Sökning: "Attack Simulations"

Visar resultat 6 - 10 av 52 uppsatser innehållade orden Attack Simulations.

  1. 6. WebLang: A Prototype Modelling Language for Web Applications : A Meta Attack Language based Domain Specific Language for web applications

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Mille af Rolén; Niloofar Rahmani; [2023]
    Nyckelord :Meta Attack Language; Domain Specific Language; OWASP; Attack Simulations; Cyber Attacks; Threat Modelling; OWASP Juice Shop; Broken Access Control; Meta Attack Language; Domän Specifikt Språk; OWASP; Attack Simuleringar; Cyber Attacker; Hotmodellering; OWASP Juice Shop; Broken Access Control;

    Sammanfattning : This project explores how a Meta Attack Language based Domain Specific Language for web applications can be used to threat model web applications in order to evaluate and improve web application security. Organizations and individuals are targeted by cyberattacks every day where malicious actors could gain access to sensitive information. LÄS MER

  2. 7. Active flow control of the turbulent boundary layer over a NACA4412 wing profile for skin friction drag reduction

    Master-uppsats, KTH/Teknisk mekanik

    Författare :Giacomo Semprini Cesari; [2023]
    Nyckelord :Active flow control; drag reduction; numerical simulations; turbulent boundary layer; wings;

    Sammanfattning : In the context of building a framework for active flow control of turbulent boundary layers in wings, a set of large-eddy simulation (LES) are implemented in OpenFOAM. The flow around a NACA4412 wing profile is simulated at 5° angle of attack and Re_c = 400˙000. LÄS MER

  3. 8. Implementing and evaluating variations of the Blackhole attack on RPL

    Kandidat-uppsats, Uppsala universitet/Institutionen för informationsteknologi

    Författare :Adam Pettersson; [2022]
    Nyckelord :;

    Sammanfattning : The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) is the most used routing protocol for resource constrained Internet-of-Things (IoT) networks. With the massive increase in number of Internet-connected IoT devices and the fact that they are becoming more common in safety-critical environments such as in health-care and in the industry, security in these networks are of a big concern. LÄS MER

  4. 9. Integrating the Meta Attack Language in the Cybersecurity Ecosystem: Creating new Security Tools Using Attack Simulation Results

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Frida Grönberg; Björn Thiberg; [2022]
    Nyckelord :Meta Attack Language; Attack Simulation; Amazon EC2; Cybersecurity;

    Sammanfattning : Cyber threat modeling and attack simulations arenew methods to assess and analyze the cybersecurity of ITenvironments. The Meta Attack Language (MAL) was createdto formalize the underlying attack logic of such simulationsby providing a framework to create domain specific languages(DSLs). LÄS MER

  5. 10. Gamifying Attack Path Reporting : Preliminary design of an educational cyber security game

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Anna Misnik; Shafeek Zakko; [2022]
    Nyckelord :Gamification; Cyber Security Education; Game Design; Meta Attack Language; Attack Simulations; Hacking; Spelifiering; Cybersäkerhetsutbildning; Spel Design; Meta Attack Språk; Attacksimuleringar; Dataintrång;

    Sammanfattning : With rapid digitalization and technical growth, the IT systems that we are using are becoming extremely complicated and intertwined. This created as a result, more challenging security problems that get complicated alongside the systems, and the need for advanced solutions to prevent the exploitation of systems vulnerabilities. LÄS MER