À propos
With…
Articles de Cédric
Activité
-
Hacklore and the Death of Security Myths Most security professionals already know of Hacklore even if they haven’t heard the name yet. We’ve all…
Hacklore and the Death of Security Myths Most security professionals already know of Hacklore even if they haven’t heard the name yet. We’ve all…
Aimé par Cédric Bonhomme
-
Today, we are releasing Suricata Language Server 1.1.0 which can now use a Suricata Docker container instead of a locally installed Suricata. Getting…
Today, we are releasing Suricata Language Server 1.1.0 which can now use a Suricata Docker container instead of a locally installed Suricata. Getting…
Aimé par Cédric Bonhomme
-
📚The Fondation Restena has released a new tip sheet to support institutions with low budgets in setting-up a high-performing Security Operations…
📚The Fondation Restena has released a new tip sheet to support institutions with low budgets in setting-up a high-performing Security Operations…
Aimé par Cédric Bonhomme
Expérience et formation
Licences et certifications
Expériences de bénévolat
-
Vice President
École de Musique Associative du Val Sierckois
- 1 an 1 mois
Arts et culture
Publications
-
VLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classification
This paper presents VLAI, a transformer-based model that predicts software vulnerability severity levels directly from text descriptions. Built on RoBERTa, VLAI is fine-tuned on over 600,000 real-world vulnerabilities and achieves over 82% accuracy in predicting severity categories, enabling faster and more consistent triage ahead of manual CVSS scoring. The model and dataset are open-source and integrated into the Vulnerability-Lookup service.
Autres auteursVoir la publication -
Risk Assessment Optimisation with MONARC
Hack.lu
There are many solutions to cover risk assessment: from big software solutions to standalone applications – even based on spreadsheets. A risk assessment takes a significant amount of time and becomes expensive rather quickly resulting in the impossibility for small companies to perform such an analysis. MONARC aims to make performing more accessible through optimisations and sharing. Each of these reduce the time needed to perform such an assessment and subsequently, money. Finally, after the…
There are many solutions to cover risk assessment: from big software solutions to standalone applications – even based on spreadsheets. A risk assessment takes a significant amount of time and becomes expensive rather quickly resulting in the impossibility for small companies to perform such an analysis. MONARC aims to make performing more accessible through optimisations and sharing. Each of these reduce the time needed to perform such an assessment and subsequently, money. Finally, after the development of the tool, MONARC has been released as open source software (GNU Affero General Public License version 3). In this paper, we will introduce MONARC, the optimisation and sharing features. The presentation will include a live demo of the introduced features.
Autres auteursVoir la publication -
Dynamic Carpooling Mobility Services based on Secure Multi-Agent Platform
Global Information Infrastructure and Networking Symposium 2012 (GIIS’12)
Carpooling consists in sharing one's personal vehicles with one or several passengers in order to share the related costs but also reduce traffic and CO 2 emissions. One of the main issues with such a service is that it requires a prior agreement between the driver and the potential passengers. Dynamic carpooling uses an IT system to remove this limitation and provide ways to react to events such as a traffic jam or to provide a precise evaluation of the cost of the trip for each of the…
Carpooling consists in sharing one's personal vehicles with one or several passengers in order to share the related costs but also reduce traffic and CO 2 emissions. One of the main issues with such a service is that it requires a prior agreement between the driver and the potential passengers. Dynamic carpooling uses an IT system to remove this limitation and provide ways to react to events such as a traffic jam or to provide a precise evaluation of the cost of the trip for each of the involved actors. But it requires accessing potentially sensitive information such as the real time users' position or their identity. As such, an efficient security mechanism should be implemented to protect data exchanged to provide the service but also to increase the users' confidence in the tool. This article presents a technological IT solution for dynamic carpooling mobility service based on a secure multi-agent platform in the context of the WiSafeCar (Wireless Traffic Safety Network between Cars) project. It mainly focuses on the security services allowing both the mutual authentication of the users and of the application components with the system.
Autres auteurs -
A New Approach to Evaluating Security Assurance
International Conference on Information Assurance and Security
This paper first analyzes the current gap in the literature in security assurance. It then proposes new metrics for the appraisal of security assurance at runtime. Our metrics are based on key concepts pertinent to gaining confidence on a security mechanism to meet its functions. Such parameters include: security correctness; security effectiveness and the quality of the security verification process. Validation of our approach has been achieved through tool implementation, and application to…
This paper first analyzes the current gap in the literature in security assurance. It then proposes new metrics for the appraisal of security assurance at runtime. Our metrics are based on key concepts pertinent to gaining confidence on a security mechanism to meet its functions. Such parameters include: security correctness; security effectiveness and the quality of the security verification process. Validation of our approach has been achieved through tool implementation, and application to another of security components including firewall, DNS and antivirus.
Autres auteurs -
Easy programming of Agent based Electronic Institution with UTOPIA
New Technologies of Distributed Systems (NOTERE 2010)
In Multi-Agent Systems (MAS), Organizations are means to structure cooperation and collaboration between agents. MoiseInst is a normative Organization model giving the possibility to constraint agents behavior according to four dimensions (structural, functional, contextual and normative). Mabeli as Electronic Institution model allows the supervision of MoiseInst Organizations compliance through an arbitration system. The difficulty is to easily instantiate such Organizations to obtain a…
In Multi-Agent Systems (MAS), Organizations are means to structure cooperation and collaboration between agents. MoiseInst is a normative Organization model giving the possibility to constraint agents behavior according to four dimensions (structural, functional, contextual and normative). Mabeli as Electronic Institution model allows the supervision of MoiseInst Organizations compliance through an arbitration system. The difficulty is to easily instantiate such Organizations to obtain a dynamic entity in which agents can evolve. In this paper we introduce Utopia, our Institution-oriented and Institution-based programming framework. Utopia permits to easily and automatically set up a MAS thanks to a XML MoiseInst Specification file. The framework convert this file into an innovative mathematical structure namely a recursive graph. We show a concrete application of the prototype through RED, an EUREKA/CELTIC European project use-case.
-
Multi-Agent based Decision Mechanism for Incident Reaction in Telecommunication Network
International Conference on Computer Systems and Applications (AICCSA 2010)
The paper provides a global architectural and decision support solution for a reaction after alert detection mechanisms in the frame of information systems security applied to telecom infrastructures. Therefore, the architecture is developed in a distributed perspective and is composed of three basic layers: the low level that constitutes the interface between the architecture and the infrastructure. The intermediate level that is responsible of correlating the alerts coming from different…
The paper provides a global architectural and decision support solution for a reaction after alert detection mechanisms in the frame of information systems security applied to telecom infrastructures. Therefore, the architecture is developed in a distributed perspective and is composed of three basic layers: the low level that constitutes the interface between the architecture and the infrastructure. The intermediate level that is responsible of correlating the alerts coming from different domains of the infrastructure and to deploy the reaction actions. The architecture is elaborated using a MAS associated to the OntoBayes model for decision mechanism. This model helps agents to make decisions according to preference values and is built upon ontology based knowledge sharing, Bayesian networks based uncertainty management and influence diagram. The major novelty of this Decision Support System is the layered view of the infrastructure thanks to MAS architecture, which enables the decision making with different levels of knowledge.
-
Electric blackout prevention: Toward a computer-mediated weather alert broadcasting solution
International Conference on Society and Information Technologies (ICSIT)
International Conference on Society and Information Technologies (ICSIT 2010), Orlando, Florida
Electric power consumption is dependent on weather conditions. In most of the EU countries, power distribution is often subject to failure and it is frequent for the population to suffer power blackout. Within the solutions, deployed in order to avoid or face that problem, the public notification of blackout risks for a target region and the demand for reduced consumption are both interesting…International Conference on Society and Information Technologies (ICSIT 2010), Orlando, Florida
Electric power consumption is dependent on weather conditions. In most of the EU countries, power distribution is often subject to failure and it is frequent for the population to suffer power blackout. Within the solutions, deployed in order to avoid or face that problem, the public notification of blackout risks for a target region and the demand for reduced consumption are both interesting alternatives. This last solution is very basic but whatever meaningful. Consequently, automatic notification of cold weather and power distribution risks appears to provide many advantages especially when the alert is associated with the decision mechanism and supported by dynamic and virtual communication channels. In this paper, we introduce a solution to broadcast weather alerts using MAS architecture associated with a Crisis Management enhanced XACML technology. This solution fosters the exploitation of a multi-layer approach required to be aligned with contextual constraints. In parallel, a decisional system allows managing the broadcasting of alert based on their utility for the population, as well as for the industry. The case study used to illustrate the feasibility of our approach exploiting weather and electric parameters and do not reflect the full constraints of any existing infrastructure in operation.Autres auteurs -
Programming electronic institutions with UTOPIA
International Conference on Advanced Information Systems Engineering (CAiSE'10)
In Multi-Agent Systems, Organizations are means to structure cooperation and collaboration between agents. MoiseInst is a normative Organization model giving the possibility to constraint agents behaviour according to four dimensions (structural, functional, contextual and normative). Mabeli as Electronic Institution model allows the supervision of MoiseInst Organizations compliance through an arbitration system. The difficulty is to easily instantiate such Organizations to obtain a dynamic…
In Multi-Agent Systems, Organizations are means to structure cooperation and collaboration between agents. MoiseInst is a normative Organization model giving the possibility to constraint agents behaviour according to four dimensions (structural, functional, contextual and normative). Mabeli as Electronic Institution model allows the supervision of MoiseInst Organizations compliance through an arbitration system. The difficulty is to easily instantiate such Organizations to obtain a dynamic entity in which agents can evolve. In this paper we introduce Utopia, our Institution-oriented and Institution-based programming framework. Utopia permits to easily and automatically set up a MAS thanks to a XML MoiseInst Specification file. The framework convert this file into an innovative mathematical structure namely a recursive graph, and solve several optimization problems in order to compute the most efficient role distribution. We show a concrete application of the prototype through RED, an EUREKA/CELTIC European project use-case.
Autres auteurs -
Reputation Based Dynamic Responsibility to Agent Assignement for Critical Infrastructure
IAT 2011
Power distribution constitutes a critical service for our economy. To foreseen electricity overload and risks of power blackout according to external perturbations such as the weather, the temperature or the barometric pressure in real time is a crucial challenge. In order to face those problems, research tends to involve consumers in the utilization of the electricity based on weather conditions. Our previous works had proposed an agent based architecture to support this alert mechanism. The…
Power distribution constitutes a critical service for our economy. To foreseen electricity overload and risks of power blackout according to external perturbations such as the weather, the temperature or the barometric pressure in real time is a crucial challenge. In order to face those problems, research tends to involve consumers in the utilization of the electricity based on weather conditions. Our previous works had proposed an agent based architecture to support this alert mechanism. The architecture exploited a static assignment of functions to agents. That static assignment was a weak point because isolating an agent or breaking the communication channel between two of them created serious damage on the crisis management. In this paper, we complete our previous works and make mobile the assignment of functions mobile for agents. Our approach exploits the concept of agent responsibility that we dynamically assigned to the agent taking into consideration the agent reputation.
Autres auteurs
Projets
-
VulnTrain
-
Vulnerability-Lookup
Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources (MITRE, NIST, GitHub, CSAF, Pysec, VARIoT), independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD). Vulnerability Lookup is also a collaborative platform where users can comment on security advisories and create bundles.
Autres créateurs -
Fit4Cybersecurity
A self-assessment tool to help business owners implement a better cybersecurity strategy.
Autres créateursVoir le projet -
IP-Link
Voir le projetThe goal of IP-Link is to visualize the relationships between different IP from network traffic capture.
Langues
-
French
Bilingue ou langue natale
-
English
Capacité professionnelle complète
-
German
Notions
Recommandations reçues
1 personne a recommandé Cédric
Inscrivez-vous pour y accéderPlus d’activités de Cédric
-
Some companies only want to request CVE's which are scored "high" or "critical" via CVSS. Apparently, vulnerabilities which are "medium" or "low" are…
Some companies only want to request CVE's which are scored "high" or "critical" via CVSS. Apparently, vulnerabilities which are "medium" or "low" are…
Aimé par Cédric Bonhomme
-
Proud to represent Luxat at this year’s Paperjam Club Finance Awards in Luxembourg. It was great to connect with so many people from across the…
Proud to represent Luxat at this year’s Paperjam Club Finance Awards in Luxembourg. It was great to connect with so many people from across the…
Aimé par Cédric Bonhomme
-
This is wonderful!! How can the scientific text that was to upend the whole of 19th century thought possibly compete with leaded windows, a carriage…
This is wonderful!! How can the scientific text that was to upend the whole of 19th century thought possibly compete with leaded windows, a carriage…
Aimé par Cédric Bonhomme
-
It's this time of the year again. The deadline for submitting proposals to the "Railways and Open Transport" Devroom at FOSDEM is approaching fast…
It's this time of the year again. The deadline for submitting proposals to the "Railways and Open Transport" Devroom at FOSDEM is approaching fast…
Aimé par Cédric Bonhomme
-
MISP v2.5.27 - released with new features and various fixes This release delivers important new modules, major internal performance optimisations…
MISP v2.5.27 - released with new features and various fixes This release delivers important new modules, major internal performance optimisations…
Aimé par Cédric Bonhomme
-
Signing off from South Africa and the Cape Town Conversation. Thank you to the Observer Research Foundation and the Thabo Mbeki Foundation for…
Signing off from South Africa and the Cape Town Conversation. Thank you to the Observer Research Foundation and the Thabo Mbeki Foundation for…
Aimé par Cédric Bonhomme
-
It’s been a while since my last public vulnerability disclosure. Over half a year ago, I found a stored XSS vulnerability that was later assigned…
It’s been a while since my last public vulnerability disclosure. Over half a year ago, I found a stored XSS vulnerability that was later assigned…
Aimé par Cédric Bonhomme
-
We’ve published new research from the EU co-funded project NGSOTI: “Learning from large-scale IPv4 blackhole: Behavioral analysis of SNMP…
We’ve published new research from the EU co-funded project NGSOTI: “Learning from large-scale IPv4 blackhole: Behavioral analysis of SNMP…
Aimé par Cédric Bonhomme