Sökning: "cyber attack"

Visar resultat 1 - 5 av 46 uppsatser innehållade orden cyber attack.

  1. 1. Machine Learning for a Network-based Intrusion Detection System : An application using Zeek and the CICIDS2017 dataset

    M1-uppsats, KTH/Hälsoinformatik och logistik

    Författare :Vilhelm Gustavsson; [2019]
    Nyckelord :Machine Learning; Flow-based traffic characterization; Intrusion Detection System IDS ; Zeek; Bro; CICIDS2017; Scikit-Learn; Maskininlärning; Flödesbaserad trafik-karaktärisering; Intrångsdetekteringssystem IDS ; Zeek; Bro; CICIDS2017; Scikit-Learn;

    Sammanfattning : Cyber security is an emerging field in the IT-sector. As more devices are connected to the internet, the attack surface for hackers is steadily increasing. Network-based Intrusion Detection Systems (NIDS) can be used to detect malicious traffic in networks and Machine Learning is an up and coming approach for improving the detection rate. LÄS MER

  2. 2. Information-Theoretic Framework for Network Anomaly Detection: Enabling online application of statistical learning models to high-speed traffic

    Master-uppsats, KTH/Matematisk statistik

    Författare :Gabriel Damour; [2019]
    Nyckelord :Network Security; Distributed Denial of Service; DDoS; DoS; Anomaly Detection; Intrusion Detection; Attack Source Identification; Information Theory; Statistical Learnin; Nätverkssäkerhet; Distribuerad Överbelastningsattack; DDoS; DoS; Anomalidetektering; Intrångsdetektering; Identifiering av Attackkällor; Informationsteori; Maskininlärning;

    Sammanfattning : With the current proliferation of cyber attacks, safeguarding internet facing assets from network intrusions, is becoming a vital task in our increasingly digitalised economies. Although recent successes of machine learning (ML) models bode the dawn of a new generation of intrusion detection systems (IDS); current solutions struggle to implement these in an efficient manner, leaving many IDSs to rely on rule-based techniques. LÄS MER

  3. 3. Comparison of Automated Password Guessing Strategies

    Master-uppsats, Linköpings universitet/Informationskodning

    Författare :Tobias Lundberg; [2019]
    Nyckelord :password guessing; password cracking; security; lösenordsgissning; lösenordsknäckning; säkerhet;

    Sammanfattning : This thesis examines some of the currently available programs for password guessing, in terms of designs and strengths. The programs Hashcat, OMEN, PassGAN, PCFG and PRINCE were tested for effectiveness, in a series of experiments similar to real-world attack scenarios. LÄS MER

  4. 4. vehicleLang: a probabilistic modeling and simulation language for vehicular cyber attacks

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Sotirios Katsikeas; [2018]
    Nyckelord :Domain Specific Language; Probabilistic Modeling; Cyber Security; Threat Modeling; Attack Graphs; Vehicular Security; Domänspecifikt språk; Probabilistisk modellering; Cybersäkerhet; Hotmodellering; Attackgrafer; Fordonsäkerhet;

    Sammanfattning : The technological advancements in the automotive industry as well as in thefield of communication technologies done the last years have transformed thevehicles to complex machines that include not only electrical and mechanicalcomponents but also a great number of electronic components. Furthermore,modern vehicles are now connected to the Wide Area Network (WAN) and inthe near future communications will also be present between the cars (Vehicleto-Vehicle, V2V) and between cars and infrastructure (Vehicle-to-Infrastructure, V2I), something that can be found as Internet of Vehicles (IoV)in the literature. LÄS MER

  5. 5. Visualization and Natural Language Representation of Simulated Cyber Attacks

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Xinyue Mao; [2018]
    Nyckelord :attack path visualization; taxonomy for attack graph; natural language representation; attackvägsvisualisering; taxonomi för attackgraf; naturlig språkrepresentation;

    Sammanfattning : The attack path is an effective tool for showing possible hacking routestaken by an attacker to target a specific computer network. It also informsadministrators about potential weakness in a network helpingthem roll-out network configuration changes. Based on predefinedcomputing methods, a large number of attack paths can be generated. LÄS MER