Literatura académica sobre el tema "Attack Detection Automation"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Attack Detection Automation".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Attack Detection Automation"
Wressnegger, Christian. "Efficient machine learning for attack detection". it - Information Technology 62, n.º 5-6 (16 de diciembre de 2020): 279–86. http://dx.doi.org/10.1515/itit-2020-0015.
Texto completoBeshah, Yonas Kibret, Surafel Lemma Abebe y Henock Mulugeta Melaku. "Drift Adaptive Online DDoS Attack Detection Framework for IoT System". Electronics 13, n.º 6 (7 de marzo de 2024): 1004. http://dx.doi.org/10.3390/electronics13061004.
Texto completoOkello, Fredrick Ochieng, Dennis Kaburu y Ndia G. John. "Automation-Based User Input Sql Injection Detection and Prevention Framework". Computer and Information Science 16, n.º 2 (2 de mayo de 2023): 51. http://dx.doi.org/10.5539/cis.v16n2p51.
Texto completoHoush, Mashor, Noy Kadosh y Jack Haddad. "Detecting and Localizing Cyber-Physical Attacks in Water Distribution Systems without Records of Labeled Attacks". Sensors 22, n.º 16 (12 de agosto de 2022): 6035. http://dx.doi.org/10.3390/s22166035.
Texto completoKarthik Krishnan, T., S. Sridevi, G. Bindu y R. Anandan. "Comparison and detail study of attacks and detection methods for wireless sensor network". International Journal of Engineering & Technology 7, n.º 2.21 (20 de abril de 2018): 405. http://dx.doi.org/10.14419/ijet.v7i2.21.12453.
Texto completoYe, Shengke, Kaiye Dai, Guoli Fan, Ling Zhang y Zhihao Liang. "Exploring the intersection of network security and database communication: a PostgreSQL Socket Connection case study". Transactions on Computer Science and Intelligent Systems Research 3 (10 de abril de 2024): 1–9. http://dx.doi.org/10.62051/pzqebt34.
Texto completoSztyber-Betley, Anna, Michał Syfert, Jan Maciej Kościelny y Zuzanna Górecka. "Controller Cyber-Attack Detection and Isolation". Sensors 23, n.º 5 (3 de marzo de 2023): 2778. http://dx.doi.org/10.3390/s23052778.
Texto completoBinbusayyis, Adel. "Reinforcing Network Security: Network Attack Detection Using Random Grove Blend in Weighted MLP Layers". Mathematics 12, n.º 11 (31 de mayo de 2024): 1720. http://dx.doi.org/10.3390/math12111720.
Texto completoKim, Ye-Eun, Yea-Sul Kim y Hwankuk Kim. "Effective Feature Selection Methods to Detect IoT DDoS Attack in 5G Core Network". Sensors 22, n.º 10 (18 de mayo de 2022): 3819. http://dx.doi.org/10.3390/s22103819.
Texto completoOruganti, Rakesh, Jeeshitha J y Rama Koteswara Rao G. "A Extensive Study on DDosBotnet Attacks in Multiple Environments Using Deep Learning and Machine Learning Techniques". ECS Transactions 107, n.º 1 (24 de abril de 2022): 15181–93. http://dx.doi.org/10.1149/10701.15181ecst.
Texto completoTesis sobre el tema "Attack Detection Automation"
Toure, Almamy. "Collection, analysis and harnessing of communication flows for cyber-attack detection". Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. http://www.theses.fr/2024UPHF0023.
Texto completoThe increasing complexity of cyberattacks, characterized by a diversification of attack techniques, an expansion of attack surfaces, and growing interconnectivity of applications with the Internet, makes network traffic management in a professional environment imperative. Companies of all types collect and analyze network flows and logs to ensure the security of exchanged data and prevent the compromise of information systems. However, techniques for collecting and processing network traffic data vary from one dataset to another, and static attack detection approaches have limitations in terms of efficiency and precision, execution time, and scalability. This thesis proposes dynamic approaches for detecting cyberattacks related to network traffic, using feature engineering based on the different communication phases of a network flow, coupled with convolutional neural networks (1D-CNN) and their feature detector. This double extraction allows for better classification of network flows, a reduction in the number of attributes and model execution times, and thus effective attack detection. Companies also face constantly evolving cyber threats, and "zero-day" attacks that exploit previously unknown vulnerabilities are becoming increasingly frequent. Detecting these zero-day attacks requires constant technological monitoring and thorough but time-consuming analysis of the exploitation of these vulnerabilities. The proposed solutions guarantee the detection of certain attack techniques. Therefore, we propose a detection framework for these attacks that covers the entire attack chain, from the data collection phase to the identification of any type of zero-day, even in a constantly evolving environment. Finally, given the obsolescence of existing datasets and data generation techniques for intrusion detection, and the fixed, non-evolving, and non-exhaustive nature of recent attack scenarios, the study of an adapted synthetic data generator while ensuring data confidentiality is addressed. The solutions proposed in this thesis optimize the detection of known and zero-day attack techniques on network flows, improve the accuracy of models, while ensuring the confidentiality and high availability of data and models, with particular attention to the applicability of the solutions in a company network
Štangler, Jan. "Architektura a správa zabezpečených sítí". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413065.
Texto completoNama, Sumanth. "Detecting attacks in building automation system". Thesis, California State University, Long Beach, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1597784.
Texto completoBuilding Automation System (BAS) was proposed to have the automatic centralized control of various appliances in the building such as heating, ventilating, air conditioning and other systems. Providing high security for the network layer in BAS was the major concern in recent times of studies. Researchers have been proposing different authentication protocols to stop the intruders from attacking the network, of which Time Efficient Stream Loss Authentication (TESLA) was the most secured protocol. Apart from its low computational and communicational overhead, there are few possible ways from which an intruder can attack a BAS network. Hence, to overcome this drawback we used a proposed algorithm in this paper, which uses the concept of Zero ? Knowledge Protocol (ZKP) in addition to TESLA for security. This combination of ZKP with time synchronization provides high authentication of packets in the network, thus making the network more secure and reliable. To test the security of the algorithm, we implement different wireless sensor network attacks such as sinkhole attack, and gray hole attack. Our proposed security algorithm is implemented by various WSN?s. We use Network Simulator 2 for simulation of the proposed algorithm. During the simulation, we observe detection of malicious nodes (intruders), thus proving the security of the proposed algorithm that in turn secures BAS.
Yadav, Tarun Kumar. "Automatic Detection and Prevention of Fake Key Attacks in Signal". BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/9072.
Texto completoGiunta, Alberto. "Implementazione e analisi comparativa di tecniche di Face Morphing Detection". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17029/.
Texto completoGill, Rupinder S. "Intrusion detection techniques in wireless local area networks". Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/29351/1/Rupinder_Gill_Thesis.pdf.
Texto completoGill, Rupinder S. "Intrusion detection techniques in wireless local area networks". Queensland University of Technology, 2009. http://eprints.qut.edu.au/29351/.
Texto completoBláha, Lukáš. "Analýza automatizovaného generování signatur s využitím Honeypotu". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236430.
Texto completoLin, Yu-Ren y 林育任. "Automatic Construction of Primitive Attack Templates for Primitive Attack-based Heterogeneous Intrusion Detection". Thesis, 2005. http://ndltd.ncl.edu.tw/handle/50928028528463091853.
Texto completo國立臺灣科技大學
資訊工程系
93
The security of networked computers strongly affects network applications. Although we already have firewalls and encryption systems, intrusion still happens often. IDSs (Intrusion Detection Systems) with different techniques and characteristics have thus been developed to serve as the second layer protection. Problems associated with IDS include: (1) IDSs often produce lots of low level alerts which aren’t integrated. (2) IDSs produce lots of false alerts. (3) Heterogeneous IDSs have their specific capabilities of detecting attacks; however, their detection scopes are limited. To cope with the problems, we proposed a two-layered heterogeneous intrusion detection architecture, which advocates primitive attacks to work as a mediator for correlating alerts. The first layer is the construction and detection of primitive attacks, responsible for integrating heterogeneous alerts into primitive attacks. This equivalently transforms low-level, different formats of alerts into a unified, higher-level representation. The second layer is the correlation of attack scenarios, responsible for correlating primitive attacks into attack scenarios and reporting their priorities. This thesis focuses on improving the first layer, the construction and detection of primitive attacks, mainly by introducing a module to automatically construct primitive attack templates. The module involves the following techniques. First, we apply the constrained data mining technique to learn interactive relationships among the alerts. Second based on the interaction relationships and the support of alert ontology, we automatically create primitive attack templates. Finally, we anchor the auto-generated primitive attack templates into attack ontology. Our experiments showed the auto-generated primitive attack templates successfully subsumed all manually constructed real primitive attack templates. The contributions of the work are as follows. First, the automatic construction technique of primitive attack templates can reduce the difficulties with manual construction of primitive attack templates by experts. Second, the constrained data mining technique can effectively discover interactive relationships among (heterogeneous) alerts and allows us to use their common contents to describe the relevant attributes of a primitive attack. Finally, the completed alert ontology (including network-based and host-based alerts) comprehensively classifies the alerts attached with annotated information, not only supporting the automatic construction of primitive attack templates in this thesis but also serving as a valuable resource for design and analysis of intrusion detection systems.
Liang, Ti-Hung y 梁滌宏. "A Study on Network ARP Attack Detection, Prevention and Automatic Connection Restoration". Thesis, 2015. http://ndltd.ncl.edu.tw/handle/21127536084053917591.
Texto completo國立臺灣海洋大學
電機工程學系
103
This research focuses on the analysis of network attacking via the NetCut software. This kind of software will send out huge ARP( Address Resolution Protocol ) packets to the network switch, whether the attacking is occurred or not. Using this characteristic, debugging mode through the layer3 of network switch will be used to collect the ARP information. The programming language Perl will be used to analyze the amount of ARP packets periodically. When the amount of ARP packets exceed the specific guarding value, the MAC of the host running NetCut will be blocked. After the amount of ARP packets is lower than the guarding value, the MAC of that host will be unblocked. The analysis processing will be executed automatically without human intervening.
Capítulos de libros sobre el tema "Attack Detection Automation"
Alsabbagh, Wael y Peter Langendoerfer. "A Remote Attack Tool Against Siemens S7-300 Controllers: A Practical Report". En Technologien für die intelligente Automation, 3–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-64283-2_1.
Texto completoZhang, Yanjing, Jianming Cui y Ming Liu. "Research on Adversarial Patch Attack Defense Method for Traffic Sign Detection". En Communications in Computer and Information Science, 199–210. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-8285-9_15.
Texto completoDoniyorbek, Usmanbayev y Bozorov Suhrobjon. "Analysis of Algorithm of Binary Classifiers to Improve Attack Detection Systems". En 12th World Conference “Intelligent System for Industrial Automation” (WCIS-2022), 81–87. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-51521-7_12.
Texto completoFritsch, Lothar, Aws Jaber y Anis Yazidi. "An Overview of Artificial Intelligence Used in Malware". En Communications in Computer and Information Science, 41–51. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17030-0_4.
Texto completoWurzenberger, Markus, Max Landauer, Agron Bajraktari y Florian Skopik. "Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation". En Cybersecurity of Digital Service Chains, 136–61. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_7.
Texto completoHoyos, Isaias, Bruno Esposito y Miguel Nunez-del-Prado. "DETECTOR: Automatic Detection System for Terrorist Attack Trajectories". En Information Management and Big Data, 160–73. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11680-4_17.
Texto completoLebrun, Stéphanie, Stéphane Kaloustian, Raphaël Rollier y Colin Barschel. "GNSS Positioning Security: Automatic Anomaly Detection on Reference Stations". En Critical Information Infrastructures Security, 60–76. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93200-8_4.
Texto completoYang, Xu, Qian Li, Cong Li y Yong Qi. "Robust Malware Detection System Against Adversarial Attacks". En Advances in Intelligent Automation and Soft Computing, 1059–67. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81007-8_122.
Texto completoPerkins, Jeff, Jordan Eikenberry, Alessandro Coglio, Daniel Willenson, Stelios Sidiroglou-Douskos y Martin Rinard. "AutoRand: Automatic Keyword Randomization to Prevent Injection Attacks". En Detection of Intrusions and Malware, and Vulnerability Assessment, 37–57. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40667-1_3.
Texto completoJin, Shuyuan, Zhi Yang y Xiang Cui. "Automatic Covert Channel Detection in Asbestos System (Poster Abstract)". En Research in Attacks, Intrusions, and Defenses, 380–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33338-5_22.
Texto completoActas de conferencias sobre el tema "Attack Detection Automation"
Zhang, Ruo, Guiqin Yang y Wei Zhang. "DDoS Attack Detection System Based on GBDT Under SDN". En 2024 IEEE 7th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 1415–19. IEEE, 2024. http://dx.doi.org/10.1109/itnec60942.2024.10733143.
Texto completoZhang, Wei, Guiqin Yang y Ruo Zhang. "DDoS Attack Detection Based on Rényi-RF in SDN Environment". En 2024 IEEE 7th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 1365–69. IEEE, 2024. http://dx.doi.org/10.1109/itnec60942.2024.10733276.
Texto completoZhu, Mengjiang, Tianfu Xu, Qun He, Rixuan Qiu, Jiang Zhu, Wei Wang y Jianye Li. "Research on APT Attack Detection Methods for Power Information Systems". En 2024 IEEE 7th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 1866–71. IEEE, 2024. http://dx.doi.org/10.1109/itnec60942.2024.10733125.
Texto completoDesnitsky, Vasily y Alexey Meleshko. "Modeling and Analysis of Secure Blockchain-Driven Self-Organized Decentralized Wireless Sensor Networks for Attack Detection". En 2024 International Russian Automation Conference (RusAutoCon), 199–204. IEEE, 2024. http://dx.doi.org/10.1109/rusautocon61949.2024.10694225.
Texto completoKha Nguyen, Dinh Duy, Cédric Escudero, Emil Dumitrescu y Eric Zamaï. "Actuator and Sensor Attacks Detection Method based on Attack Reconstruction". En 2024 32nd Mediterranean Conference on Control and Automation (MED). IEEE, 2024. http://dx.doi.org/10.1109/med61351.2024.10566177.
Texto completoSheng, Chen y Chen Gang. "APT Attack and Detection Technology". En 2024 IEEE 6th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC). IEEE, 2024. http://dx.doi.org/10.1109/imcec59810.2024.10575432.
Texto completoQiu, Bohua, Muheng Wei, Wen Xi, Yongjie Li y Qizhong Li. "CPS Attack Detection of Ships using Particle Filter". En 2021 China Automation Congress (CAC). IEEE, 2021. http://dx.doi.org/10.1109/cac53003.2021.9728218.
Texto completoSatam, Shruti Sanjay, Akansha Anadrao Patil, Devyani Bhagwan Narkhede, Sumit Singh y Namita Pulgam. "Zero-Day Attack Detection and Prevention". En 2023 7th International Conference On Computing, Communication, Control And Automation (ICCUBEA). IEEE, 2023. http://dx.doi.org/10.1109/iccubea58933.2023.10392272.
Texto completoGu, Tianbo, Allaukik Abhishek, Hao Fu, Huanle Zhang, Debraj Basu y Prasant Mohapatra. "Towards Learning-automation IoT Attack Detection through Reinforcement Learning". En 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, 2020. http://dx.doi.org/10.1109/wowmom49955.2020.00029.
Texto completoRuotsalainen, Henri, Albert Treytl y Thilo Sauter. "Watermarking Based Sensor Attack Detection in Home Automation Systems". En 2021 IEEE 26th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE, 2021. http://dx.doi.org/10.1109/etfa45728.2021.9613634.
Texto completoInformes sobre el tema "Attack Detection Automation"
Berney, Ernest, Naveen Ganesh, Andrew Ward, J. Newman y John Rushing. Methodology for remote assessment of pavement distresses from point cloud analysis. Engineer Research and Development Center (U.S.), abril de 2021. http://dx.doi.org/10.21079/11681/40401.
Texto completo