Sökning: "Advanced Persistent Threat"

Hittade 5 uppsatser innehållade orden Advanced Persistent Threat.

  1. 1. Active learning for text classification in cyber security

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Amanda Carp; [2023]
    Nyckelord :Interactive machine learning; Active learning; Cost-effective active learning; Cyber environment; Interaktiv maskininlärning; Aktiv inlärning; Kostnadseffektiv aktiv inlärning; Cyberdomänen;

    Sammanfattning : In the domain of cyber security, machine learning promises advanced threat detection. However, the volume of available unlabeled data poses challenges for efficient data management. This study investigates the potential for active learning, a subset of interactive machine learning, to reduce the effort required for manual data labelling. LÄS MER

  2. 2. Evaluating hardware isolation for secure software development in Highly Regulated Environments

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Andre Brogärd; [2023]
    Nyckelord :Hardware Isolation; Supply chain attacks; HRE; Intel SGX; CI; Hårdvaruisolering; Distributionskedjeattacker; HRE; Intel SGX; CI;

    Sammanfattning : Organizations in highly regulated industries have an increasing need to protect their intellectual assets, because Advanced Persistent Threat (APT) entities are capable of using supply chain attacks to bypass traditional defenses. This work investigates the feasibility of preventing supply chain attacks by isolating the build environment of the software using hardware isolation. LÄS MER

  3. 3. Cybersecurity of remote work migration: A study on the VPN security landscape post covid-19 outbreak

    Kandidat-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Lukas Einler Larsson; Kushtrim Qollakaj; [2023]
    Nyckelord :Cybersecurity; Remote work; VPN; Exploit; Hardening;

    Sammanfattning : Background. The pandemic outbreak commenced a large migration of employees from all kinds of industries from previously working in an industrial or office environment to working from home. The remote migration allowed many kinds of work to continue as usual even during a pandemic. LÄS MER

  4. 4. Comparison of adversary emulation tools for reproducing behavior in cyber attacks

    Master-uppsats, Linköpings universitet/Databas och informationsteknik

    Författare :Joakim Elgh; [2022]
    Nyckelord :Adversary emulation; Adversary emulation tools; Behavior; Event logs; APT; Advanced Persistent Threat;

    Sammanfattning : As cyber criminals can find many different ways of gaining unauthorized access to systems without being detected, it is of high importance for organizations to monitor what is happening inside their systems. Adversary emulation is a way to mimic behavior of advanced adversaries within cyber security, which can be used to test detection capabilities of malicious behavior within a system of an organization. LÄS MER

  5. 5. Detecting Lateral Movement in Microsoft Active Directory Log Files : A supervised machine learning approach

    Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Viktor Uppströmer; Henning Råberg; [2019]
    Nyckelord :Advanced Persistent Threat; Lateral Movement; Active Directory; Multiclass Classification; Intrusion Detection System; Avancerade långvariga hot; Lateral rörelse; Active Directory; Multiklassklassificering; Intrångsdetektering;

    Sammanfattning : Cyberattacker utgör ett stort hot för dagens företag och organisationer, med engenomsnittlig kostnad för ett intrång på ca 3,86 miljoner USD. För att minimera kostnaden av ett intrång är det viktigt att detektera intrånget i ett så tidigt stadium som möjligt. LÄS MER