid346930">
          <title>Journées Pôle ResCom</title>
          <num>2010</num>
          <abbr type="sigle">RESCOM</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="2784" id="madynes-2010-bid14" type="inproceedings" rend="year" n="cite:DABBEBI:2010:INRIA-00538675:1">
      <identifiant type="hal" value="inria-00538675"/>
      <analytic>
        <title level="a">Automated Runtime Risk Management for
        Voice over IP Networks and Services</title>
        <author>
          <persName key="madynes-2009-idm231958288896">
            <foreName>Oussema</foreName>
            <surname>Dabbebi</surname>
            <initial>O.</initial>
          </persName>
          <persName key="madynes-2006-idm72374419456">
            <foreName>Rémi</foreName>
            <surname>Badonnel</surname>
            <initial>R.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">Network Operations and Management
        Symposium - Noms 2010</title>
        <loc>Osaka Japon</loc>
        <imprint>
          <publisher>
            <orgName type="organisation">IEEE</orgName>
          </publisher>
          <dateStruct>
            <month>04</month>
            <year>2010</year>
          </dateStruct>
          <biblScope type="pages">57 - 64</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00538675/PDF/noms.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00538675/ 
          <allowbreak/>PDF/ 
          <allowbreak/>noms. 
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid79563">
          <title>IEEE IFIP Network Operations and Management Symposium</title>
          <num>12</num>
          <abbr type="sigle">NOMS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="3984" id="madynes-2010-bid13" type="inproceedings" rend="year" n="cite:DABBEBI:2010:INRIA-00538685:1">
      <identifiant type="hal" value="inria-00538685"/>
      <analytic>
        <title level="a">Managing Risks at Runtime in VoIP Networks
        and Services</title>
        <author>
          <persName key="madynes-2009-idm231958288896">
            <foreName>Oussema</foreName>
            <surname>Dabbebi</surname>
            <initial>O.</initial>
          </persName>
          <persName key="madynes-2006-idm72374419456">
            <foreName>Rémi</foreName>
            <surname>Badonnel</surname>
            <initial>R.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">Autonomous Infrastructure, Management and
        Security (AIMS 2010)</title>
        <loc>Zurick Suisse</loc>
        <imprint>
          <publisher>
            <orgName type="organisation">IFIP</orgName>
          </publisher>
          <dateStruct>
            <month>06</month>
            <year>2010</year>
          </dateStruct>
          <biblScope type="pages">89-92</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00538685/PDF/aims.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00538685/ 
          <allowbreak/>PDF/ 
          <allowbreak/>aims. 
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid112928">
          <title>International Conference on Autonomous Infrastructure, Management and Security</title>
          <num>4</num>
          <abbr type="sigle">AIMS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="2438" id="madynes-2010-bid7" type="inproceedings" rend="year" n="cite:DOCARMO:2010:INRIA-00547461:1">
      <identifiant type="hal" value="inria-00547461"/>
      <analytic>
        <title level="a">A Honeypot Back-end to Support Security in
        VoIP Domains</title>
        <author>
          <persName>
            <foreName>Rodrigo</foreName>
            <surname>Do Carmo</surname>
            <initial>R.</initial>
          </persName>
          <persName key="madynes-2006-idm72374408832">
            <foreName>Mohamed</foreName>
            <surname>Nassar</surname>
            <initial>M.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-editorial-board="yes" x-international-audience="yes" x-proceedings="yes">
        <title level="m">Principles, Systems and Applications of IP
        Telecommunications (IPTCOMM)</title>
        <loc>Munich Allemagne</loc>
        <imprint>
          <dateStruct>
            <month>08</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00547461/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00547461/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid48880">
          <title>Conference on Principles, Systems and Applications of IP Telecommunications</title>
          <num>4</num>
          <abbr type="sigle">IPTComm</abbr>
        </meeting>
      </monogr>
      <note type="bnote">Poster</note>
    </biblStruct>
    <biblStruct dedoublkey="4251" id="madynes-2010-bid2" type="inproceedings" rend="year" n="cite:JEROME:2010:INRIA-00547367:1">
      <identifiant type="hal" value="inria-00547367"/>
      <analytic>
        <title level="a">Online Device Fingerprinting</title>
        <author>
          <persName key="madynes-2006-idm72374402896">
            <foreName>Jérôme</foreName>
            <surname>François</surname>
            <initial>J.</initial>
          </persName>
          <persName key="madynes-2006-idm72374446480">
            <foreName>Radu</foreName>
            <surname>State</surname>
            <initial>R.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
          <persName>
            <foreName>Thomas</foreName>
            <surname>Engel</surname>
            <initial>T.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-editorial-board="yes" x-international-audience="yes" x-proceedings="yes">
        <title level="m">3rd International Conference on
        Computational Intelligence in Security for Information
        Systems</title>
        <loc>Leon Espagne</loc>
        <imprint>
          <dateStruct>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00547367/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00547367/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid400762">
          <title>International Conference on Computational Intelligence in Security for Information Systems</title>
          <num>3</num>
          <abbr type="sigle">CISIS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="5244" id="madynes-2010-bid10" type="inproceedings" rend="year" n="cite:LAHMADI:2010:INRIA-00544976:1">
      <identifiant type="hal" value="inria-00544976"/>
      <identifiant type="doi" value="10.1109/NOMS.2010.5488464"/>
      <analytic>
        <title level="a">VeTo: An Exploit Prevention Language from
        Known Vulnerabilities in SIP Services</title>
        <author>
          <persName key="madynes-2010-idm163901556320">
            <foreName>Abdelkader</foreName>
            <surname>Lahmadi</surname>
            <initial>A.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-editorial-board="yes" x-international-audience="yes" x-proceedings="yes">
        <title level="m">IEEE/IFIP Network Operations and
        Management Symposium - NOMS 2010</title>
        <loc>Osaka Japon</loc>
        <imprint>
          <publisher>
            <orgName>IEEE</orgName>
          </publisher>
          <dateStruct>
            <month>04</month>
            <year>2010</year>
          </dateStruct>
          <biblScope type="pages">216-223</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00544976/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00544976/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid79563">
          <title>IEEE IFIP Network Operations and Management Symposium</title>
          <num>12</num>
          <abbr type="sigle">NOMS</abbr>
        </meeting>
      </monogr>
      <note type="bnote">ISBN :978-1-4244-5366-5 C.: Computer
      Systems Organization/C.2: COMPUTER-COMMUNICATION
      NETWORKS/C.2.3: Network Operations/C.2.3.0: Network
      management</note>
    </biblStruct>
    <biblStruct dedoublkey="2726" id="madynes-2010-bid25" type="inproceedings" rend="year" n="cite:LECLERC:2010:INRIA-00490306:1">
      <identifiant type="hal" value="inria-00490306"/>
      <identifiant type="doi" value="10.1007/978-3-642-13315-2"/>
      <analytic>
        <title level="a">A Stable Linked Structure Flooding for
        Mobile Ad Hoc Networks with Fault Recovery</title>
        <author>
          <persName key="madynes-2007-idm860520384">
            <foreName>Tom</foreName>
            <surname>Leclerc</surname>
            <initial>T.</initial>
          </persName>
          <persName key="madynes-2006-idm72374440480">
            <foreName>Laurent</foreName>
            <surname>Ciarletta</surname>
            <initial>L.</initial>
          </persName>
          <persName key="madynes-2006-idm72374431984">
            <foreName>André</foreName>
            <surname>Schaff</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>Thomas Michael Bohnert</foreName>
            <surname>Evgeny Osipov</surname>
            <initial>T. M. B.</initial>
          </persName>
          <persName>
            <foreName>Xavier</foreName>
            <surname>Masip-Bruin</surname>
            <initial>X.</initial>
          </persName>
        </editor>
        <title level="m">8th International Conference on
        Wired/Wireless Internet Communications - WWIC 2010</title>
        <loc>Luleå Suède</loc>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">6074</biblScope>
          <publisher>
            <orgName>Springer Berlin / Heidelberg</orgName>
          </publisher>
          <dateStruct>
            <month>06</month>
            <year>2010</year>
          </dateStruct>
          <biblScope type="pages">204-215</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00490306/PDF/SLSFwRecovery-Leclerc.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00490306/ 
          <allowbreak/>PDF/ 
          <allowbreak/>SLSFwRecovery-Leclerc. 
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid400798">
          <title>International Conference on Wired/Wireless Internet Communications - WWIC</title>
          <num>8</num>
          <abbr type="sigle">WWIC</abbr>
        </meeting>
      </monogr>
      <note type="bnote">The original publication is available at
      www.springerlink.com</note>
    </biblStruct>
    <biblStruct dedoublkey="4810" id="madynes-2010-bid26" type="inproceedings" rend="year" n="cite:LECLERC:2010:INRIA-00488902:1">
      <identifiant type="hal" value="inria-00488902"/>
      <analytic>
        <title level="a">SLSF: Stable Linked Structure Flooding For
        Mobile Ad Hoc Networks</title>
        <author>
          <persName key="madynes-2007-idm860520384">
            <foreName>Tom</foreName>
            <surname>Leclerc</surname>
            <initial>T.</initial>
          </persName>
          <persName key="madynes-2006-idm72374440480">
            <foreName>Laurent</foreName>
            <surname>Ciarletta</surname>
            <initial>L.</initial>
          </persName>
          <persName key="madynes-2006-idm72374431984">
            <foreName>André</foreName>
            <surname>Schaff</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">IEEE International Symposium on Wireless
        Pervasive Computing - ISWPC 2010</title>
        <loc>Modena Italie</loc>
        <imprint>
          <dateStruct>
            <month>05</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00488902/PDF/Leclerc.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00488902/ 
          <allowbreak/>PDF/ 
          <allowbreak/>Leclerc. 
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid319831">
          <title>International Symposium on Wireless Pervasive Computing</title>
          <num>2010</num>
          <abbr type="sigle">ISWPC</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="4143" id="madynes-2010-bid21" type="inproceedings" rend="year" n="cite:LECLERC:2010:INRIA-00534575:1">
      <identifiant type="hal" value="inria-00534575"/>
      <analytic>
        <title level="a">Multi-modeling and co-simulation-based
        mobile ubiquitous protocols and services development and
        assessment</title>
        <author>
          <persName key="madynes-2007-idm860520384">
            <foreName>Tom</foreName>
            <surname>Leclerc</surname>
            <initial>T.</initial>
          </persName>
          <persName key="madynes-2007-idm860523488">
            <foreName>Julien</foreName>
            <surname>Siebert</surname>
            <initial>J.</initial>
          </persName>
          <persName key="maia-2006-idm402315166384">
            <foreName>Vincent</foreName>
            <surname>Chevrier</surname>
            <initial>V.</initial>
          </persName>
          <persName key="madynes-2006-idm72374440480">
            <foreName>Laurent</foreName>
            <surname>Ciarletta</surname>
            <initial>L.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">7th International ICST Conference on
        Mobile and Ubiquitous Systems - Mobiquitous 2010</title>
        <loc>Sydney Australie</loc>
        <imprint>
          <dateStruct>
            <month>12</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00534575/PDF/mobiquitous2010.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00534575/ 
          <allowbreak/>PDF/ 
          <allowbreak/>mobiquitous2010. 
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid292393">
          <title>International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services</title>
          <num>7</num>
          <abbr type="sigle">Mobiquitous</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="4654" id="madynes-2010-bid17" type="inproceedings" rend="year" n="cite:NASSAR:2010:INRIA-00530167:1">
      <identifiant type="hal" value="inria-00530167"/>
      <analytic>
        <title level="a">Risk Management in VoIP Infrastructures
        using Support Vector Machines</title>
        <author>
          <persName key="madynes-2006-idm72374408832">
            <foreName>Mohamed</foreName>
            <surname>Nassar</surname>
            <initial>M.</initial>
          </persName>
          <persName key="madynes-2009-idm231958288896">
            <foreName>Oussema</foreName>
            <surname>Dabbebi</surname>
            <initial>O.</initial>
          </persName>
          <persName key="madynes-2006-idm72374419456">
            <foreName>Rémi</foreName>
            <surname>Badonnel</surname>
            <initial>R.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">6th International Conference on Network
        and Services Management - CNSM 2010</title>
        <loc>Niagara Falls Canada</loc>
        <imprint>
          <dateStruct>
            <month>10</month>
            <year>2010</year>
          </dateStruct>
          <biblScope type="pages">48–55</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00530167/PDF/73838.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00530167/ 
          <allowbreak/>PDF/ 
          <allowbreak/>73838. 
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid293260">
          <title>International Conference on Networking and Services</title>
          <num>6</num>
          <abbr type="sigle">ICNS CNSM</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="2406" id="madynes-2010-bid6" type="inproceedings" rend="year" n="cite:NASSAR:2010:INRIA-00519728:1">
      <identifiant type="hal" value="inria-00519728"/>
      <identifiant type="doi" value="10.1109/NSS.2010.79"/>
      <analytic>
        <title level="a">A framework for monitoring SIP enterprise
        networks</title>
        <author>
          <persName key="madynes-2006-idm72374408832">
            <foreName>Mohamed</foreName>
            <surname>Nassar</surname>
            <initial>M.</initial>
          </persName>
          <persName key="madynes-2006-idm72374446480">
            <foreName>Radu</foreName>
            <surname>State</surname>
            <initial>R.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">Fourth international conference on Network
        and System Security - NSS 2010</title>
        <loc>Melbourne Australie</loc>
        <imprint>
          <publisher>
            <orgName>IEEE</orgName>
          </publisher>
          <dateStruct>
            <month>09</month>
            <year>2010</year>
          </dateStruct>
          <biblScope type="pages">1–8</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00519728/PDF/nss10.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00519728/ 
          <allowbreak/>PDF/ 
          <allowbreak/>nss10. 
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid397064">
          <title>International Conference on Network and System Security</title>
          <num>4</num>
          <abbr type="sigle">NSS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="3883" id="madynes-2010-bid5" type="inproceedings" rend="year" n="cite:NASSAR:2010:INRIA-00497735:1">
      <identifiant type="hal" value="inria-00497735"/>
      <analytic>
        <title level="a">Labeled VoIP Data-set for Intrusion
        Detection Evaluation</title>
        <author>
          <persName key="madynes-2006-idm72374408832">
            <foreName>Mohamed</foreName>
            <surname>Nassar</surname>
            <initial>M.</initial>
          </persName>
          <persName key="madynes-2006-idm72374446480">
            <foreName>Radu</foreName>
            <surname>State</surname>
            <initial>R.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">EUNICE 2010</title>
        <loc>Trondheim Norvège</loc>
        <imprint>
          <dateStruct>
            <year>2010</year>
          </dateStruct>
          <biblScope type="pages">97-106</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00497735/PDF/main.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00497735/ 
          <allowbreak/>PDF/ 
          <allowbreak/>main. 
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid400830">
          <title>EUNICE</title>
          <num>2010</num>
          <abbr type="sigle">EUNICE</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="3365" id="madynes-2010-bid11" type="inproceedings" rend="year" n="cite:NATAF:2010:INRIA-00534434:1">
      <identifiant type="hal" value="inria-00534434"/>
      <analytic>
        <title level="a">End-to-end YANG-based Configuration
        Management</title>
        <author>
          <persName key="madynes-2006-idm72374434624">
            <foreName>Emmanuel</foreName>
            <surname>Nataf</surname>
            <initial>E.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">IEEE/IFIP Network Operations and
        Management Symposium - NOMS 2010</title>
        <loc>Osaka Japon</loc>
        <imprint>
          <publisher>
            <orgName>IEEE</orgName>
          </publisher>
          <publisher>
            <orgName type="organisation">IEEE/IFIP</orgName>
          </publisher>
          <dateStruct>
            <year>2010</year>
          </dateStruct>
          <biblScope type="pages">674–684</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00534434/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00534434/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
        <meeting id="cid79563">
          <title>IEEE IFIP Network Operations and Management Symposium</title>
          <num>12</num>
          <abbr type="sigle">NOMS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="3735" id="madynes-2010-bid24" type="inproceedings" rend="year" n="cite:NAVARRETEGUTIERREZ:2010:INRIA-00534600:1">
      <identifiant type="hal" value="inria-00534600"/>
      <analytic>
        <title level="a">Impact des dimensions spatiale et
        temporelle dans la modélisation d'un phénomène collectif de
        type "free-riding"</title>
        <author>
          <persName>
            <foreName>Tomas</foreName>
            <surname>Navarrete Gutierrez</surname>
            <initial>T.</initial>
          </persName>
          <persName key="madynes-2007-idm860523488">
            <foreName>Julien</foreName>
            <surname>Siebert</surname>
            <initial>J.</initial>
          </persName>
          <persName key="madynes-2006-idm72374440480">
            <foreName>Laurent</foreName>
            <surname>Ciarletta</surname>
            <initial>L.</initial>
          </persName>
          <persName key="maia-2006-idm402315166384">
            <foreName>Vincent</foreName>
            <surname>Chevrier</surname>
            <initial>V.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="no" x-proceedings="yes">
        <title level="m">18èmes Journées Francophones des Systèmes
        Multi-Agents - JFSMA'10</title>
        <loc>Mahdia Tunisie</loc>
        <imprint>
          <dateStruct>
            <month>10</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00534600/PDF/main.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00534600/ 
          <allowbreak/>PDF/ 
          <allowbreak/>main. 
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid345520">
          <title>Journées Francophones sur les Systèmes Multi-Agents</title>
          <num>18</num>
          <abbr type="sigle">JFSMA</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="5297" id="madynes-2010-bid36" type="inproceedings" rend="year" n="cite:POPI:2010:INRIA-00526006:1">
      <identifiant type="hal" value="inria-00526006"/>
      <analytic>
        <title level="a">WiMFlow: a distributed, self-adaptive
        Architecture for Flow Monitoring in Wireless Mesh
        Networks</title>
        <author>
          <persName key="madynes-2007-idm860529632">
            <foreName>Cristian</foreName>
            <surname>Popi</surname>
            <initial>C.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">2010 IEEE/IFIP Network Operations and
        Management Symposium</title>
        <loc>Osaka Japon</loc>
        <imprint>
          <publisher>
            <orgName>IEEE</orgName>
          </publisher>
          <dateStruct>
            <month>04</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00526006/PDF/62539_1.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00526006/ 
          <allowbreak/>PDF/ 
          <allowbreak/>62539_1. 
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid79563">
          <title>IEEE IFIP Network Operations and Management Symposium</title>
          <num>12</num>
          <abbr type="sigle">NOMS</abbr>
        </meeting>
      </monogr>
      <note type="bnote">C.: Computer Systems Organization/C.2:
      COMPUTER-COMMUNICATION NETWORKS</note>
    </biblStruct>
    <biblStruct dedoublkey="2425" id="madynes-2010-bid22" type="inproceedings" rend="year" n="cite:SIEBERT:2010:HAL-00452865:1">
      <identifiant type="hal" value="hal-00452865"/>
      <analytic>
        <title level="a">Agents and artefacts for multiple models
        co-evolution. Building complex system simulation as a set
        of interacting models</title>
        <author>
          <persName key="madynes-2007-idm860523488">
            <foreName>Julien</foreName>
            <surname>Siebert</surname>
            <initial>J.</initial>
          </persName>
          <persName key="madynes-2006-idm72374440480">
            <foreName>Laurent</foreName>
            <surname>Ciarletta</surname>
            <initial>L.</initial>
          </persName>
          <persName key="maia-2006-idm402315166384">
            <foreName>Vincent</foreName>
            <surname>Chevrier</surname>
            <initial>V.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">9th Int. Conf. on Autonomous Agents and
        Multiagent Systems - AAMAS 2010</title>
        <loc>Toronto Canada</loc>
        <imprint>
          <dateStruct>
            <month>05</month>
            <year>2010</year>
          </dateStruct>
          <biblScope type="pages">509-516</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.archives-ouvertes.fr/hal-00452865/PDF/article-aamas2010_siebert_v2.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>archives-ouvertes. 
          <allowbreak/>fr/ 
          <allowbreak/>hal-00452865/ 
          <allowbreak/>PDF/ 
          <allowbreak/>article-aamas2010_siebert_v2. 
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid112748">
          <title>International Conference on Autonomous Agents and Multiagent Systems</title>
          <num>9</num>
          <abbr type="sigle">AAMAS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="2426" id="madynes-2010-bid23" type="inproceedings" rend="year" n="cite:SIEBERT:2010:HAL-00426601:1">
      <identifiant type="hal" value="hal-00426601"/>
      <analytic>
        <title level="a">Agents and Artefacts for Multiple Models
        coordination. Objective and decentralized coordination of
        simulators.</title>
        <author>
          <persName key="madynes-2007-idm860523488">
            <foreName>Julien</foreName>
            <surname>Siebert</surname>
            <initial>J.</initial>
          </persName>
          <persName key="madynes-2006-idm72374440480">
            <foreName>Laurent</foreName>
            <surname>Ciarletta</surname>
            <initial>L.</initial>
          </persName>
          <persName key="maia-2006-idm402315166384">
            <foreName>Vincent</foreName>
            <surname>Chevrier</surname>
            <initial>V.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">SAC 2010 25th Symposium on Applied
        Computing - SAC 2010</title>
        <loc>Lausanne Suisse</loc>
        <imprint>
          <publisher>
            <orgName>ACM</orgName>
          </publisher>
          <dateStruct>
            <month>03</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.archives-ouvertes.fr/hal-00426601/PDF/sac2010_siebert_accept.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>archives-ouvertes. 
          <allowbreak/>fr/ 
          <allowbreak/>hal-00426601/ 
          <allowbreak/>PDF/ 
          <allowbreak/>sac2010_siebert_accept. 
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid23923">
          <title>ACM Symposium on Applied Computing</title>
          <num>25</num>
          <abbr type="sigle">SAC</abbr>
        </meeting>
      </monogr>
      <note type="bnote">ACM</note>
    </biblStruct>
    <biblStruct dedoublkey="6336" id="madynes-2010-bid32" type="techreport" rend="year" n="cite:abdelnur:2010:inria-00452015:1">
      <identifiant type="hal" value="inria-00452015"/>
      <monogr>
        <title level="m">Spectral Fuzzing: Evaluation &amp;
        Feedback</title>
        <author>
          <persName key="madynes-2010-idm163901534320">
            <foreName>Humberto</foreName>
            <surname>Abdelnur</surname>
            <initial>H.</initial>
          </persName>
          <persName key="madynes-2006-idm72374446480">
            <foreName>Radu</foreName>
            <surname>State</surname>
            <initial>R.</initial>
          </persName>
          <persName key="madynes-2009-idm231957306560">
            <foreName>Jorge Lucangeli</foreName>
            <surname>Obes</surname>
            <initial>J. L.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <month>Feb</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00452015" type="hal" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00452015</ref>
        </imprint>
      </monogr>
      <note type="bnote">RR-7193</note>
      <note type="typdoc">Rapport de recherche</note>
      <affiliation>
        <country>LU</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="6124" id="madynes-2010-bid0" type="techreport" rend="year" n="cite:BECK:2010:INRIA-00538922:1">
      <identifiant type="hal" value="inria-00538922"/>
      <monogr>
        <title level="m">High Security Laboratory - Network
        Telescope Infrastructure Upgrade</title>
        <author>
          <persName key="madynes-2006-idm72374425456">
            <foreName>Frédéric</foreName>
            <surname>Beck</surname>
            <initial>F.</initial>
          </persName>
          <persName key="madynes-2010-idm163901543568">
            <foreName>Alexandre</foreName>
            <surname>Boeglin</surname>
            <initial>A.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <month>11</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00538922/PDF/Technical_Report_LHS_Telescope_Upgrade.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00538922/ 
          <allowbreak/>PDF/ 
          <allowbreak/>Technical_Report_LHS_Telescope_Upgrade. 
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
      <note type="typdoc">Technical Report</note>
    </biblStruct>
    <biblStruct dedoublkey="5968" id="madynes-2010-bid38" type="techreport" rend="year" n="cite:BECK:2010:INRIA-00531207:1">
      <identifiant type="hal" value="inria-00531207"/>
      <monogr>
        <title level="m">Automatic IPv4 to IPv6 Transition - D2.1
        Metric and Addressing Algorithm</title>
        <author>
          <persName key="madynes-2006-idm72374425456">
            <foreName>Frédéric</foreName>
            <surname>Beck</surname>
            <initial>F.</initial>
          </persName>
          <persName key="madynes-2006-idm72374453680">
            <foreName>Isabelle</foreName>
            <surname>Chrisment</surname>
            <initial>I.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <month>06</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00531207/PDF/deliverable-2.1.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00531207/ 
          <allowbreak/>PDF/ 
          <allowbreak/>deliverable-2. 
          <allowbreak/>1. 
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
      <note type="typdoc">Contrat</note>
    </biblStruct>
    <biblStruct dedoublkey="5969" id="madynes-2010-bid37" type="techreport" rend="year" n="cite:BECK:2010:INRIA-00531208:1">
      <identifiant type="hal" value="inria-00531208"/>
      <monogr>
        <title level="m">Automatic IPv4 to IPv6 Transition D2.2 -
        Transition Engine Specification and Implementation</title>
        <author>
          <persName key="madynes-2006-idm72374425456">
            <foreName>Frédéric</foreName>
            <surname>Beck</surname>
            <initial>F.</initial>
          </persName>
          <persName key="madynes-2006-idm72374453680">
            <foreName>Isabelle</foreName>
            <surname>Chrisment</surname>
            <initial>I.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <month>06</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00531208/PDF/deliverable-2.2.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00531208/ 
          <allowbreak/>PDF/ 
          <allowbreak/>deliverable-2. 
          <allowbreak/>2. 
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
      <note type="typdoc">Contrat</note>
    </biblStruct>
    <biblStruct dedoublkey="5970" id="madynes-2010-bid39" type="techreport" rend="year" n="cite:BECK:2010:INRIA-00531209:1">
      <identifiant type="hal" value="inria-00531209"/>
      <monogr>
        <title level="m">Automatic IPv4 to IPv6 Transition D3.1 -
        Secured Transition Engine</title>
        <author>
          <persName key="madynes-2006-idm72374425456">
            <foreName>Frédéric</foreName>
            <surname>Beck</surname>
            <initial>F.</initial>
          </persName>
          <persName key="madynes-2006-idm72374453680">
            <foreName>Isabelle</foreName>
            <surname>Chrisment</surname>
            <initial>I.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <month>06</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00531209/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00531209/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="typdoc">Contrat</note>
    </biblStruct>
    <biblStruct dedoublkey="6305" id="madynes-2010-bid9" type="techreport" rend="year" n="cite:BOEGLIN:2010:INRIA-00524247:1">
      <identifiant type="hal" value="inria-00524247"/>
      <monogr>
        <title level="m">SecSIP Technical Documentation</title>
        <author>
          <persName key="madynes-2010-idm163901543568">
            <foreName>Alexandre</foreName>
            <surname>Boeglin</surname>
            <initial>A.</initial>
          </persName>
          <persName key="madynes-2010-idm163901556320">
            <foreName>Abdelkader</foreName>
            <surname>Lahmadi</surname>
            <initial>A.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
        <imprint>
          <biblScope type="number">RT-0393</biblScope>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <month>10</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00524247/PDF/RT-0393.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00524247/ 
          <allowbreak/>PDF/ 
          <allowbreak/>RT-0393. 
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
      <note type="typdoc">Technical Report</note>
    </biblStruct>
    <biblStruct dedoublkey="6306" id="madynes-2010-bid48" type="techreport" rend="year" n="cite:ALEXANDRE:2010:INRIA-00547831:1">
      <identifiant type="hal" value="inria-00547831"/>
      <monogr>
        <title level="m">SecSIP User Documentation</title>
        <author>
          <persName key="madynes-2010-idm163901543568">
            <foreName>Alexandre</foreName>
            <surname>Boeglin</surname>
            <initial>A.</initial>
          </persName>
          <persName key="madynes-2010-idm163901556320">
            <foreName>Abdelkader</foreName>
            <surname>Lahmadi</surname>
            <initial>A.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
        <imprint>
          <biblScope type="number">RT-0394</biblScope>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <month>07</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00547831/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00547831/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="typdoc">Technical Report</note>
    </biblStruct>
    <biblStruct dedoublkey="6076" id="madynes-2010-bid33" type="techreport" rend="year" n="cite:CHOLEZ:2010:INRIA-00533385:1">
      <identifiant type="hal" value="inria-00533385"/>
      <monogr>
        <title level="m">Etat de l'art : Réseaux pair à pair,
        supervision, sécurité et approches collaboratives</title>
        <author>
          <persName key="madynes-2006-idm72374388848">
            <foreName>Thibault</foreName>
            <surname>Cholez</surname>
            <initial>T.</initial>
          </persName>
          <persName key="madynes-2006-idm72374453680">
            <foreName>Isabelle</foreName>
            <surname>Chrisment</surname>
            <initial>I.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
          <persName key="madynes-2006-idm72374428832">
            <foreName>Guillaume</foreName>
            <surname>Doyen</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>Rida</foreName>
            <surname>Khatoun</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>Juliette</foreName>
            <surname>Dromard</surname>
            <initial>J.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <month>10</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00533385/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00533385/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="typdoc">Contrat</note>
    </biblStruct>
    <biblStruct dedoublkey="6021" id="madynes-2010-bid27" type="techreport" rend="year" n="cite:CIARLETTA:2010:INRIA-00547464:1">
      <identifiant type="hal" value="inria-00547464"/>
      <monogr>
        <title level="m">Co-simulation : étude et réalisation d'un
        prototype Application à la reconstruction 3D à partir
        d'imagerie vidéo</title>
        <author>
          <persName key="madynes-2006-idm72374440480">
            <foreName>Laurent</foreName>
            <surname>Ciarletta</surname>
            <initial>L.</initial>
          </persName>
          <persName>
            <foreName>Samuel</foreName>
            <surname>Grosjean</surname>
            <initial>S.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <month>09</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00547464/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00547464/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="typdoc">Stage</note>
    </biblStruct>
    <biblStruct dedoublkey="6100" id="madynes-2010-bid8" type="techreport" rend="year" n="cite:DELOSIERES:2010:INRIA-00547379:1">
      <identifiant type="hal" value="inria-00547379"/>
      <monogr>
        <title level="m">Filtrage collaboratif des Spams
        SMS</title>
        <author>
          <persName>
            <foreName>Laurent</foreName>
            <surname>Delosières</surname>
            <initial>L.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <month>06</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00547379/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00547379/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="typdoc">Stage</note>
    </biblStruct>
    <biblStruct dedoublkey="6062" id="madynes-2010-bid41" type="techreport" rend="year" n="cite:FESTOR:2010:INRIA-00546369:1">
      <identifiant type="hal" value="inria-00546369"/>
      <monogr>
        <title level="m">EMANICS Periodic Activity Report January
        1, 2008 Ð April 30, 2010</title>
        <author>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
          <persName>
            <foreName>Gabi</foreName>
            <surname>Dreo</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>David</foreName>
            <surname>Hausheer</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>George</foreName>
            <surname>Pavlou</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>Aiko</foreName>
            <surname>Pras</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Ramin</foreName>
            <surname>Sadre</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>Joan</foreName>
            <surname>Serrat</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Juergen</foreName>
            <surname>Schoenwaelder</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Burkhard</foreName>
            <surname>Stiller</surname>
            <initial>B.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00546369/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00546369/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="typdoc">Contrat</note>
    </biblStruct>
    <biblStruct dedoublkey="6063" id="madynes-2010-bid42" type="techreport" rend="year" n="cite:FESTOR:2010:INRIA-00546398:1">
      <identifiant type="hal" value="inria-00546398"/>
      <monogr>
        <title level="m">EMANICS Quarterly Management Report
        #16</title>
        <author>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
          <persName>
            <foreName>Gabi</foreName>
            <surname>Dreo</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>David</foreName>
            <surname>Hausheer</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>George</foreName>
            <surname>Pavlou</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>Aiko</foreName>
            <surname>Pras</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Ramin</foreName>
            <surname>Sadre</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>Joan</foreName>
            <surname>Serrat</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Juergen</foreName>
            <surname>Schoenwaelder</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Burkhard</foreName>
            <surname>Stiller</surname>
            <initial>B.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00546398/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00546398/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="typdoc">Contrat</note>
    </biblStruct>
    <biblStruct dedoublkey="6064" id="madynes-2010-bid43" type="techreport" rend="year" n="cite:FESTOR:2010:INRIA-00546402:1">
      <identifiant type="hal" value="inria-00546402"/>
      <monogr>
        <title level="m">EMANICS Quarterly Management Report
        #17</title>
        <author>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
          <persName>
            <foreName>Gabi</foreName>
            <surname>Dreo</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>David</foreName>
            <surname>Hausheer</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>George</foreName>
            <surname>Pavlou</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>Aiko</foreName>
            <surname>Pras</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Ramin</foreName>
            <surname>Sadre</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>Joan</foreName>
            <surname>Serrat</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Juergen</foreName>
            <surname>Schoenwaelder</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Burkhard</foreName>
            <surname>Stiller</surname>
            <initial>B.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00546402/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00546402/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="typdoc">Contrat</note>
    </biblStruct>
    <biblStruct dedoublkey="6039" id="madynes-2010-bid30" type="techreport" rend="year" n="cite:HENARD:2010:INRIA-00546151:1">
      <identifiant type="hal" value="inria-00546151"/>
      <monogr>
        <title level="m">Détection des attaques sur le réseau
        pair-à-pair KAD</title>
        <author>
          <persName>
            <foreName>Christopher</foreName>
            <surname>Hénard</surname>
            <initial>C.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <month>08</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00546151/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00546151/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="typdoc">Stage</note>
    </biblStruct>
    <biblStruct dedoublkey="6264" id="madynes-2010-bid47" type="techreport" rend="year" n="cite:LECLERC:2010:INRIA-00546977:1">
      <identifiant type="hal" value="inria-00546977"/>
      <monogr>
        <title level="m">Prototype d'architecture de découverte de
        service avancée</title>
        <author>
          <persName key="madynes-2007-idm860520384">
            <foreName>Tom</foreName>
            <surname>Leclerc</surname>
            <initial>T.</initial>
          </persName>
          <persName key="madynes-2006-idm72374440480">
            <foreName>Laurent</foreName>
            <surname>Ciarletta</surname>
            <initial>L.</initial>
          </persName>
          <persName>
            <foreName>Laurent</foreName>
            <surname>Reynaud</surname>
            <initial>L.</initial>
          </persName>
          <persName key="madynes-2006-idm72374431984">
            <foreName>André</foreName>
            <surname>Schaff</surname>
            <initial>A.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <month>02</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00546977/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00546977/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="typdoc">Research Report</note>
    </biblStruct>
    <biblStruct dedoublkey="6114" id="madynes-2010-bid46" type="techreport" rend="year" n="cite:MESSAOUD:2010:INRIA-00547397:1">
      <identifiant type="hal" value="inria-00547397"/>
      <monogr>
        <title level="m">Génération automatique des règles de
        protection VeTo pour les services voix sur IP</title>
        <author>
          <persName>
            <foreName>Chiheb Eddine</foreName>
            <surname>Messaoud</surname>
            <initial>C. E.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <month>06</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00547397/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00547397/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="typdoc">Stage</note>
    </biblStruct>
    <biblStruct dedoublkey="6274" id="madynes-2010-bid12" type="techreport" rend="year" n="cite:NATAF:2010:INRIA-00539966:1">
      <identifiant type="hal" value="inria-00539966"/>
      <monogr>
        <title level="m">Réalisation d'un plug-in Eclipse pour
        supporter le langage YANG</title>
        <author>
          <persName key="madynes-2006-idm72374434624">
            <foreName>Emmanuel</foreName>
            <surname>Nataf</surname>
            <initial>E.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
          <persName>
            <foreName>Guillaume</foreName>
            <surname>Gérard</surname>
            <initial>G.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <month>06</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00539966/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00539966/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="typdoc">Stage</note>
    </biblStruct>
    <biblStruct dedoublkey="6303" id="madynes-2010-bid34" type="techreport" rend="year" n="cite:YACINE:2010:INRIA-00537985:1">
      <identifiant type="hal" value="inria-00537985"/>
      <monogr>
        <title level="m">SCAMSTOP : Scams and Fraud Detection in
        Voice over IP Networks FP7 contract number: 232458 D2.2
        General anti-Fraud security framework for VoIP
        infrastructures</title>
        <author>
          <persName>
            <foreName>Rebahi</foreName>
            <surname>Yacine</surname>
            <initial>R.</initial>
          </persName>
          <persName key="madynes-2006-idm72374408832">
            <foreName>Mohamed</foreName>
            <surname>Nassar</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Dagiuklas</foreName>
            <surname>Tasos</surname>
            <initial>D.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
          <persName>
            <foreName>Alefragkis</foreName>
            <surname>Panayiotis</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Polyzos</foreName>
            <surname>George</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>Gogos</foreName>
            <surname>Christos</surname>
            <initial>G.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="institution">INRIA</orgName>
          </publisher>
          <dateStruct>
            <month>11</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00537985/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00537985/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="typdoc">Contrat</note>
    </biblStruct>
    <biblStruct dedoublkey="6657" id="madynes-2010-bid18" type="unpublished" rend="year" n="cite:BARRERE:2010:HAL-00545594:1">
      <identifiant type="hal" value="hal-00545594"/>
      <monogr>
        <title level="m">Towards Vulnerability Prevention in
        Autonomic Environments</title>
        <author>
          <persName>
            <foreName>Martin</foreName>
            <surname>Barrere</surname>
            <initial>M.</initial>
          </persName>
          <persName key="madynes-2006-idm72374419456">
            <foreName>Rémi</foreName>
            <surname>Badonnel</surname>
            <initial>R.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <month>11</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.archives-ouvertes.fr/hal-00545594/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>archives-ouvertes. 
          <allowbreak/>fr/ 
          <allowbreak/>hal-00545594/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="bnote">Internal working document</note>
    </biblStruct>
    <biblStruct dedoublkey="6424" id="madynes-2010-bid15" type="unpublished" rend="year" n="cite:DABBEBI:2011:HAL-00545588:1">
      <identifiant type="hal" value="hal-00545588"/>
      <monogr>
        <title level="m">A Generalized Modelling for Supporting
        Risk Management in VoIP Infrastructures</title>
        <author>
          <persName key="madynes-2009-idm231958288896">
            <foreName>Oussema</foreName>
            <surname>Dabbebi</surname>
            <initial>O.</initial>
          </persName>
          <persName key="madynes-2006-idm72374419456">
            <foreName>Rémi</foreName>
            <surname>Badonnel</surname>
            <initial>R.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <month>04</month>
            <year>2011</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.archives-ouvertes.fr/hal-00545588/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>archives-ouvertes. 
          <allowbreak/>fr/ 
          <allowbreak/>hal-00545588/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="bnote">Internal working document</note>
    </biblStruct>
    <biblStruct dedoublkey="6617" id="madynes-2010-bid16" type="unpublished" rend="year" n="cite:DABBEBI:2011:HAL-00545589:1">
      <identifiant type="hal" value="hal-00545589"/>
      <monogr>
        <title level="m">Self-Configuring Risk Models in VoIP
        Architectures</title>
        <author>
          <persName key="madynes-2009-idm231958288896">
            <foreName>Oussema</foreName>
            <surname>Dabbebi</surname>
            <initial>O.</initial>
          </persName>
          <persName key="madynes-2006-idm72374419456">
            <foreName>Rémi</foreName>
            <surname>Badonnel</surname>
            <initial>R.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <month>07</month>
            <year>2011</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.archives-ouvertes.fr/hal-00545589/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>archives-ouvertes. 
          <allowbreak/>fr/ 
          <allowbreak/>hal-00545589/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="bnote">Internal working document</note>
    </biblStruct>
    <biblStruct dedoublkey="6643" id="madynes-2010-bid45" type="unpublished" rend="year" n="cite:VIJAY:2010:INRIA-00546445:1">
      <identifiant type="hal" value="inria-00546445"/>
      <monogr>
        <title level="m">The Common Log Format (CLF) for the
        Session Initiation Protocol (SIP) -
        draft-gurbani-sipclf-problem-statement-00</title>
        <author>
          <persName>
            <foreName>Vijay</foreName>
            <surname>Gurbani</surname>
            <initial>V.</initial>
          </persName>
          <persName>
            <foreName>Eric</foreName>
            <surname>Burger</surname>
            <initial>E.</initial>
          </persName>
          <persName>
            <foreName>T.</foreName>
            <surname>Anjali</surname>
            <initial>T.</initial>
          </persName>
          <persName key="madynes-2010-idm163901534320">
            <foreName>Humberto</foreName>
            <surname>Abdelnur</surname>
            <initial>H.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <month>02</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00546445/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00546445/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="bnote">Draft</note>
    </biblStruct>
    <biblStruct dedoublkey="6644" id="madynes-2010-bid44" type="unpublished" rend="year" n="cite:VIJAY:2010:INRIA-00546437:1">
      <identifiant type="hal" value="inria-00546437"/>
      <monogr>
        <title level="m">The Common Log Format (CLF) for the
        Session Initiation Protocol (SIP) -
        draft-gurbani-sipclf-problem-statement-01</title>
        <author>
          <persName>
            <foreName>Vijay</foreName>
            <surname>Gurbani</surname>
            <initial>V.</initial>
          </persName>
          <persName>
            <foreName>Eric</foreName>
            <surname>Burger</surname>
            <initial>E.</initial>
          </persName>
          <persName>
            <foreName>T.</foreName>
            <surname>Anjali</surname>
            <initial>T.</initial>
          </persName>
          <persName key="madynes-2010-idm163901534320">
            <foreName>Humberto</foreName>
            <surname>Abdelnur</surname>
            <initial>H.</initial>
          </persName>
          <persName key="madynes-2006-idm72374457424">
            <foreName>Olivier</foreName>
            <surname>Festor</surname>
            <initial>O.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <month>01</month>
            <year>2010</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00546437/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00546437/ 
          <allowbreak/>en/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="bnote">Draft</note>
    </biblStruct>
  </biblio>
</raweb>
