Auswahl der wissenschaftlichen Literatur zum Thema „Security attacks detection“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Security attacks detection" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Security attacks detection"
Jimmy, FNU. „Cyber security Vulnerabilities and Remediation Through Cloud Security Tools“. Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, Nr. 1 (12.04.2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p233.
Der volle Inhalt der QuelleJimmy, Fnu. „Cyber security Vulnerabilities and Remediation Through Cloud Security Tools“. Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, Nr. 1 (12.04.2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p234.
Der volle Inhalt der QuelleKumavat, Kavita S., und Joanne Gomes. „Common Mechanism for Detecting Multiple DDoS Attacks“. International Journal on Recent and Innovation Trends in Computing and Communication 11, Nr. 4 (04.05.2023): 81–90. http://dx.doi.org/10.17762/ijritcc.v11i4.6390.
Der volle Inhalt der QuelleKareem, Mohammed Ibrahim, Mohammad Jawad Kadhim Abood und Karrar Ibrahim. „Machine learning-based PortScan attacks detection using OneR classifier“. Bulletin of Electrical Engineering and Informatics 12, Nr. 6 (01.12.2023): 3690–96. http://dx.doi.org/10.11591/eei.v12i6.4142.
Der volle Inhalt der QuelleDu, Dajun, Rui Chen, Xue Li, Lei Wu, Peng Zhou und Minrui Fei. „Malicious data deception attacks against power systems: A new case and its detection method“. Transactions of the Institute of Measurement and Control 41, Nr. 6 (08.01.2018): 1590–99. http://dx.doi.org/10.1177/0142331217740622.
Der volle Inhalt der QuelleKumar, Sunil, und Maninder Singh. „Detection and Isolation of Zombie Attack under Cloud Environment“. Oriental journal of computer science and technology 10, Nr. 2 (12.04.2017): 338–44. http://dx.doi.org/10.13005/ojcst/10.02.12.
Der volle Inhalt der QuelleFarane Shradha, Gotane Rutuja, Chandanshive Sakshi, Agrawal Khushi und Khandekar Srushti. „Detection of cyber-attacks and network attacks using Machine Learning“. World Journal of Advanced Engineering Technology and Sciences 12, Nr. 1 (30.05.2024): 128–32. http://dx.doi.org/10.30574/wjaets.2024.12.1.0184.
Der volle Inhalt der QuelleAslan, Ömer, Semih Serkant Aktuğ, Merve Ozkan-Okay, Abdullah Asim Yilmaz und Erdal Akin. „A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions“. Electronics 12, Nr. 6 (11.03.2023): 1333. http://dx.doi.org/10.3390/electronics12061333.
Der volle Inhalt der QuelleAlamsyah, Hendri, Riska und Abdussalam Al Akbar. „Analisa Keamanan Jaringan Menggunakan Network Intrusion Detection and Prevention System“. JOINTECS (Journal of Information Technology and Computer Science) 5, Nr. 1 (25.01.2020): 17. http://dx.doi.org/10.31328/jointecs.v5i1.1240.
Der volle Inhalt der QuelleSalih, Azar Abid, und Maiwan Bahjat Abdulrazzaq. „Cyber security: performance analysis and challenges for cyber attacks detection“. Indonesian Journal of Electrical Engineering and Computer Science 31, Nr. 3 (01.09.2023): 1763. http://dx.doi.org/10.11591/ijeecs.v31.i3.pp1763-1775.
Der volle Inhalt der QuelleDissertationen zum Thema "Security attacks detection"
Kazi, Shehab. „Anomaly based Detection of Attacks on Security Protocols“. Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4806.
Der volle Inhalt der QuelleWhitelaw, Clayton. „Precise Detection of Injection Attacks on Concrete Systems“. Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/6051.
Der volle Inhalt der QuelleJan, Steve T. K. „Robustifying Machine Learning based Security Applications“. Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/99862.
Der volle Inhalt der QuelleDoctor of Philosophy
Machine learning (ML) is computer algorithms that aim to identify hidden patterns from the data. In recent years, machine learning has been widely used in many fields. The range of them is broad, from natural language to autonomous driving. However, there are growing concerns about the robustness of machine learning models. And these concerns are further amplified in security-critical applications — Attackers can manipulate their inputs (i.e., adversarial examples) to cause machine learning models to predict wrong, and it's highly expensive and difficult to obtain a huge amount of attackers' data because attackers are rare compared to the normal users. These make applying machine learning in security-critical applications concerning. In this dissertation, we seek to build better defenses in three types of machine learning based security applications. The first one is image recognition, by developing a method to generate realistic adversarial examples, the machine learning models are more robust for defending against adversarial examples by adversarial retraining. The second one is bot detection, we develop a data synthesis method to detect malicious bots when we only have the limit malicious bots data. For phishing websites, we implement a tool to detect domain name impersonation and detect phishing pages using dynamic and static analysis.
Taub, Lawrence. „Application of a Layered Hidden Markov Model in the Detection of Network Attacks“. NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/320.
Der volle Inhalt der QuelleRosa, José Luís da Silva. „Customer-side detection of BGP routing attacks“. Master's thesis, Universidade de Aveiro, 2016. http://hdl.handle.net/10773/17808.
Der volle Inhalt der QuelleA utilização diária da Internet tornou-se uma rotina que foi assimilada pelas pessoas sem considerarem a complexidade interna desta gigante rede. Até um certo ponto, o Border Gateway Protocol é o que mantem toda esta conectividade possível apesar de ser um protocolo defeituoso por natureza. Em 2008, um ataque Man-In-The-Middle foi pela primeira vez apresentado ao grande público e desde de então mais técnicas para explorar este protocolo e obter tráfego alheio de forma ilícita foram dadas a conhecer. Mesmo que o desvio não aconteça com natureza maliciosa, mas sim devido a um erro de configuração, este é um problema que deverá ser enfrentado. Alguns provedores de serviço e institutos de investigação já apresentaram propostas para novos protocolos e/ou sistemas de monitorização, mas estes estão atrasados no seu desenvolvimento ou apenas afetam a camada superior da rede, deixando utilizadores e um grande número de empresas que estão ligadas a um provedor sem meios para agir e sem informação sobre o encaminhamento do seu tráfego. Nesta dissertação, é apresentado, concebido e implementado um sistema que atinge uma monitorização ativa do BGP através da medição do tempo médio de viagem de vários pacotes enviados de várias localizações, através de uma rede mundial de sondas, e do processamento dos resultados obtidos, permitindo que todos os interessados possam ser alertados.
The daily use of the Internet has become a routine that many people absorbed into their lives without even thinking about the insides of this gigantic network. To an extent, the Border Gateway Protocol is what is keeping all this connectivity together despite being a very flawed protocol due to its design. In 2008 a Man-In-The-Middle attack was first presented to the general audience and ever since more techniques were reported to use the protocol to obtain traffic illicitly. Even if the routing deviation does not occur via a malicious intention but due to some poorly configured router, this is a problem that must be tackled. Some network providers and research institutes already presented some drafts for new protocols or monitoring systems but they are late into deployment or only affect the top layer of the network, leaving users and most part of the companies connected to the provider impotent and without any proper information about the routing of their traffic. In this dissertation a system is presented, implemented and deployed, achieving an active monitorization of BGP through measurements of the average travel time of several packets sent to various locations by a worldwide set of Probes and the collected results processed allowing all concerned actors to be alerted.
Lantz, David. „Detection of side-channel attacks targeting Intel SGX“. Thesis, Linköpings universitet, Programvara och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177987.
Der volle Inhalt der QuelleAditham, Santosh. „Mitigation of Insider Attacks for Data Security in Distributed Computing Environments“. Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6639.
Der volle Inhalt der QuelleRubio, Hernan Jose Manuel. „Detection of attacks against cyber-physical industrial systems“. Thesis, Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0015/document.
Der volle Inhalt der QuelleWe address security issues in cyber-physical industrial systems. Attacks against these systems shall be handled both in terms of safety and security. Control technologies imposed by industrial standards already cover the safety dimension. From a security standpoint, the literature has shown that using only cyber information to handle the security of cyber-physical systems is not enough, since physical malicious actions are ignored. For this reason, cyber-physical systems have to be protected from threats to their cyber and physical layers. Some authors handle the attacks by using physical attestations of the underlying processes, f.i., physical watermarking to ensure the truthfulness of the process. However, these detectors work properly only if the adversaries do not have enough knowledge to mislead crosslayer data. This thesis focuses on the aforementioned limitations. It starts by testing the effectiveness of a stationary watermark-based fault detector, to detect, as well, malicious actions produced by adversaries. We show that the stationary watermark-based detector is unable to identify cyber-physical adversaries. We show that the approach only detects adversaries that do not attempt to get any knowledge about the system dynamics. We analyze the detection performance of the original design under the presence of adversaries that infer the system dynamics to evade detection. We revisit the original design, using a non-stationary watermark-based design, to handle those adversaries. We also propose a novel approach that combines control and communication strategies. We validate our solutions using numeric simulations and training cyber-physical testbeds
Wang, Le. „Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques“. Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-theses/992.
Der volle Inhalt der QuelleRubio, Hernan Jose Manuel. „Detection of attacks against cyber-physical industrial systems“. Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0015.
Der volle Inhalt der QuelleWe address security issues in cyber-physical industrial systems. Attacks against these systems shall be handled both in terms of safety and security. Control technologies imposed by industrial standards already cover the safety dimension. From a security standpoint, the literature has shown that using only cyber information to handle the security of cyber-physical systems is not enough, since physical malicious actions are ignored. For this reason, cyber-physical systems have to be protected from threats to their cyber and physical layers. Some authors handle the attacks by using physical attestations of the underlying processes, f.i., physical watermarking to ensure the truthfulness of the process. However, these detectors work properly only if the adversaries do not have enough knowledge to mislead crosslayer data. This thesis focuses on the aforementioned limitations. It starts by testing the effectiveness of a stationary watermark-based fault detector, to detect, as well, malicious actions produced by adversaries. We show that the stationary watermark-based detector is unable to identify cyber-physical adversaries. We show that the approach only detects adversaries that do not attempt to get any knowledge about the system dynamics. We analyze the detection performance of the original design under the presence of adversaries that infer the system dynamics to evade detection. We revisit the original design, using a non-stationary watermark-based design, to handle those adversaries. We also propose a novel approach that combines control and communication strategies. We validate our solutions using numeric simulations and training cyber-physical testbeds
Bücher zum Thema "Security attacks detection"
Dübendorfer, Thomas P. Impact analysis, early detection, and mitigation of large-scale Internet attacks. Aachen: Shaker, 2005.
Den vollen Inhalt der Quelle findenRaghavan, S. V. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. India: Springer India Pvt. Ltd., 2011.
Den vollen Inhalt der Quelle findenNelson A. Rockefeller Institute of Government., Hrsg. The role of "home" in homeland security: The prevention and detection of terrorist attacks : the challenge for state and local government. Albany, N.Y: The Institute, 2003.
Den vollen Inhalt der Quelle findenBrancik, Kenneth C. Insider computer fraud: An indepth framework for detecting and defending against insider it attacks. Boca Raton: Auerbach Publications, 2007.
Den vollen Inhalt der Quelle findenUnited States. Congress. House. Committee on Science and Technology (2007). Subcommittee on Technology and Innovation. Planning for the future of cyber attack attribution: Hearing before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, second session, July 15, 2010. Washington: U.S. G.P.O., 2010.
Den vollen Inhalt der Quelle findenUnited States. Congress. House. Committee on Homeland Security. Subcommittee on the Prevention of Nuclear and Biological Attack. DHS coordination of nuclear detection efforts.: Hearing before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, April 19, 2005 and April 20, 2005. Washington: U.S. G.P.O., 2005.
Den vollen Inhalt der Quelle findenAttack, United States Congress House Committee on Homeland Security Subcommittee on the Prevention of Nuclear and Biological. Enlisting foreign cooperation in U.S. efforts to prevent nuclear smuggling: Hearing before the Subcommittee on [the] Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, second session, May 25, 2006. Washington: U.S. G.P.O., 2007.
Den vollen Inhalt der Quelle findenUnited States. Congress. House. Committee on Homeland Security. Subcommittee on the Prevention of Nuclear and Biological Attack. The science of prevention: Hearing before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, second session, September 14, 2006. Washington: U.S. G.P.O., 2007.
Den vollen Inhalt der Quelle findenAttack, United States Congress House Committee on Homeland Security Subcommittee on the Prevention of Nuclear and Biological. Detecting nuclear weapons and radiological materials: How effective is available technology? : joint hearing before the Subcommittee on Prevention of Nuclear and Biological Attack with the Subcommittee on Emergency Preparedness, and Science, and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, June 21, 2005. Washington: U.S. G.P.O., 2007.
Den vollen Inhalt der Quelle findenBhattacharyya, Dhruba Kumar, und Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Security attacks detection"
van Oorschot, Paul C. „Intrusion Detection and Network-Based Attacks“. In Information Security and Cryptography, 309–38. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-33649-3_11.
Der volle Inhalt der Quellevan Oorschot, Paul C. „Intrusion Detection and Network-Based Attacks“. In Information Security and Cryptography, 309–38. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-83411-1_11.
Der volle Inhalt der QuelleLucas, Keane, Mahmood Sharif, Lujo Bauer, Michael K. Reiter und Saurabh Shintre. „Deceiving ML-Based Friend-or-Foe Identification for Executables“. In Advances in Information Security, 217–49. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16613-6_10.
Der volle Inhalt der QuelleSingh, Gulshan Kumar, und Gaurav Somani. „Detecting Cloud Originated DDoS Attacks at the Source Using Out-Cloud Attack Detection (OCAD)“. In Information Systems Security, 169–85. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23690-7_10.
Der volle Inhalt der QuelleNarisada, Shintaro, Shoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji und Shinsaku Kiyomoto. „Stronger Targeted Poisoning Attacks Against Malware Detection“. In Cryptology and Network Security, 65–84. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65411-5_4.
Der volle Inhalt der QuelleArya, Shivani, und Saurabh Chamotra. „Multi Layer Detection Framework for Spear-Phishing Attacks“. In Information Systems Security, 38–56. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92571-0_3.
Der volle Inhalt der QuelleHarish, R., und K. Praveen. „Review on Wi-Fi Attacks and Detection Methods“. In Information Technology Security, 101–17. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0407-1_5.
Der volle Inhalt der QuelleShirazi, Hossein, Bruhadeshwar Bezawada, Indrakshi Ray und Charles Anderson. „Adversarial Sampling Attacks Against Phishing Detection“. In Data and Applications Security and Privacy XXXIII, 83–101. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22479-0_5.
Der volle Inhalt der QuelleSzynkiewicz, Paweł. „Signature-Based Detection of Botnet DDoS Attacks“. In Cybersecurity of Digital Service Chains, 120–35. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_6.
Der volle Inhalt der QuelleSalazar-Hernández, Rolando, und Jesús E. Díaz-Verdejo. „Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks“. In Information and Communications Security, 416–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17650-0_29.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Security attacks detection"
Mihai, Ioan cosmin, und Laurentiu Giurea. „MANAGEMENT OF ELEARNING PLATFORMS SECURITY“. In eLSE 2016. Carol I National Defence University Publishing House, 2016. http://dx.doi.org/10.12753/2066-026x-16-061.
Der volle Inhalt der QuelleKolodziej, Joanna, Mateusz Krzyszton und Pawel Szynkiewicz. „Anomaly Detection In TCP/IP Networks“. In 37th ECMS International Conference on Modelling and Simulation. ECMS, 2023. http://dx.doi.org/10.7148/2023-0542.
Der volle Inhalt der QuelleSegura, Gustavo A. Nunez, Arsenia Chorti und Cíntia Borges Margi. „IDIT-SDN: Intrusion Detection Framework for Software-defined Wireless Sensor Networks“. In Anais Estendidos do Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/sbrc_estendido.2023.817.
Der volle Inhalt der QuelleRamesh Kumar, M., und Pradeep Sudhakaran. „Comprehensive Survey on Detecting Security Attacks of IoT Intrusion Detection Systems“. In International Research Conference on IOT, Cloud and Data Science. Switzerland: Trans Tech Publications Ltd, 2023. http://dx.doi.org/10.4028/p-270t9z.
Der volle Inhalt der QuelleLim, Wei Heng, Weng Foong Liew, Chun Yew Lum und Seah Fang Lee. „Phishing Security: Attack, Detection, and Prevention Mechanisms“. In International Conference on Digital Transformation and Applications (ICDXA 2020). Tunku Abdul Rahman University College, 2020. http://dx.doi.org/10.56453/icdxa.2020.1017.
Der volle Inhalt der QuelleBabbage, S. H. „Improved “exhaustive search” attacks on stream ciphers“. In European Convention on Security and Detection. IEE, 1995. http://dx.doi.org/10.1049/cp:19950490.
Der volle Inhalt der QuelleGregorio- de Souza, Ian, Vincent H. Berk, Annarita Giani, George Bakos, Marion Bates, George Cybenko und Doug Madory. „Detection of complex cyber attacks“. In Defense and Security Symposium, herausgegeben von Edward M. Carapezza. SPIE, 2006. http://dx.doi.org/10.1117/12.670131.
Der volle Inhalt der QuelleS. Jabor, Maytham, Aqeel Salman Azez, Azhar Hasan Nsaif, Azhar Sabah Abdulaziz und Worud Mahdi Saleh. „Security Challenges and Threats in Wireless Sensor Networks: A Review“. In IX. International Scientific Congress of Pure, Applied and Technological Sciences. Rimar Academy, 2023. http://dx.doi.org/10.47832/minarcongress9-21.
Der volle Inhalt der QuelleBaykara, Muhammet, und Zahit Ziya Gurel. „Detection of phishing attacks“. In 2018 6th International Symposium on Digital Forensic and Security (ISDFS). IEEE, 2018. http://dx.doi.org/10.1109/isdfs.2018.8355389.
Der volle Inhalt der QuelleKim, Hannah, Celia Cintas, Girmaw Abebe Tadesse und Skyler Speakman. „Spatially Constrained Adversarial Attack Detection and Localization in the Representation Space of Optical Flow Networks“. In Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. California: International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/107.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Security attacks detection"
Fedchenko, Vitaly. Nuclear Security During Armed Conflict: Lessons From Ukraine. Stockholm International Peace Research Institute, März 2023. http://dx.doi.org/10.55163/zzsp5617.
Der volle Inhalt der QuelleKolencik, Marian. A critical evaluation of the risk indicators of criminal conduct involving CBRN and explosive materials - Behavioural and observational analysis in crime detection and investigation. ISEM Institute, n.p.o., Oktober 2023. http://dx.doi.org/10.52824/vzrb5079.
Der volle Inhalt der QuelleTayeb, Shahab. Taming the Data in the Internet of Vehicles. Mineta Transportation Institute, Januar 2022. http://dx.doi.org/10.31979/mti.2022.2014.
Der volle Inhalt der QuellePeterson, Dale. Cyber Security Audit and Attack Detection Toolkit. Office of Scientific and Technical Information (OSTI), Mai 2012. http://dx.doi.org/10.2172/1097617.
Der volle Inhalt der QuelleIn Hot Water? The Growing Threat of Cyber Attacks to Water Distribution Systems. American Society of Civil Engineers, März 2022. http://dx.doi.org/10.1061/infographic.000003.
Der volle Inhalt der Quelle