{"id":369,"date":"2012-09-24T17:13:45","date_gmt":"2012-09-24T15:13:45","guid":{"rendered":"https:\/\/samovar2022.int-evry.fr\/index.php\/2012\/09\/24\/soutenance-these-de-daniel-migault\/"},"modified":"2020-09-04T18:46:58","modified_gmt":"2020-09-04T16:46:58","slug":"soutenance-these-de-daniel-migault","status":"publish","type":"post","link":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/2012\/09\/24\/soutenance-these-de-daniel-migault\/","title":{"rendered":"Soutenance : Th\u00e8se de Daniel Migault"},"content":{"rendered":"<p>mercredi <strong>26 septembre<\/strong> 2012 \u00e0 <strong>10h<\/strong>00 \u00e0 Telecom Sud Paris \u00e0 Evry en <strong>salle A003<\/strong>.<\/p>\n<p>\u00ab\u00a0Nommage et S\u00e9curit\u00e9 dans un environnement Mobile, Multihom\u00e9<br \/>\net \u00e0 Interfaces Multiples\u00a0\u00bb.<\/p>\n<p>Cette th\u00e8se a \u00e9t\u00e9 pr\u00e9par\u00e9e sous la direction<br \/>\ndu Professeur Maryline Laurent au sein des Laboratoires d&rsquo;Orange Labs et CNRS SAMOVAR UMR 5157.<\/p>\n<p><strong>Composition du jury:<\/strong><br \/>\n&#8211; Abdelmadjid Bouabdallah (Rapporteur)<br \/>\n<br \/>&mdash;&nbsp;> Professeur Universit\u00e9 Technologique de Compi\u00e8gne<br \/>\n&#8211; Andrei Gurtov (Rapporteur)<br \/>\n<br \/>&mdash;&nbsp;> Professeur University of Oulu<br \/>\n&#8211; St\u00e9p\u0125ane Bortzmeyer (Examinateur)<br \/>\n<br \/>&mdash;&nbsp;> AFNIC<br \/>\n&#8211; Guy Pujolle (Examinateur)<br \/>\n<br \/>&mdash;&nbsp;> Professeur Universit\u00e9 Pierre et Marie Curie<br \/>\n&#8211; Nadia Boukhatem (Examinateur)<br \/>\n<br \/>&mdash;&nbsp;> Professeur T\u00e9l\u00e9com Paristech<br \/>\n&#8211; Maryline Laurent (Directrice de th\u00e8se)<br \/>\n<br \/>&mdash;&nbsp;> Professeur T\u00e9l\u00e9com Sud Paris<\/p>\n<p><strong>R\u00e9sum\u00e9 de la th\u00e8se:<\/strong><\/p>\n<p>Une des probl\u00e9matiques majeures de s\u00e9curit\u00e9 pour les op\u00e9rateur est de<br \/>\npermettre \u00e0 ses utilisateurs de maintenir la s\u00e9curit\u00e9 d\u2019une<br \/>\ncommunication m\u00eame au travers d\u2019un r\u00e9seau qui ne soit pas de confiance.<br \/>\nNous avons pris le parti dans cette th\u00e8se de nous int\u00e9resser \u00e0 deux<br \/>\nprobl\u00e9matiques : la s\u00e9curit\u00e9 du service de r\u00e9solution de noms DNS et le<br \/>\nmaintient de la s\u00e9curit\u00e9 IPsec des communications, suite \u00e0 une<br \/>\nchangement d\u2019adresse IP, de l\u2019utilisation d\u2019une interface<br \/>\nsuppl\u00e9mentaire, ou de la perte d\u2019une interface. Pour l\u2019utilisateur, une<br \/>\ncommunication est \u00e9tablie \u00e0 partir d\u2019un identifiant ou nom de domaine.<br \/>\nLe syst\u00e8me DNS permet d\u2019associer \u00e0 cet identifiant ou nom de domaine des<br \/>\nadresses IP, qui vont permettre l\u2019\u00e9change de paquets entre les deux<br \/>\nn\u0153uds. L\u2019op\u00e9rateur doit alors permettre \u00e0 l\u2019utilisateur de s\u2019assurer que<br \/>\nles adresses IP associ\u00e9es au nom de domaine sont l\u00e9gitimes, gr\u00e2ce \u00e0<br \/>\nDNSSEC. Ensuite, nous avons pris le parti dans cette th\u00e8se, d\u2019utiliser<br \/>\nIPsec pour s\u00e9curiser la communication. Des m\u00e9canismes doivent \u00e9galement<br \/>\n\u00eatre mis en place afin de permettre \u00e0 l\u2019utilisateur de maintenir la<br \/>\ns\u00e9curit\u00e9 de cette communication lorsque l\u2019utilisateur change d\u2019adresses<br \/>\nIP, utilise une interface suppl\u00e9mentaire, ou perd la connectivit\u00e9 sur<br \/>\nune de ces interfaces.<br \/>\nCeci est r\u00e9alis\u00e9 gr\u00e2ce au protocole MOBIKE-X que nous avons propos\u00e9 \u00e0 IETF.<br \/>\nLa mise en place d\u2019un service de r\u00e9solution DNS S\u00e9curis\u00e9 (DNSSEC)<br \/>\nn\u00e9cessite d\u2019augmenter la capacit\u00e9 des plateformes de r\u00e9solution DNS, en<br \/>\nmultipliant jusqu\u2019\u00e0 4.25 fois les ressources n\u00e9cessaires. Les op\u00e9rations<br \/>\nqui n\u00e9cessitent le plus de ressources sont la r\u00e9solution DNSSEC et le<br \/>\nnombreux cache lookup. Les architectures actuelles consid\u00e8rent un load<br \/>\nbalancer qui r\u00e9parti le trafic sur un ensemble de n\u0153uds, en consid\u00e9rant<br \/>\nles adresses IP des requ\u00eates. La r\u00e9partition du trafic est uniforme,<br \/>\nmais de nombreuses r\u00e9solutions simultan\u00e9es sont r\u00e9alis\u00e9es par la<br \/>\nplateforme. Pour \u00e9viter les r\u00e9solutions parall\u00e8les, on r\u00e9partit le<br \/>\ntrafic selon les noms de domaines. Cela r\u00e9duit les ressources de 30%,<br \/>\nmais la r\u00e9partition est tr\u00e8s in\u00e9gale. Afin de palier \u00e0 cette in\u00e9galit\u00e9,<br \/>\non a choisit, dans cette th\u00e8se, d\u2019organiser les n\u0153uds de la plateforme<br \/>\nen Distributed Hash Table (DHT) afin qu\u2019ils puissent coop\u00e9rer entre eux.<br \/>\nEn testant diff\u00e9rentes organisation, on montre qu\u2019un cache pro-actif est<br \/>\nle m\u00e9canisme le plus efficace. Le cache pro-actif tire parti de la<br \/>\ndistribution des requ\u00eates DNS. La distribution du trafic suit une loi de<br \/>\npuissance. Ainsi, les 2000 Fully Qualified Domain Names (FQDNs) les plus<br \/>\npopulaires repr\u00e9sentent environ 70% du trafic. Par cons\u00e9quent, cacher<br \/>\nces 2000 FQDNs au sein de tous les n\u0153uds de la plateforme de R\u00e9solution<br \/>\n\u00e9vite des r\u00e9solutions inutiles.<br \/>\nUne autre alternative consiste \u00e0 impl\u00e9menter le processus de cache<br \/>\npro-actif en amont du processus DHT. Ainsi les requ\u00eates concernant les<br \/>\nFQDNs populaires cach\u00e9s ne seront pas trait\u00e9es par le processus DHT.<br \/>\nL\u2019avantage est qu\u2019un tel processus peut tourner sur des cartes<br \/>\nacc\u00e9l\u00e9ratrice, et ainsi r\u00e9duire les ressources \u00e0 fournir par les<br \/>\nserveurs DHT. On montre qu\u2019en consid\u00e9rant les 2000 FQDNs les plus<br \/>\npopulaires, on divise par au moins 4 la taille de la plateforme de<br \/>\nr\u00e9solution.<\/p>\n<p>La seconde partie est d\u00e9di\u00e9e \u00e0 la s\u00e9curit\u00e9 IPsec dans un contexte de<br \/>\nMobilit\u00e9, de Multihoming et d\u2019Interfaces Multiples. MOBIKE-X [106] est<br \/>\nle protocole qui permet \u00e0 la couche IPsec de g\u00e9rer les op\u00e9rations de<br \/>\nMobilit\u00e9, de Multihoming, et d\u2019interfaces Multiples. Si MOBIKE [47] g\u00e8re<br \/>\nla Mobilit\u00e9 avec un Hard Handover pour le mode Tunnel et pour un<br \/>\nterminal n\u2019ayant qu\u2019une unique interface, MOBIKE-X \u00e9tend ces<br \/>\nfonctionnalit\u00e9s au mode Transport, permet la gestion d\u2019interfaces<br \/>\nmultiples ainsi que la Mobilit\u00e9 avec un Soft Handover. L\u2019utilisation du<br \/>\nmode Transport revient \u00e0 une architecture o\u00f9 la communication est<br \/>\ns\u00e9curis\u00e9e de bout en bout, de la m\u00eame mani\u00e8re qu\u2019avec TLS.<br \/>\nMOBIKE-X permet aux ISP d\u2019offloader les communications du R\u00e9seau Radio<br \/>\nd\u2019Acc\u00e8s vers des r\u00e9seaux WLAN. L\u2019int\u00e9r\u00eat d\u2019IPsec est qu\u2019il permet de<br \/>\ns\u00e9curiser sans modifier l\u2019application. IPsec propose deux modes: le mode<br \/>\nTransport et le mode Tunnel. L\u2019utilisation du mode Tunnel correspond \u00e0<br \/>\nune architecture o\u00f9 le N\u0153ud Mobile tunnelle l\u2019ensemble du trafic vers un<br \/>\npoint d\u2019entr\u00e9e d\u2019un r\u00e9seau de confiance \u2014en l\u2019occurrence, celui de<br \/>\nl\u2019op\u00e9rateur. Si les d\u00e9lais de mise \u00e0 jour, dans le cas du mode<br \/>\nTransport, sont 2.65 fois plus importants que dans le cas du mode<br \/>\nTunnel, en revanche, l\u2019utilisation du mode Transport simplifie<br \/>\nconsid\u00e9rablement les op\u00e9rations r\u00e9seau, et permet au syst\u00e8me d\u2019\u00eatre<br \/>\nbeaucoup plus r\u00e9actif. Plus exactement, le temps d\u2019interruption d\u2019une<br \/>\ncommunication d\u2019environ 264 ms est entre 9.3% et 15.6% plus rapide avec<br \/>\nle mode Transport qu\u2019avec le mode Tunnel.<\/p>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>mercredi 26 septembre 2012 \u00e0 10h00 \u00e0 Telecom Sud Paris \u00e0 Evry en salle A003. \u00ab\u00a0Nommage et S\u00e9curit\u00e9 dans un environnement Mobile, Multihom\u00e9 et \u00e0 Interfaces Multiples\u00a0\u00bb. Cette th\u00e8se a \u00e9t\u00e9 pr\u00e9par\u00e9e sous la direction du Professeur Maryline Laurent au sein des Laboratoires d&rsquo;Orange Labs et CNRS SAMOVAR UMR 5157. Composition du jury: &#8211; Abdelmadjid [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[418],"tags":[],"class_list":["post-369","post","type-post","status-publish","format-standard","hentry","category-theses-2012-fr","entry"],"_links":{"self":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts\/369","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/comments?post=369"}],"version-history":[{"count":1,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts\/369\/revisions"}],"predecessor-version":[{"id":1889,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/posts\/369\/revisions\/1889"}],"wp:attachment":[{"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/media?parent=369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/categories?post=369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/samovar.telecom-sudparis.eu\/index.php\/wp-json\/wp\/v2\/tags?post=369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}