Sökning: "Attack Graph"

Visar resultat 11 - 15 av 28 uppsatser innehållade orden Attack Graph.

  1. 11. Using machine learning to visualize and analyze attack graphs

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Antoine Cottineau; [2021]
    Nyckelord :Attack graph; Graph visualization; Graph clustering; Network security; Node embedding; Attackgraf; grafvisualisering; grafklustering; nätverkssäkerhet; inbäddning av noder;

    Sammanfattning : In recent years, the security of many corporate networks have been compromised by hackers who managed to obtain important information by leveraging the vulnerabilities of those networks. Such attacks can have a strong economic impact and affect the image of the entity whose network has been attacked. LÄS MER

  2. 12. Formalise Defense Strategies in Design Patterns of Threat Models

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Johan Settlin; [2021]
    Nyckelord :Cyber Security; Security Patterns; Threat Models; Meta Attack Language; Defense Mechanisms; Structural Defenses; Datasäkerhet; Säkerhetsmönster; Hotmodeller; Meta Attack Language; Försvarsmekanismer; Strukturella Försvar;

    Sammanfattning : Cyber-attacks are an increasing problem for organizations across the world. The attacks on systems are getting more and more sophisticated and thereby more and more difficult to protect against. The security of systems is crucial to protect your data from unauthorized access. LÄS MER

  3. 13. azureLang: Cyber Threat Modelling in Microsoft Azure cloud computing environment

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Ningyao Geng; [2020]
    Nyckelord :Threat modelling; Microsoft Azure; MAL; Cloud computing; azureLang; Hotmodellering; Microsoft Azure; MAL; Cloud computing; azureLang;

    Sammanfattning : When assessing network systems, security has always been one of the priorities.Cyber threat modelling is one of the most suitable methods. From a startingpoint to each valuable asset, the simulation can enable the users to explore certainsecurity weaknesses alongside the attack path. LÄS MER

  4. 14. A cheat detection system for an educational pentesting cyber range: an intrusion deficit approach

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Nikolaos Kakouros; [2020]
    Nyckelord :;

    Sammanfattning : In academic courses, effort is given to detect and deal with plagiarism. Examplesof traditional plagiarism detection techniques include comparison of submittedhomework or supervised exams. Such techniques, however, are limitedin application to traditional teaching methods. LÄS MER

  5. 15. Security Risk Analysis based on Data Criticality

    Magister-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Luyuan Zhou; [2020]
    Nyckelord :network security risk assessment; attack graph; data criticality; security metric; threat modeling;

    Sammanfattning : Nowadays, security risk assessment has become an integral part of network security as everyday life has become interconnected with and dependent on computer networks. There are various types of data in the network, often with different criticality in terms of availability or confidentiality or integrity of information. LÄS MER