Dissertations / Theses on the topic 'Cyber defensive'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 44 dissertations / theses for your research on the topic 'Cyber defensive.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Markwood, Ian. "Offensive and Defensive Security for Everyday Computer Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7336.
Full textWong, Tiong Pern. "Active cyber defense: enhancing national cyber defense." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10713.
Full textStensboel, Karl Birger. "Norwegian cyber defense." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/39016.
Full textThis thesis postulates the need for a more proactive approach to cyber defense in Norway and offers recommendations about how Norway can be better prepared to counter cyber threats. It finds that Norways strategic infrastructure is vulnerable to cyber attacks and that Norway has no coherent strategy for meeting this challenge. The thesis argues that an effective cyber defense requires a wide range of offensive and defensive measures as well as a central authority for command and control. Norway must increasingly be perceived as a serious and tough player in cyberspace; this requires proactive thinking and offensive capabilities. An important first step would be to make the Ministry of Defense responsible for the nations cyber defense.
Cloud, Donald W. "Integrated cyber defenses towards cyber defense doctrine." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FCloud.pdf.
Full textThesis Advisor(s): Moran, Daniel ; Denning, Dorothy. "December 2007." Description based on title screen as viewed on January 18, 2008. Includes bibliographical references (p. 93-102). Also available in print.
Odhner, Caroline. "Cyber Deterrence Based Upon Conventional Premises : A Discourse Analysis of the US Cyber Deterrence Policy." Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10143.
Full textSushereba, Christen Elizabeth Lopez. "Comparison of Cyber Network Defense Visual Displays." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright15272019221867.
Full textMedvedev, Sergei A. "Offense-defense theory analysis of Russian cyber capability." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45225.
Full textThe Russian Federation is a key state actor in cyberspace; cyber events associated with Russian state and non-state actors have threatened Russia’s neighbors, shaped international cyber norms, as well as influenced strategists’ understanding of cyber power. This thesis seeks to understand Russian cyber capability through the lens of Robert Jervis’s offense-defense theory in order to answer the thesis’s central question: Do Russian cyber capabilities reflect an investment in offensive or defensive cyber weapons, and do Russia’s cyber technology, doctrine, and policy differentiate its posture as offensive or defensive? To evaluate Russian cyber capability, this thesis considers two factors—technology and geography—concluding that, although the Russian government is modifying its cyber terrain to improve defensiveness, Russia’s brandished cyber weapons suggest that it pursues offensive capability. To evaluate Russia’s posture differentiation, the thesis examines Russians’ understanding of cyber power, Russian information warfare and hybrid warfare doctrines, and the country’s international engagements, concluding that, although Russia has historically presented its posture as defensive, it is increasingly difficult to make that distinction. Finally, the thesis evaluates this state-level analysis in the broader context of the international system; Russia’s historical aggression and current behavior in cyberspace likely reflects Stephen van Evera’s explanATOry hypothesis for the causes of war—defensive expansion.
Zhang, Ruide. "Hardware-Aided Privacy Protection and Cyber Defense for IoT." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/98791.
Full textDoctor of Philosophy
The past few years have witnessed a rising in computing and networking technologies. Such advances enable the new paradigm, IoT, which brings great convenience to people's life. Large technology companies like Google, Apple, Amazon are creating smart devices such as smartwatch, smart home, drones, etc. Compared to the traditional internet, IoT can provide services beyond digital information by interacting with the physical world by its sensors and actuators. While the deployment of IoT brings value in various aspects of our society, the lucrative reward from cyber-crimes also increases in the upcoming IoT era. Two unique privacy and security concerns are emerging for IoT. On one hand, IoT brings a large volume of new sensors that are deployed ubiquitously and collect data 24/7. User's privacy is a big concern in this circumstance because collected sensor data may be used to infer a user's private activities. On the other hand, cyber-attacks now harm not only cyberspace but also the physical world. A failure in IoT devices could result in loss of human life. For example, a remotely hacked vehicle could shut down its engine on the highway regardless of the driver's operation. Our approach to emerging privacy and security concerns consists of two directions. The first direction targets at privacy protection. We first look at the privacy impact of upcoming ubiquitous sensing and argue for stricter access control on smart devices. Then, we follow the data flow of private data and propose solutions to protect private data from the networking and cloud computing infrastructure. The other direction aims at protecting the physical world. We propose an innovative method to verify the cyber state of IoT devices.
Azab, Mohamed Mahmoud Mahmoud. "Cooperative Autonomous Resilient Defense Platform for Cyber-Physical Systems." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/19273.
Full textRecent research argued against the suitability of the current security solutions to CPS environments. We assert the need for new defense platforms that effectively and efficiently manage dynamic defense missions and toolsets in real-time with the following goals:
1) Achieve asymmetric advantage to CPS defenders, prohibitively increasing the cost for attackers;
2) Ensure resilient operations in presence of persistent and evolving attacks and failures; and
3) Facilitate defense alliances, effectively and efficiently diffusing defense intelligence and operations transcending organizational boundaries.
Our proposed solution comprehensively addresses the aforementioned goals offering an evolutionary CPS defense system. The presented CPS defense platform, termed CyPhyCARD (Cooperative Autonomous Resilient Defenses for Cyber-Physical systems) presents a unified defense platform to monitor, manage, and control the heterogeneous composition of CPS components. CyPhyCARD relies on three interrelated pillars to construct its defense platform. CyPhyCARD comprehensively integrates these pillars, therefore building a large scale, intrinsically resilient, self- and situation- aware, cooperative, and autonomous defense cloud-like platform that provisions adequate, prompt, and pervasive defense services for large-scale, heterogeneously-composed CPS. The CyPhyCARD pillars are:
1) Autonomous management platform (CyberX) for CyPhyCARD\'s foundation. CyberX enables application elasticity and autonomic adaptation to changes by runtime diversity employment, enhances the application resilience against attacks and failures by multimodal recovery mechanism, and enables unified application execution on heterogeneously composed platforms by a smart employment of a fine-grained environment-virtualization technology.
2) Diversity management system (ChameleonSoft) built on CyberX. ChameleonSoft encrypts software execution behavior by smart employment of runtime diversity across multiple dimensions to include time, space, and platform heterogeneity inducing a trace-resistant moving-target defense that works on securing CyPhyCARD platform against software attacks.
3) Evolutionary Sensory system (EvoSense) built on CyberX. EvoSense realizes pervasive, intrinsically-resilient, situation-aware sense and response system to seamlessly effect biological-immune-system like defense. EvoSense acts as a middle layer between the defense service provider(s) and the Target of Defense (ToD) creating a uniform defense interface that hides ToD\'s scale and heterogeneity concerns from defense-provisioning management.
CyPhyCARD is evaluated both qualitatively and quantitatively. The efficacy of the presented approach is assessed qualitatively, through a complex synthetic CPS attack scenario. In addition to the presented scenario, we devised multiple prototype packages for the presented pillars to assess their applicability in real execution environment and applications. Further, the efficacy and the efficiency of the presented approach is comprehensively assessed quantitatively by a set of custom-made simulation packages simulating each CyPhyCARD pillar for performance and security evaluation. The evaluation illustrated the success of CyPhyCARD and its constructing pillars to efficiently and effectively achieve its design objective with reasonable overhead.
Ph. D.
Nsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.
Full textFlamholz, David B. "Baiting for defense against stealthy attacks on cyber-physical systems." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/121858.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 63-64).
The goal of this thesis is to develop a defense methodology for a cyber-physical system (CPS) by which an attempted stealthy cyber-attack is detected in near real time. Improvements in networked communication have enabled vast and complex dynamic control systems to exploit networked control schemes to seamlessly integrate parts and processes. These cyber-physical systems exhibit a level of flexibility that was previously unavailable but also introduce communication channels that are vulnerable to outside interference and malicious intervention. This thesis considers the effects of a type of stealthy attack on a class of CPS that can be modeled as linear time-invariant systems. The effects of this attack are studied from both the perspective of the attacker as well as the defender. A previously developed method for conducting stealthy attacks is introduced and analyzed.
This method consists of injecting malicious actuation signals into the control input of a CPS and then designing a sensor attack to conceal the effect of the actuator attack. The result is an attack that cannot be detected upon inspection of the Kalman filter residual. Successful implementation of this attack is shown to require the attacker to attain perfect model knowledge in order for the attack to be stealthy. Based on the execution of past attacks on CPS, this thesis proposes an attacker who starts their attack by "fishing" for critical and confidential system information such as the model parameters. A method is then proposed in which the defender attempts to feed the attacker a slightly falsified model, baiting the fishing attacker with data that will make an attack detectable. Because the attacker's model is no longer correct, their attack design will induce a mean-shift in the Kalman filter residual, breaking the stealthiness of the original attack formula.
It is then shown that the defender can not only detect this faulty attack, but use observations of the Kalman filter residual to regain more accurate state estimates, mitigating the effect of the attack.
by David B. Flamholz.
S.M.
S.M. Massachusetts Institute of Technology, Department of Mechanical Engineering
Dayanikli, Gokcen Yilmaz. "Electromagnetic Interference Attacks on Cyber-Physical Systems: Theory, Demonstration, and Defense." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/104862.
Full textDoctor of Philosophy
The secure operation of an electronic system depends on the integrity of the signals transmitted from/to components like sensors, actuators, and controllers. Adversaries frequently aim to block or manipulate the information carried in sensor and actuation signals to disrupt the operation of the victim system with physical phenomena, e.g., infrared light or acoustic waves. In this dissertation, it is shown that low-power electromagnetic (EM) waves, with specific frequency and form devised for the victim system, can be utilized as an attack tool to disrupt, and, in some scenarios, control the operation of the system; moreover, it is shown that these attacks can be mitigated with hardware-level countermeasures. In Chapter 2, the attacks are applied to electric motors on an unmanned aerial vehicle (UAV), and it is observed that an attacker can block (i.e., crash of the UAV) or control the UAV motion with EM waves. In Chapter 3, it is shown that digital communication systems are not resilient against intentional electromagnetic interference (IEMI), either. Low–power EM waves can be utilized by attackers to replace the data in serial communication systems with a success rate %98 or more. In Chapter 4, the attacks are applied to the sensors and actuators of electric vehicle chargers with low–cost over–the–shelf amplifiers and antennas, and it is shown that EM interference attacks can manipulate the sensor data and boosts the current supplied to the EV, which can result in overheating and fire. To ensure secure electronic system operation, hardware–level defense mechanisms are discussed and validated with analytical solutions, simulations, and experiments.
Kazinec, Darius. "Issues of cyber warfare in international law." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110705_132153-12860.
Full textKibernetinis karas jau egzistuoja daugiau nei dešimtmeti tačiau mes vis dar turime labai silpną šio reiškinio reguliavimą. Tokia situacija yra stipriai įtakota mūsų silpnu techniniu galimybių bei interneto struktūros. Kibernetinis karas yra labai keblus. Tai yra naujoviškas kariavimo būdas kurio mes nematome, bet jo pasekmes gali būti žaibiškos ir niokojančios. Mokslininkai ir pasaulio valstybės tai jau seniai pripažino. Šis darbas bando atskleisti galimybes tarptautines teises reguliavimui kibernetinio karo atžvilgiu, jeigu tai iš viso yra įmanoma. Tačiau mokslininkai vis dar ginčijasi dėl kibernetinio karo ir kibernetines erdvės terminologijos, tuo tarpu kibernetinio karo grėsme tik didėja. Pasaulio valstybes tai suprasdamos bando ištaisyti teisės trukumus, tačiau nesėkmingai. Bet kokie pasiūlymai ir susitarimai galioja tik nedideliam valstybių ratui. O didžiosios valstybės tuo tarpu nenoriai atsisakytu savo kibernetinio pajėgumo. Darbe buvo išanalizuotos tarptautinės sutartys bei valstybių praktika bandant pritaikyti esamus režimus kibernetinio karo reguliacijai. Darytinos išvados, kad esamos tarptautinės teisinės bazės taikymas geriausiu atveju yra sudėtingas ir nenatūralus. Realybė yra tai, kad kibernetiniam karui netinka nei vienas režimas. O toks jo taikymas, deja sukelia daugiau problemų nei buvo prieš tai. Tačiau dar nėra išsemtos visos galimybės ir ateitis gali parodyti teisingą sprendimą. Tuo tarpu valstybes yra pasiruošusios vesti derybas dėl tarptautinės... [toliau žr. visą tekstą]
Smith, Willarvis. "A Comprehensive Cybersecurity Defense Framework for Large Organizations." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1083.
Full textRubin, Willa. "Waging Wars in Cyberspace: How International Law On Aggression And Self-Defense Falls Short Of Addressing Cyber Warfare.Could Iran Legally Retaliate For The Stuxnet Attack?" Oberlin College Honors Theses / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=oberlin1462921585.
Full textПрокопець, Я. Ю., Михайло Олександрович Думчиков, Михаил Александрович Думчиков, and Mykhailo Oleksandrovych Dumchykov. "Реалізація кібербезпеки та шляхи її вдосконалення в Україні." Thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/78670.
Full textLipke, Alexa. "U.S. and NATO Cyber Defense| Bridging the Resource Gap with a Centralized Market Structure." Thesis, The George Washington University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10189713.
Full textThis paper will examine how the organizational structures of the U.S. military and the North Atlantic Treaty Organization (NATO) evolved to address the proliferating array of cyber threats. One of the gaps in military cybersecurity is the growing demand for qualified cyber security personnel. Estonia and other countries have employed all-volunteer cyber militias to help protect national security during emergencies. However, the U.S. and NATO are not in the political or legal position to rely upon an all-civilian group. Utilizing Thomas Malone's framework for business, the U.S. military and NATO could abandon their traditional hierarchies and embrace a centralized market model in order to delegate some of their cybersecurity tasks. One way to decentralize their structures is to modify the Estonian Cyber Defense League model by further implementing their reserves systems. They could hire skilled civilian technology professionals through their reserves, eventually creating Cyber Defense Leagues that are primarily comprised of non-commissioned officers.
Eldosouky, Mahmoud Salama Abdelrahman A. "Security of Critical Cyber-Physical Systems: Fundamentals and Optimization." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/90281.
Full textDoctor of Philosophy
Cyber-physical systems (CPSs) have recently been used in many application domains because of their ability to integrate physical elements with a cyber layer allowing for sensing, monitoring, and remote controlling. This pervasive use of CPSs in different applications has brought forward new security challenges and threats. Malicious attacks can now leverage the connectivity of the cyber layer to launch remote attacks and cause damage to the physical components. Taking these threats into consideration, it became imperative to ensure the security of CPSs. Given that many CPSs provide critical services, for instance many critical infrastructure (CI) are CPSs such as smart girds and nuclear reactors; it is then inevitable to ensure that these critical CPSs can maintain proper operation. One key measure of the CPS’s functionality, is resilience which evaluates the ability of a CPS to deliver its designated service under potentially disruptive situations. In general, resilience measures a CPS’s ability to adapt or rapidly recover from disruptive events. Therefore, it is crucial for CPSs to be resilient in face of potential failures. To this end, the central goal of this dissertation is to develop novel analytical frameworks that can evaluate and improve security and resilience of CPSs. In these frameworks, cross-disciplinary tools are used from game theory, contract theory, and optimization to develop robust analytical solutions for security and resilience problems. In particular, these frameworks led to the following key contributions in cyber security: developing an analytical framework to mitigate the effects of GPS spoofing attacks against UAVs, introducing a game-theoretic moving target defense (MTD) framework to improve the cyber security, and securing data privacy in m-health Internet of Things (IoT) networks using a MTD cryptographic framework. In addition, the dissertation led to the following contributions in CI resilience: developing a general framework using Bayesian Networks to evaluate and improve the resilience of CIs against their components failure, introducing a contracttheoretic model to allocate resources to multiple connected CIs under complete and asymmetric information scenarios, providing a proactive plan to improve the resilience of transportation networks against flooding, and, finally, developing an environment-aware framework to deploy UAVs in disaster-areas
Branlat, Matthieu. "Challenges to Adversarial Interplay Under High Uncertainty: Staged-World Study of a Cyber Security Event." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1316462733.
Full textPombo, Rodrigo. "Política europeia de segurança no ciberespaço." Master's thesis, Academia da Força Aérea, 2019. http://hdl.handle.net/10400.26/39771.
Full textNowadays, Europe and the world are increasingly dependent on technology, and the increasing use of the internet by the population has created huge opportunities. At the same time cyber-threats and cyber-attacks have come to affect not only the privacy and security of the users but also the infrastructures of the states themselves. Due to the increased frequency of cyber-threats and cyber-attacks, the EU had to act and take steps to ensure the safety of its citizens and to develop cyber-security policies and measures. The emergence of cyber-attacks such as the Balkans in 1999 or more recently, the attacks against Estonia and Georgia in 2007 and 2008 respectively showed that Europe wasn´t strategically prepared in the cyberspace area. As a result, first NATO and then the EU have developed cyber-security policies and strategies to respond to cyber threats. In particular the EU has emphasized the importance of Member States cooperating with the private sector in order to overcome the challenge of cyberspace. In fact, Public and Private Partnerships have become crucial to the evolution of cyberspace, both in helping to protect critical infrastructures and the access by the public sector to private sector resources as well as the possibility of creating synergies between the various private sector initiatives with the aim of developing the world of cyberspace. In this sense to improve the security of cyberspace, it is essential to create cooperations between Member States in order to promote the necessary measures for their cyber security, as well as the main international organizations. Thus, they will overcome the difficulties that Man has created in this technological dependency.
N/A
Stewart, Alexander. "The Community Defense Approach: A Human Approach to Cybersecurity for Industrial and Manufacturing Systems." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1562059795078067.
Full textЯровенко, Ганна Миколаївна, Анна Николаевна Яровенко, Hanna Mykolaivna Yarovenko, and І. Д. Нечепоренко. "Сучасні технології кіберзахисту щодо виявлення шахрайств, що здійснюються персоналом банку." Thesis, Сумський державний університет, 2019. https://essuir.sumdu.edu.ua/handle/123456789/77725.
Full textKullander, Nathalia. "En analys kring det civila försvaret på lokal nivå. : En jämförande studie mellan Värmland och Örebros resurser och samarbetsförmågor." Thesis, Karlstads universitet, Fakulteten för humaniora och samhällsvetenskap (from 2013), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-85130.
Full textKanerva, Anton, and Fredrik Helgesson. "On the Use of Model-Agnostic Interpretation Methods as Defense Against Adversarial Input Attacks on Tabular Data." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-20085.
Full textKontext. Maskininlärning är ett område inom artificiell intelligens som är under konstant utveckling. Mängden domäner som vi sprider maskininlärningsmodeller i växer sig allt större och systemen sprider sig obemärkt nära inpå våra dagliga liv genom olika elektroniska enheter. Genom åren har mycket tid och arbete lagts på att öka dessa modellers prestanda vilket har överskuggat risken för sårbarheter i systemens kärna, den tränade modellen. En relativt ny attack, kallad "adversarial input attack", med målet att lura modellen till felaktiga beslutstaganden har nästan uteslutande forskats på inom bildigenkänning. Men, hotet som adversarial input-attacker utgör sträcker sig utom ramarna för bilddata till andra datadomäner som den tabulära domänen vilken är den vanligaste datadomänen inom industrin. Metoder för att tolka komplexa maskininlärningsmodeller kan hjälpa människor att förstå beteendet hos dessa komplexa maskininlärningssystem samt de beslut som de tar. Att förstå en modells beteende är en viktig komponent för att upptäcka, förstå och mitigera sårbarheter hos modellen. Syfte. Den här studien försöker reducera det forskningsgap som adversarial input-attacker och motsvarande försvarsmetoder i den tabulära domänen utgör. Målet med denna studie är att analysera hur modelloberoende tolkningsmetoder kan användas för att mitigera och detektera adversarial input-attacker mot tabulär data. Metod. Det uppsatta målet nås genom tre på varandra följande experiment där modelltolkningsmetoder analyseras, adversarial input-attacker utvärderas och visualiseras samt där en ny metod baserad på modelltolkning föreslås för detektion av adversarial input-attacker tillsammans med en ny mitigeringsteknik där feature selection används defensivt för att minska attackvektorns storlek. Resultat. Den föreslagna metoden för detektering av adversarial input-attacker visar state-of-the-art-resultat med över 86% träffsäkerhet. Den föreslagna mitigeringstekniken visades framgångsrik i att härda modellen mot adversarial input attacker genom att minska deras attackstyrka med 33% utan att degradera modellens klassifieringsprestanda. Slutsats. Denna studie bidrar med användbara metoder för detektering och mitigering av adversarial input-attacker såväl som metoder för att utvärdera och visualisera svårt förnimbara attacker mot tabulär data.
Petras, Christopher M. "The convergence of U.S. military and commercial space activities : self-defense and cyber-attack, "peaceful use" and the space station, and the need for legal reform." Thesis, McGill University, 2001. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33058.
Full textRobin, Jean-Nicolas. "La matière pénale à l'épreuve du numérique." Thesis, Rennes 1, 2017. http://www.theses.fr/2017REN1G035/document.
Full textToday, it seems possible to consider that digital technology and cyberspace have completely changed the balance of power in our modern society. By digitizing, the society gives its members almost unlimited access to millions of resources and data. Digital technology also facilitates personal and professional relationships between individuals. If digital technology can be presented as a real revolution, it exposes its user to new vulnerabilities and risks. The criminal law, insofar as it governs society and chooses the social values to be protected, has therefore been concerned with the development of digital technology. The present study notes the extensive legislative arsenal for fighting in the most effective manner against digital delinquency. Nevertheless, the analysis observes that many obstacles are against the application of criminal law into the cyberspace because of networks particularities. Moreover, digital crime is not the only threat generated by digital technology, since it is now possible to consider the cyberspace as a new space for confrontation. Thus, military threat is added to digital delinquency as the States set up electronics weapons into networks. Then, the arised question is about the relevance of these state choices and the solutions to intensify the fight against digital delinquency
Калетнік, В. В. "Сучасний стан адміністративно-правового забезпечення інформаційної безпеки в Україні: теоретико-правовий аналіз." Thesis, Національний авіаційний університет, 2021. https://er.nau.edu.ua/handle/NAU/53718.
Full textTsai, Chung-Weng, and 蔡仲威. "Increasing information security skills by using cyber offensive and defensive competitions." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/07725885062425976779.
Full text元智大學
資訊管理學系
105
Information security has become a critical issue in recent years due to the increasing amount of internet hacking, To effectively prevent the endless stream of Internet hacking events, many countries in the world have devoted tremendous effort to cultivate information technology (IT) professionals. The IT staff’s skill in computer security cannot be improve solely by asking their certificates obtained through standard examination procedures without providing proper training. Many organizations urgently to find good ways effectively enhance IT security personnel’s skill. Recently, the games of cyber offensive and defensive have become popular. As these competitions are highly similar to realistic situations in the current environment, this study aims to examine if the competition games can be used as an effective approach for training information security personnel. We also explore which type of computer security skills can be improver by using the games. For the objective, we implemented a game of cyber offensive and defensive as a training system, and recruit IT personnel in a military unit to experimental test the training system. The comparison of the experimental group and control group shows that the training system can effectively improve IT personnel’s computer security skill in 〝system weaknesses and vulnerabilitiesc〞, 〝password deciphering〞 and 〝reverse engineering〞.
"A Hacker-Centric Perspective to Empower Cyber Defense." Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.57382.
Full textDissertation/Thesis
Doctoral Dissertation Computer Science 2020
Hasan, Mahmudul. "Cybersecurity Planning Insight: CSCD (Cyber Security and Cyber Defense) Control: Framework For Strategic Direction and Governance." Master's thesis, 2021. http://hdl.handle.net/10362/126392.
Full textIn this recent time, the importance of cybersecurity and cyber defense is sky-high. Everyone uses different devices, IT infrastructures, and applications for various purposes at school, office, home, hospitals everywhere. With the enlightenment of technology, the nature of cyber-attack has been changed dramatically, and that is why the number of cyber-attacks have been increased. Enterprises face billions of Euros loss from such incidents; even the data loss and operational hazard may have a devastating impact not only on the service, security, privacy, brand image but also upon overall business. A constrictive and realistic CSCD (cyber security and cyber defense) strategy along with the proper implementation of it, can safeguard the enterprises and strongly from cyber attacks. In this paper, we prepare an improved CSCD control framework based on several hundreds of scientific papers and frameworks. Moreover, we identify different aspects and strategic elements by holistic CSCD control risk assessment and data analysis for preparing CSCD strategy and planning of different levels of organizations to maintain effective CSCD governance and cyber resilience.
柯柏宇. "A Study of Virtual-Machine-Based Cyber Defense Exercises." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/7gghfu.
Full text國防大學理工學院
資訊工程碩士班
106
Now Capture The Flag (CTF) is one of the most popular type of information security competitions around the world. The attendee needs to solve a series of challenges, or patch some vulnerabilities for defending owning system to earn points. The CTF can be categorized into three types: Jeopardy, Attack-Defense and King of the Hill.. CTF is a very matured method for evaluating information security technical skills. CTFtimes.org is a CTF portal for collecting all the competitions in the world. Hacker can track their performance and write-ups in the portal. Many new CTF games are showing up now. In order to train cyber security experts with the complicated and difficult security problems which similar to the issues in real world, in this research, we brought out a Jeopardy-type CTF based on virtual machine technology and practical scenario guidance. We used it for Cyber Defense Exercises in the past two years and obtained good training results. Jeopardy-type CTF is a good way for training skills, however, the virtual Infrastructure of it is becoming more and more complex and huge as the scenario grows. It is not an easy task for preserve and deploy. In this research, we propose a lightweight method with scripting language to generate a new virtual Infrastructure with fast speed and store it with only necessary spaces.
Rullo, Antonino, Andrea Pugliese, Domenico Saccà, and Sergio Greco. "Cyber defense of enterprise information systems: advanced isues and techniques." Thesis, 2014. http://hdl.handle.net/10955/1242.
Full text(10907916), Kelly Anne Cole. "Investigating Cyber Performance: An Individual Differences Study." Thesis, 2021.
Find full textWU, KUAN-SHENG, and 吳冠陞. "Implementation of cyber attack and defense strategy in software defined network." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/m44bqg.
Full text國立臺灣科技大學
資訊工程系
107
Due to the maturity of virtualization technology in recent years, the traditional network hardware architecture cannot flexibly manage the network of virtual machines. The emergence of the Software Define Network (SDN) will be divided into the Network Control Plane and Data Plane, can effectively manage the Network, and the number of virtual machines need to expand, the Software Define Network can also be flexible to increase the number of Software switches, and manage the switches. The Controller controls how packets are forwarded and whether they are processed. In SDN architecture, Controller is like a human brain dominate everything, and Data Plane is like human limbs, in the loss of Controller command, Data Plane does not know how to transfer packets. This we try to attack the Controller in the the SDN network by making the modules which has the traditional network attack module and the soft define network only in the SDN network architecture. This paper discusses the software define network attack techniques, and the impact of the attack on the SDN network architecture. Finally, in this paper we try to establish a defense structure and implement a defence strategy Defender against attack. The experiment shows that Defender can correctly defend against the cyber attack.
Civins, Braden Eph. "In search of a cyber Manhattan Project : assorted thoughts on U.S. cyberattack by." Thesis, 2011. http://hdl.handle.net/2152/ETD-UT-2011-08-4199.
Full texttext
Ching-HuangLin and 林敬皇. "Framework Design for Cyber Attack and Defense Exercises with Empirical Cloud Data." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/58312539008444263933.
Full text國立成功大學
電腦與通信工程研究所
101
Cyber Security Exercise training is gaining more attention in the information security field. Actual hands-on practice will strengthen the capabilities of attack and defense. Hence, we propose The Cyber Attack and Defense Exercises Framework in the dissertation to assist academic researchers or military cyber-units in designing, planning and performing security exercises. A competition of network attacks and defense was held on the Taiwan Network Security Testing Platform (Testbed@TWISC) to collect empirical data, verify suitability and find the direction for improving the proposed framework. Besides providing real world services, the cloud environment can be used to provide a variety of network attack and defense exercises. Cyber security competitions will become increasingly difficult to hold in a real network environments with physical host implementations. The use of cloud computing environments (especially IaaS architecture with VM) to perform cyber attack and defense games will become a trend. Another part of this study proposes a “VM Performance Model” to determine the optimal VM allocation based on Service Level Agreement. We collect data from virtual machines within the production cloud service platform of the Computer and Network Center in National Cheng Kung University. By defining the VM Allocation Problem and validating the model against the gathered data using Beta distribution, we detail a method to solve the VM Allocation Problem and find the optimal VM allocation on based on specific availability requirements SLA parameters are matched with reservations to find the best VM configuration and most efficient allocation of resources. Simulations prove the proposed VM Performance Model is valid for use in IaaS managers this portion of the work is focused on identifying effective use of cloud computing environments (especially IaaS architecture using VMs) for cyber attack and defense exercises or other cloud applications and services.
Lopes, Carvalho Viana André. "NATO and Offensive Cybersecurity: A Strategic Analysis." Master's thesis, 2018. http://www.nusl.cz/ntk/nusl-387165.
Full textTzy-ShiahWang and 王子夏. "Cyber-Attack Detection and Defense Based on Spectral Analysis and Community Structure Recognition." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/whhzsj.
Full text國立成功大學
電腦與通信工程研究所
105
With the ever-growing number of online services nowadays, and the proliferation of wireless access services, more and more users are connecting to the Internet. However, the increasing reliance on the Internet and associated network services exposes users to the risk of malicious attacks by third parties intent on causing short-term disruption or more serious long-term damage. Among the various network security concerns, botnets are regarded as one of the leading threats to network security, and are used to conduct a wide range of malicious activities, including information theft, phishing, spam mail distribution, and Distributed Denial of Service (DDoS) attacks. Of the various forms of botnet, DGA-based botnets, which utilize a Domain Generation Algorithm (DGA) to avoid detection, are one of the most disruptive and difficult to detect. In addition to botnets, attacks on social network sites have also emerged as a major concern in recent years. One of the most common and harmful types of attack is the Sybil attack, in which the attacker creates multiple identities and uses these identities to breech a running system with fake information. Although botnets and Sybil attacks are both difficult to detect, they leave behind several important clues which can be used to identify their presence. For example, when mapping the communication patterns of a botnet, or the relationships among the sybil nodes and the honest nodes, on to a graph, the graph shows a unique characteristic in terms of the community structure. Accordingly, this dissertation proposes a clustering algorithm for detecting the community structure of cyber-attacks. More specifically, to address the problem of DGA-based botnets, a scheme is proposed for detecting botnet activity by analyzing the query behavior of the DNS traffic. The proposed scheme exploits the fact that hosts compromised by the same DGA-based malware query the same sets of domains in the domain list and most of these queries fail since only a very small number of the domains are actually associated with an active C&C. The evaluation results show that the proposed scheme provides an accurate and effective means of detecting both existing and new DGA-based botnet patterns in real-world networks. To counter the problem of Sybil attacks, the dissertation additionally proposes a defense mechanism based on the characteristic structural properties of honest and sybil groups. Notably, in contrast to most existing Sybil defense schemes, which require a knowledge of at least one honest node in advance, the scheme proposed in this dissertation has the ability to detect sybil groups in a network without the need for any prior knowledge regarding the honest nodes. The performance of the proposed defense scheme is evaluated using data obtained from a real-world social network (Facebook). The results show that the proposed scheme has the ability to detect Sybil attacks in real social networks with a low false positive ratio.
Molina, Valdiviezo Lorena Paulina, Felice Crupi, and Angelo Furfaro. "Simulation models for the evaluation of detection and defense protocols against cyber attacks." Thesis, 2016. http://hdl.handle.net/10955/1361.
Full text(8072417), Braiden M. Frantz. "CISTAR Cybersecurity Scorecard." Thesis, 2019.
Find full textHighly intelligent and technically savvy people are employed to hack data systems throughout the world for prominence or monetary gain. Organizations must combat these criminals with people of equal or greater ability. There have been reports of heightened threats from cyber criminals focusing upon the energy sector, with recent attacks upon natural gas pipelines and payment centers. The Center for Innovative and Strategic Transformation of Alkane Resources (CISTAR) working collaboratively with the Purdue Process Safety and Assurance Center (P2SAC) reached out to the Computer and Information Technology Department to assist with analysis of the current cybersecurity posture of the companies involved with the CISTAR initiative. This cybersecurity research project identifies the overall defensive cyber posture of CISTAR companies and provides recommendations on how to bolster internal cyberspace defenses through the identification of gaps and shortfalls, which aided the compilation of suggestions for improvement. Key findings include the correlation of reduced cybersecurity readiness to companies founded less than 10 years ago, cybersecurity professionals employed by all CISTAR companies and all CISTAR companies implementing basic NIST cybersecurity procedures.
CHENG, YI-WEN, and 程詒文. "The Normative Framework of the State’s Right of Self-Defense as a Response to Cyber Attack." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/836597.
Full text國防大學
法律學系
107
Awareness has been growing in recent years that modern societies, increasingly Internet-dependent, are highly vulnerable to malicious intrusion into their computers and Internet. The reality of cyber attacks have already proven remarkably threatened, which can cause physical damage and human casualties. As a result, the issues of whether cyber attacks meet the threshold of UN Charter Article 2(4) needs to be taken into consideration. This article addresses the jus ad bellum examining cyber attacks as prohibited acts under the laws governing the resort to force and qualifying the specific characteristics which can be considered as a use of force contrary to Article 2(4) of the UN Charter. Nine factors are to be taken into account when determining whether an attack will constitute a use of force: severity, immediacy, directness, invasiveness, measurability of effects, military character, state involvement, presumptive legality and target. As the criteria has been reached, such attack constitutes a use of force which breaches the prohibition against force in international law. The article also examines the attribution of attacks and the right of states to take countermeasures against non-state actor, including compensation and self-defense regulated in the UN Charter Article 51. Therefore, when the scale and effects of an attack rises to the level of an armed attack, a state may exercise its inherent right of self-defense. As a cyber attack occurs and accompanies with the requirement of imminence and immediacy, a state has the right to use force as anticipatory self-defense.
Hsu, Chin-Ping, and 許錦萍. "The Ideal and Reality of Cross-region Joint Defense Cyber Security Policy – A Case Study of A and B-level Government Agencies." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/pb32mv.
Full textYang, Shih-Feng, and 楊世豐. "Research on Application of Cyber Security in Taiwan''s Defense Industry- CSC v6 of SANS Organization as the Inspection Standard." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/455bq4.
Full text國立中山大學
管理學院高階經營碩士學程在職專班
107
In 2016, Taiwan Government selected "Aerospace Industry", "Shipbuilding Industry" and "Cybersecurity Industry" as the targets of nurturing and developing for major Defense Industries. How to assess the impact of "Cybersecurity Management" on the competitiveness of each individual Company in the Taiwan Defense Industry Supply Chains is one of the key priorities. The so-called ISMS (Information Security Management System) is a system that manages the cybersecurity inside a Company and is an impartant part of the overarching management systems. In addition to effectively manage the resources, a Company must formulate a management system IAW risk management methodology to well manage the risks, and the key purpose of ISMS is to effectively control the risks to the Company, and utilize it to establish and implement how the Company operate and monitor their cybersecurity, and it further serves as the basis for the Company to review and maintain their cybersecurity in order to achieve the umtimate goal of improving the organization''s cybersecurity to ensure that the Company''s operational risks can be effectively controlled and reduced, and to be in the hopes that this study could provide the Company with a basic concept to look inward to review their “Level of Cybersecurity” at the same time, therefore, this study mainly focuses on making sure whether a Company in the “Taiwan Defense Industry Supply Chains” possesses the required awareness of "Cybersecurity management" and can assess the Company’s Level and Procedures of Cybersecurity Capability on their own. This study mainly refers to the 6th edition of the Critical Security Controls (CSC) issued by the SANS (System Administration Networking and Security) as the guiding basis. The design of the study is to discuss with the managing department or decision maker(s) and information-related departments of the Companies in the supply chains to see whether the mechanism of the ISMS is actually followed through, and utilize the findings to assist the Company in the spirit of planning-executing- checking–improving to fully implement Cybersecurity Management to further their core competitiveness. When reviewing a Company’s ISMA, this study uses six levels of 20 key indicators in the expectation that these key indicators will enhance their protection of Cybersecurity and increase their core competitiveness to achieve: 1. The assessment of the impact of the cybersecurity management on the Company’s business. 2. The managing the known internal vulnerabilities to ensure and formulate their security policies to mitigate the risks. 3. The reviewing of the threats faced by the Company and the assessing of the lacuna(s) in their protective measures. 4. The verifying of their authority control criterion and follow-through of their cybersecurity. Keywords: cybersecurity, Taiwan Defense Industry, ISMS, SANS, CSC
"The What, When, and How of Strategic Movement in Adversarial Settings: A Syncretic View of AI and Security." Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.62910.
Full textDissertation/Thesis
Doctoral Dissertation Computer Science 2020