Patents by Inventor Nora Cuppens

Nora Cuppens has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10425431
    Abstract: A method for processing an intrusion in a communication network including a plurality of node equipment, including a current node, which: discovers of a neighborhood of the current node, including assigning a resilience group to the neighboring node, according to at least one piece of information representative of a resilience level of the neighboring node to at least one type of attack; detecting an intrusion affecting at least one suspect node of the neighborhood of the current node; establishing a consensus concerning the at least one suspect node in a neighborhood by counting a number of resilience groups having detected the intrusion in the neighborhood of the suspect node and a total number of resilience groups represented in the neighborhood of the suspect node; and deciding to change a status of the suspect node based on a result of the consensus by comparison of both numbers.
    Type: Grant
    Filed: September 30, 2015
    Date of Patent: September 24, 2019
    Assignees: B<>COM, UNIVERSITE DE BRETAGNE OCCIDENTALE, INSTITUT MINES TELECOM
    Inventors: David Espes, Nora Cuppens
  • Publication number: 20170302688
    Abstract: A method for processing an intrusion in a communication network including a plurality of node equipment, including a current node, which: discovers of a neighbourhood of the current node, including assigning a resilience group to the neighbouring node, according to at least one piece of information representative of a resilience level of the neighbouring node to at least one type of attack; detecting an intrusion affecting at least one suspect node of the neighbourhood of the current node; establishing a consensus concerning the at least one suspect node in a neighbourhood by counting a number of resilience groups having detected the intrusion in the neighbourhood of the suspect node and a total number of resilience groups represented in the neighbourhood of the suspect node; and deciding to change a status of the suspect node based on a result of the consensus by comparison of both numbers.
    Type: Application
    Filed: September 30, 2015
    Publication date: October 19, 2017
    Inventors: David Espes, Nora Cuppens
  • Patent number: 8973092
    Abstract: The present invention refers to a method for adapting security policies of an information system infrastructure as a function of attacks on the system by storing potential attacks, their associated risks and curative security policies in a data repository, monitoring entering contents representing data streams of the information system, detecting at least one attack in the information system, assessing a success probability parameter of the at least one detected attack and its associated cost impact parameter, assessing an activation impact parameter of at least one curative security policy in response to the at least one detected attack and its associated cost impact parameter, deciding to activate or deactivate a curative security policy based on the success probability parameter of a detected attack, the activation impact parameter of associated curative security policies and the cost impact parameters of both an attack and associated curative security policies.
    Type: Grant
    Filed: May 5, 2011
    Date of Patent: March 3, 2015
    Assignee: Alcatel Lucent
    Inventors: Wael Kanoun, Samuel Dubus, Nora Cuppens, Frédéric Cuppens
  • Publication number: 20130111548
    Abstract: The present invention refers to a method for adapting security policies of an information system infrastructure as a function of attacks on the system by storing potential attacks, their associated risks and curative security policies in a data repository, monitoring entering contents representing data streams of the information system, detecting at least one attack in the information system, assessing a success probability parameter of the at least one detected attack and its associated cost impact parameter, assessing an activation impact parameter of at least one curative security policy in response to the at least one detected attack and its associated cost impact parameter, deciding to activate or deactivate a curative security policy based on the success probability parameter of a detected attack, the activation impact parameter of associated curative security policies and the cost impact parameters of both an attack and associated curative security policies.
    Type: Application
    Filed: May 5, 2011
    Publication date: May 2, 2013
    Inventors: Wael Kanoun, Samuel Dubus, Nora Cuppens, Frédéric Cuppens