Dissertations / Theses on the topic 'Attack Path'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 16 dissertations / theses for your research on the topic 'Attack Path.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Mirheidari, Seyed Ali. "Confused by Path: Analysis of Path Confusion Based Attacks." Doctoral thesis, Università degli studi di Trento, 2020. http://hdl.handle.net/11572/280512.
Full textMirheidari, Seyed Ali. "Confused by Path: Analysis of Path Confusion Based Attacks." Doctoral thesis, Università degli studi di Trento, 2020. http://hdl.handle.net/11572/280512.
Full textVega-Nevarez, Juan. "Online Path Planning and Control Solution for a Coordinated Attack of Multiple Unmanned Aerial Vehicles in a Dynamic Environment." Master's thesis, University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5551.
Full textID: 031001316; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Adviser: Houman A. Sadri.; Title from PDF title page (viewed March 26, 2013).; Thesis (M.A.)--University of Central Florida, 2012.; Includes bibliographical references (p. 89-99).
M.S.E.E.
Masters
Electrical Engineering and Computing
Engineering and Computer Science
Electrical Engineering; Controls and Robotics
Mao, Xinyue. "Visualization and Natural Language Representation of Simulated Cyber Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246090.
Full textAnfallsstigen är ett effektivt verktyg för att visa möjliga hackningsvägarsom en angripare tar emot ett specifikt datornätverk. Det informerarockså administratörer om eventuell svaghet i ett nätverk somhjälper dem att utrulla nätverkskonfigurationsändringar. Baserat påfördefinierade datormetoder kan ett stort antal attackvägar genereras.Åtkomstvägar visar dock alla möjliga vägar för varje beräkning och representerardem med terminologier som är specifika för fältet Cybersecurity.En stor del av attackvägar och representationer är för kompliceradeför vanliga användare vilket gör det svårt att identifiera de delarsom de borde ägna mer uppmärksamhet åt. I denna avhandlingsrapportbeskrivs ett ramverk för att generera en kortfattad och användarvänligattackväg genom att gruppera kontinuerliga angreppssteg.Ramverket är utformat med 6 nivåer av hierarkisk abstraktion. Topp3 nivåer av dessa abstraktioner klassificeras baserat på den fördefinieradestrukturen av mjukvaran och namngiven strukturell uppdelning.De övriga 3 lägre nivåerna klassificeras baserat på semantik meden taxonomi för naturlig språkrepresentation som heter SCV (SecurityCommunity Vocabulary), namngiven semantikavdelning. Denna visualiseringsmetodsläpps som en del av securiCADR en cybersecurityproduktsom släpptes av Foreseeti, vilket ger en kortfattad och förståeliginteraktion genom att aggregera ursprungliga attacksteg enligtolika kunders krav.
Thames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.
Full textDube, Raghav. "Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet Marking." Texas A&M University, 2004. http://hdl.handle.net/1969.1/1476.
Full textExurville, Ingrid. "Détection non destructive de modification malveillante de circuits intégrés." Thesis, Saint-Etienne, EMSE, 2015. http://www.theses.fr/2015EMSE0800/document.
Full textThe globalization of integrated circuits fabrication involves several questions about the integrity of the fabricated circuits. Malicious modifications called Hardware Trojans (HT) can be introduced during the circuit production process. Due to the complexity of an integrated circuit, it is really difficult to find this kind of alterations.This work focuses on a non-destructive method of HT detection. We use the paths delays of the studied design as a channel to detect HT. A model to describe paths delays is defined. It takes into account two important parameters which are the experimental conditions and the process variations.Faults attacks by clock glitches based on timing constraints violations have been performed to measure data paths delays. Reliable circuits are used for reference. After validating the relevance of this channel to get information on the internal behavior of the targeted design, experimental detections of HT inserted on two different abstraction levels (RTL and after place and route) were achieved. Process variations are taken into consideration in the studies to detect if the tested circuits are infected
Kasse, Mamadou. "Système de Ρréventiοn cοntre les vulnérabilités et de Détectiοn des Anοmalies dans les Réseaux Ιnfοrmatiques." Electronic Thesis or Diss., Normandie, 2024. https://theses.hal.science/tel-04885354.
Full textTools for vulnerability prevention and anomaly detection are essential for the security of computer networks. This thesis focuses on using MITRE ATT&CK data, CVSS scores, and the ISO 27002:2022 standard to automate and consolidate vulnerability analysis and anomaly detection.The main objectives are: -Vulnerability Diagnosis: Identify the most vulnerable sub-networks by combining MITRE ATT&CK data, CVSS scores, and the ISO 27002:2022 standard. To achieve this, a database called Data ISO-MA was created. An algorithm evaluates the vulnerability of network paths, identifying those most at risk. - Anomaly Detection: Analyze traffic flows to detect unusual behaviors in vulnerable paths. An approach inspired by the Path-scan model introduced by Joshua Neil et al. (2013) was used. Each network connection is modeled with a 3-state Markov model and the Generalized Likelihood Ratio Test (GLRT), allowing for the capture and identification of abnormal behaviors.These two tools aim to enhance the security of computer networks by providing an integrated solution for vulnerability prevention and anomaly detection
Evensjö, Lina. "Probability analysis and financial model development of MITRE ATT&CK Enterprise Matrix's attack steps and mitigations." Thesis, KTH, Hälsoinformatik och logistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-289636.
Full textCyberattacker håller på att bli ett större orosmoment allteftersom vårt samhälle digitaliseras i större utsräckning, där lagring av känslig information snarare har blivit regel än undantag. Detta utgör ett behov av ett tids- och kostnadseffektivt sätt att bedömma cybersäkerheten hos ett företag. Hotmodelleringsspråket enterpriseLang är just detta, där antagandet av ett generellt företagssystem möjliggör återanvändning på flera olika system. Språket är skapat med Meta Attack Language och är baserat på kända attack- och försvarssteg från MITRE ATT&CK Enterprise matris. Eftersom alla möjliga attackvägar inte utnyttjas i lika stor utsträckning, behöver sannolikhetsfördelningar tilldelas till attack- och försvarsstegen. Arbetet som presenteras i den här rapporten inkluderar tilldelningen av sannolikhetsfördelningar till en handfull av dem, i synnerhet de kopplade till att få inital åtkomst till ett system med hjälp av användarutföranden. Utöver detta undersöks också den finansiella påverkan en attack kan ha samt om försvarsåtgärder är finansiellt lönsamma. En modell för avkastning på en sådan investering utvecklas för att kunna beräkna detta.
Palla, Srikanth. "A Multi-Variate Analysis of SMTP Paths and Relays to Restrict Spam and Phishing Attacks in Emails." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5402/.
Full textJirattigalachote, Amornrat. "Provisioning Strategies for Transparent Optical Networks Considering Transmission Quality, Security, and Energy Efficiency." Doctoral thesis, KTH, Optical Network Laboratory (ON Lab), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-94011.
Full textQC 20120508
Liou, Hong-Ming, and 劉泓銘. "Using Path-Encoding information against Distributed Denial of Service Attack." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/83411881963334572063.
Full text淡江大學
資訊管理學系碩士班
94
In this paper,we present a solution for Distributed Denial of Service Attack. Owing to the insecurity design of IP Protocol,it could not identify source. And those online company might be threatened and lost a lot of money. Yaar presented PI scheme to use path-encoding information against the attack. It is good to proceed to encode internet framework with the complete binary tree. However,The CAIDA study show that only 27% interfaces is more than 2 interfaces. After that, Gao improved the problem of insufficient interfaces of PI scheme. But it is not enough for the scheme. By Bit-Encoding and PS-Number information ,We strengthen the above-mentioned schemes. It could either improve the efficiency of Traceback and decrease the possible of attack paths.
林立洲. "A Path Authentication Scheme for Routing Disruption Attack Prevention in Ad Hoc Network." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/98846724663106109523.
Full text國立交通大學
資訊工程系所
92
Ad hoc routing protocols are vulnerable due to the absence of security mechanism. Forged routing advertisement can disrupt the routing scheme. Research work has been proposed for securing the routing protocol in ad hoc networks. Some of them deployed the asymmetric cryptographic primitive, which are often infeasible in the mobile environment. In this paper, we discovered a strict, cooperative disruption attack behavior on the route path and identify the deficiency about present secure mechanisms for protecting the routing information. We proposed a path authentication scheme which relies on efficient symmetric cryptographic authentication approach. The Random Assignment Path Authentication (RAPA scheme) guarantees the integrity of a complete request route path in route discovery procedure and help the current on-demand routing protocol for resisting against the routing disruption attacks. Our scheme can be adjusted to meet different efficiency and security requirements for the various applications.
Kuo, Pu-Tsun, and 郭溥村. "The Analysis and Reconstruction of Attack Paths for Botnet." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/52029945034619760924.
Full text崑山科技大學
資訊管理研究所
98
Available botnet detection schemes all supposed that ISPs would be cooperative to record or generate the necessary routing information for path reconstruction. In practice, ISP’s service constantly is a mutual benefit for intelligence exchange. Therefore the constraint, require cooperation between ISPs, ought to be relaxed. A new IP traceback scheme based on ant colony optimization (ACO) algorithm is proposed for incomplete attack information formed by routing honeypots or routers’ logs. The aim of our work is to develop an analysis model for reconstruction of attack paths to traceback the botnet Command and Control (C&C) via ant-inspired collective intelligence to find possible routes with support and confidence degree. The validation of model uses NS2 (Network Simulator, version2) complied by dark IP map, to simulate the scenario of spoofed IP attacks, to test the effectiveness of model. Furthermore, sensitivity analysis is conducted to investigate significant parameters’ effect on the output of attack paths. Experimental results show that the proposed approach effectively suggests the best attack path and Command and Control of botnet in a dynamic network environment.
Yu, Sheng-Han, and 余昇瀚. "A Fast Attack Paths Reconstruction Method using SD-FEMM." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/52601665835129245480.
Full text樹德科技大學
資訊工程系碩士班
100
With the development of computer technology, IT-related devices, such as desktop computers, laptops, and even smart mobile phones etc., are becoming more and more popular with people all over the world. However, for lack of basic computer security knowledge, most people easily get malwares on their computer. Among some common Internet attacks, Distributed Denial of Service (DDoS) attack is still hard to defend. It purposely consumes a large poison of computing and network resources using weaknesses in network protocols or system exploits in order to prevent valid users from accessing these ones. Therefore, DDoS becomes one of the most serious network security issues in recent years. A IP Traceback method, called Probabilistic Packet Marking (PPM), is proposed to overcome the DDoS problem. Victims can reconstruct attack paths by collecting and analyzing marked information embedded in packets. However, the original PPM uses only the number of hops to classify marked information and discovers links along attack paths by combining marked information brute-forcely. The number of hops here stands for the distance between some router and the victim. Therefore, if there are two or more routers with the same distance from the victim, marked information produced by these routers will be classified into the same state. The computing time of rebuilding attack paths will dramatically increase. To make matters worse, combining these different routers marked data in the same state could reconstruct false positive paths. In this thesis, we modified Space-Domain Fast Extensible Markov Model (SD-FEMM) to identify every marked information and arrange respectively each one into its own state. Therefore, we could just pick up one sample from each state for combination, and that reduces the cost of computing resource. Moreover, the proposed scheme also improves the time of attack path reconstruction.
Tsou, Jui-Hsueh, and 鄒瑞雪. "Study of patch antenna for Van Atta element." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/88615578321257867142.
Full text元智大學
通訊工程學系
98
In this paper, I use double layers structure of Proximity Coupled Feed, and Microstrip Antenna to build Van Atta Array. By 2X1, 2X2, 4X1, and 4X4 array unit structure formats, I use Electromagnetic Field simulation analysis with CST simulation software. Under linear polarization structure, transmission line and radiation element of antenna are in the different planes. Through the back wave which coupled energy effects to pair antenna units, I will discuss array unit numbers, unit gap, array unit arrangement for each array and relationship which is affected by length of transmission line. Finally I will verify those by measuring far field experiment.