Sökning: "Nätverks attacker"
Hittade 5 uppsatser innehållade orden Nätverks attacker.
1. Howthe difficulty of obtaining intrusion artifacts can influence threat modeling : An experiment that shows how IT forensics can be used preventingly
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : IT system intrusions are a problem today and the belief that all you need is a strong outer defense has faded. Today continuous monitoring of the IT infrastructure is widespread and alerts are continuously investigated. LÄS MER
2. Improving deep learning assistedfar-field electromagnetic sidechannelattacks on AES : Effects on attack efficiency from using additive noise and otherdata augmentation techniques
Master-uppsats, KTH/MekatronikSammanfattning : Profiled side-channel attacks on hardware implemented cryptographic algorithms have been a well-researched topic for the past two decades and many countermeasures against these attacks have been proposed and adopted by the industry. Recently, a new form of far field EM side channel called "screaming channel attacks" have been highlighted. LÄS MER
3. Impacts of misbehavior in Intelligent Transportation Systems (ITS) : The case of cooperative maneuvers
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Connected and autonomous vehicles are emerging technologies that have fostered the Intelligent Transportation System (ITS). ITS has the objective of optimizing traffic safety, mobility, and fuel consumption. To achieve this, a range of different services are provided that utilize communication in a vehicular network. LÄS MER
4. Scanning and Host Fingerprinting Methods for Command and Control Server Detection
Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : Background. Detecting malware command and control infrastructure has impor-tant applications for protecting against attacks. Much research has focused on thisproblem, but a majority of this research has used traffic monitoring methods fordetection. Objectives. LÄS MER
5. Reactive security of IoT communications
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : IoT networks’ intrinsic vulnerabilities can be protected through intru- sion detection and response systems (IDRS). Anomaly-based intrusion detection offers multiple advantages: it can detect unknown attacks and it can adapt to multiple types of protocols. LÄS MER