There is no doubt that privacy by design PbD has become a structuring paradigm for personal data protection. Certainly this paradigm has been in use since 1995; however the GDRP "The General Data Protection Regulation", by considering PbD in 2018 as a legal obligation, it testifies the PbD seven principles relevance. Companies are therefore called to put in place technical and organizational measures to integrate PbD into companies. Hence the need for a methodology to provide an exhaustive approach adapted to this implementation. Given the focus of the literature on the implementation of methodologies dedicated to the embodiment of PbD only in software systems, this article aims to propose an ISPM methodology "Information System Privacy Methodology" which focuses on the implementation of PbD in the enterprises architecture, specifically in information systems taking into account all the technical and organizational aspects which must be adopted for the said goal success.
Distributed Denial of Service (DDoS) attacks using Botnets became widely used in the Internet because of its efficiency and easy implementation. We will present in this paper a new architecture that stops DDoS attacks based on Botnet C&C (Command & control) and identify the Botmaster (the bots owner) machine.
Unlike the researches done in the attack trace-back algorithms, the aim of this architecture is not only to determine the Internet Relay Chat (IRC) servers used to control the Botnet. But also to remove the bots from the infected machines and to revel the Botmaster identityThis architecture is composed of a DDoS attacks detection agents*, spy agents* and a central agent* that coordinates between the other agents during the attack trace-back process. The trace-back process is based on hacking method in order to infiltrate the Botnet and get information about the attacker and the bots he uses. This architecture is designed to be used by the Internet service providers.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.