Littérature scientifique sur le sujet « Attack Detection Automation »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Attack Detection Automation ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Attack Detection Automation"
Wressnegger, Christian. « Efficient machine learning for attack detection ». it - Information Technology 62, no 5-6 (16 décembre 2020) : 279–86. http://dx.doi.org/10.1515/itit-2020-0015.
Texte intégralBeshah, Yonas Kibret, Surafel Lemma Abebe et Henock Mulugeta Melaku. « Drift Adaptive Online DDoS Attack Detection Framework for IoT System ». Electronics 13, no 6 (7 mars 2024) : 1004. http://dx.doi.org/10.3390/electronics13061004.
Texte intégralOkello, Fredrick Ochieng, Dennis Kaburu et Ndia G. John. « Automation-Based User Input Sql Injection Detection and Prevention Framework ». Computer and Information Science 16, no 2 (2 mai 2023) : 51. http://dx.doi.org/10.5539/cis.v16n2p51.
Texte intégralHoush, Mashor, Noy Kadosh et Jack Haddad. « Detecting and Localizing Cyber-Physical Attacks in Water Distribution Systems without Records of Labeled Attacks ». Sensors 22, no 16 (12 août 2022) : 6035. http://dx.doi.org/10.3390/s22166035.
Texte intégralKarthik Krishnan, T., S. Sridevi, G. Bindu et R. Anandan. « Comparison and detail study of attacks and detection methods for wireless sensor network ». International Journal of Engineering & ; Technology 7, no 2.21 (20 avril 2018) : 405. http://dx.doi.org/10.14419/ijet.v7i2.21.12453.
Texte intégralYe, Shengke, Kaiye Dai, Guoli Fan, Ling Zhang et Zhihao Liang. « Exploring the intersection of network security and database communication : a PostgreSQL Socket Connection case study ». Transactions on Computer Science and Intelligent Systems Research 3 (10 avril 2024) : 1–9. http://dx.doi.org/10.62051/pzqebt34.
Texte intégralSztyber-Betley, Anna, Michał Syfert, Jan Maciej Kościelny et Zuzanna Górecka. « Controller Cyber-Attack Detection and Isolation ». Sensors 23, no 5 (3 mars 2023) : 2778. http://dx.doi.org/10.3390/s23052778.
Texte intégralBinbusayyis, Adel. « Reinforcing Network Security : Network Attack Detection Using Random Grove Blend in Weighted MLP Layers ». Mathematics 12, no 11 (31 mai 2024) : 1720. http://dx.doi.org/10.3390/math12111720.
Texte intégralKim, Ye-Eun, Yea-Sul Kim et Hwankuk Kim. « Effective Feature Selection Methods to Detect IoT DDoS Attack in 5G Core Network ». Sensors 22, no 10 (18 mai 2022) : 3819. http://dx.doi.org/10.3390/s22103819.
Texte intégralOruganti, Rakesh, Jeeshitha J et Rama Koteswara Rao G. « A Extensive Study on DDosBotnet Attacks in Multiple Environments Using Deep Learning and Machine Learning Techniques ». ECS Transactions 107, no 1 (24 avril 2022) : 15181–93. http://dx.doi.org/10.1149/10701.15181ecst.
Texte intégralThèses sur le sujet "Attack Detection Automation"
Toure, Almamy. « Collection, analysis and harnessing of communication flows for cyber-attack detection ». Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. http://www.theses.fr/2024UPHF0023.
Texte intégralThe increasing complexity of cyberattacks, characterized by a diversification of attack techniques, an expansion of attack surfaces, and growing interconnectivity of applications with the Internet, makes network traffic management in a professional environment imperative. Companies of all types collect and analyze network flows and logs to ensure the security of exchanged data and prevent the compromise of information systems. However, techniques for collecting and processing network traffic data vary from one dataset to another, and static attack detection approaches have limitations in terms of efficiency and precision, execution time, and scalability. This thesis proposes dynamic approaches for detecting cyberattacks related to network traffic, using feature engineering based on the different communication phases of a network flow, coupled with convolutional neural networks (1D-CNN) and their feature detector. This double extraction allows for better classification of network flows, a reduction in the number of attributes and model execution times, and thus effective attack detection. Companies also face constantly evolving cyber threats, and "zero-day" attacks that exploit previously unknown vulnerabilities are becoming increasingly frequent. Detecting these zero-day attacks requires constant technological monitoring and thorough but time-consuming analysis of the exploitation of these vulnerabilities. The proposed solutions guarantee the detection of certain attack techniques. Therefore, we propose a detection framework for these attacks that covers the entire attack chain, from the data collection phase to the identification of any type of zero-day, even in a constantly evolving environment. Finally, given the obsolescence of existing datasets and data generation techniques for intrusion detection, and the fixed, non-evolving, and non-exhaustive nature of recent attack scenarios, the study of an adapted synthetic data generator while ensuring data confidentiality is addressed. The solutions proposed in this thesis optimize the detection of known and zero-day attack techniques on network flows, improve the accuracy of models, while ensuring the confidentiality and high availability of data and models, with particular attention to the applicability of the solutions in a company network
Štangler, Jan. « Architektura a správa zabezpečených sítí ». Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413065.
Texte intégralNama, Sumanth. « Detecting attacks in building automation system ». Thesis, California State University, Long Beach, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1597784.
Texte intégralBuilding Automation System (BAS) was proposed to have the automatic centralized control of various appliances in the building such as heating, ventilating, air conditioning and other systems. Providing high security for the network layer in BAS was the major concern in recent times of studies. Researchers have been proposing different authentication protocols to stop the intruders from attacking the network, of which Time Efficient Stream Loss Authentication (TESLA) was the most secured protocol. Apart from its low computational and communicational overhead, there are few possible ways from which an intruder can attack a BAS network. Hence, to overcome this drawback we used a proposed algorithm in this paper, which uses the concept of Zero ? Knowledge Protocol (ZKP) in addition to TESLA for security. This combination of ZKP with time synchronization provides high authentication of packets in the network, thus making the network more secure and reliable. To test the security of the algorithm, we implement different wireless sensor network attacks such as sinkhole attack, and gray hole attack. Our proposed security algorithm is implemented by various WSN?s. We use Network Simulator 2 for simulation of the proposed algorithm. During the simulation, we observe detection of malicious nodes (intruders), thus proving the security of the proposed algorithm that in turn secures BAS.
Yadav, Tarun Kumar. « Automatic Detection and Prevention of Fake Key Attacks in Signal ». BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/9072.
Texte intégralGiunta, Alberto. « Implementazione e analisi comparativa di tecniche di Face Morphing Detection ». Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17029/.
Texte intégralGill, Rupinder S. « Intrusion detection techniques in wireless local area networks ». Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/29351/1/Rupinder_Gill_Thesis.pdf.
Texte intégralGill, Rupinder S. « Intrusion detection techniques in wireless local area networks ». Queensland University of Technology, 2009. http://eprints.qut.edu.au/29351/.
Texte intégralBláha, Lukáš. « Analýza automatizovaného generování signatur s využitím Honeypotu ». Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236430.
Texte intégralLin, Yu-Ren, et 林育任. « Automatic Construction of Primitive Attack Templates for Primitive Attack-based Heterogeneous Intrusion Detection ». Thesis, 2005. http://ndltd.ncl.edu.tw/handle/50928028528463091853.
Texte intégral國立臺灣科技大學
資訊工程系
93
The security of networked computers strongly affects network applications. Although we already have firewalls and encryption systems, intrusion still happens often. IDSs (Intrusion Detection Systems) with different techniques and characteristics have thus been developed to serve as the second layer protection. Problems associated with IDS include: (1) IDSs often produce lots of low level alerts which aren’t integrated. (2) IDSs produce lots of false alerts. (3) Heterogeneous IDSs have their specific capabilities of detecting attacks; however, their detection scopes are limited. To cope with the problems, we proposed a two-layered heterogeneous intrusion detection architecture, which advocates primitive attacks to work as a mediator for correlating alerts. The first layer is the construction and detection of primitive attacks, responsible for integrating heterogeneous alerts into primitive attacks. This equivalently transforms low-level, different formats of alerts into a unified, higher-level representation. The second layer is the correlation of attack scenarios, responsible for correlating primitive attacks into attack scenarios and reporting their priorities. This thesis focuses on improving the first layer, the construction and detection of primitive attacks, mainly by introducing a module to automatically construct primitive attack templates. The module involves the following techniques. First, we apply the constrained data mining technique to learn interactive relationships among the alerts. Second based on the interaction relationships and the support of alert ontology, we automatically create primitive attack templates. Finally, we anchor the auto-generated primitive attack templates into attack ontology. Our experiments showed the auto-generated primitive attack templates successfully subsumed all manually constructed real primitive attack templates. The contributions of the work are as follows. First, the automatic construction technique of primitive attack templates can reduce the difficulties with manual construction of primitive attack templates by experts. Second, the constrained data mining technique can effectively discover interactive relationships among (heterogeneous) alerts and allows us to use their common contents to describe the relevant attributes of a primitive attack. Finally, the completed alert ontology (including network-based and host-based alerts) comprehensively classifies the alerts attached with annotated information, not only supporting the automatic construction of primitive attack templates in this thesis but also serving as a valuable resource for design and analysis of intrusion detection systems.
Liang, Ti-Hung, et 梁滌宏. « A Study on Network ARP Attack Detection, Prevention and Automatic Connection Restoration ». Thesis, 2015. http://ndltd.ncl.edu.tw/handle/21127536084053917591.
Texte intégral國立臺灣海洋大學
電機工程學系
103
This research focuses on the analysis of network attacking via the NetCut software. This kind of software will send out huge ARP( Address Resolution Protocol ) packets to the network switch, whether the attacking is occurred or not. Using this characteristic, debugging mode through the layer3 of network switch will be used to collect the ARP information. The programming language Perl will be used to analyze the amount of ARP packets periodically. When the amount of ARP packets exceed the specific guarding value, the MAC of the host running NetCut will be blocked. After the amount of ARP packets is lower than the guarding value, the MAC of that host will be unblocked. The analysis processing will be executed automatically without human intervening.
Chapitres de livres sur le sujet "Attack Detection Automation"
Alsabbagh, Wael, et Peter Langendoerfer. « A Remote Attack Tool Against Siemens S7-300 Controllers : A Practical Report ». Dans Technologien für die intelligente Automation, 3–21. Berlin, Heidelberg : Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-64283-2_1.
Texte intégralZhang, Yanjing, Jianming Cui et Ming Liu. « Research on Adversarial Patch Attack Defense Method for Traffic Sign Detection ». Dans Communications in Computer and Information Science, 199–210. Singapore : Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-8285-9_15.
Texte intégralDoniyorbek, Usmanbayev, et Bozorov Suhrobjon. « Analysis of Algorithm of Binary Classifiers to Improve Attack Detection Systems ». Dans 12th World Conference “Intelligent System for Industrial Automation” (WCIS-2022), 81–87. Cham : Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-51521-7_12.
Texte intégralFritsch, Lothar, Aws Jaber et Anis Yazidi. « An Overview of Artificial Intelligence Used in Malware ». Dans Communications in Computer and Information Science, 41–51. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17030-0_4.
Texte intégralWurzenberger, Markus, Max Landauer, Agron Bajraktari et Florian Skopik. « Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation ». Dans Cybersecurity of Digital Service Chains, 136–61. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_7.
Texte intégralHoyos, Isaias, Bruno Esposito et Miguel Nunez-del-Prado. « DETECTOR : Automatic Detection System for Terrorist Attack Trajectories ». Dans Information Management and Big Data, 160–73. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11680-4_17.
Texte intégralLebrun, Stéphanie, Stéphane Kaloustian, Raphaël Rollier et Colin Barschel. « GNSS Positioning Security : Automatic Anomaly Detection on Reference Stations ». Dans Critical Information Infrastructures Security, 60–76. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93200-8_4.
Texte intégralYang, Xu, Qian Li, Cong Li et Yong Qi. « Robust Malware Detection System Against Adversarial Attacks ». Dans Advances in Intelligent Automation and Soft Computing, 1059–67. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81007-8_122.
Texte intégralPerkins, Jeff, Jordan Eikenberry, Alessandro Coglio, Daniel Willenson, Stelios Sidiroglou-Douskos et Martin Rinard. « AutoRand : Automatic Keyword Randomization to Prevent Injection Attacks ». Dans Detection of Intrusions and Malware, and Vulnerability Assessment, 37–57. Cham : Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40667-1_3.
Texte intégralJin, Shuyuan, Zhi Yang et Xiang Cui. « Automatic Covert Channel Detection in Asbestos System (Poster Abstract) ». Dans Research in Attacks, Intrusions, and Defenses, 380–81. Berlin, Heidelberg : Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33338-5_22.
Texte intégralActes de conférences sur le sujet "Attack Detection Automation"
Zhang, Ruo, Guiqin Yang et Wei Zhang. « DDoS Attack Detection System Based on GBDT Under SDN ». Dans 2024 IEEE 7th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 1415–19. IEEE, 2024. http://dx.doi.org/10.1109/itnec60942.2024.10733143.
Texte intégralZhang, Wei, Guiqin Yang et Ruo Zhang. « DDoS Attack Detection Based on Rényi-RF in SDN Environment ». Dans 2024 IEEE 7th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 1365–69. IEEE, 2024. http://dx.doi.org/10.1109/itnec60942.2024.10733276.
Texte intégralZhu, Mengjiang, Tianfu Xu, Qun He, Rixuan Qiu, Jiang Zhu, Wei Wang et Jianye Li. « Research on APT Attack Detection Methods for Power Information Systems ». Dans 2024 IEEE 7th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 1866–71. IEEE, 2024. http://dx.doi.org/10.1109/itnec60942.2024.10733125.
Texte intégralDesnitsky, Vasily, et Alexey Meleshko. « Modeling and Analysis of Secure Blockchain-Driven Self-Organized Decentralized Wireless Sensor Networks for Attack Detection ». Dans 2024 International Russian Automation Conference (RusAutoCon), 199–204. IEEE, 2024. http://dx.doi.org/10.1109/rusautocon61949.2024.10694225.
Texte intégralKha Nguyen, Dinh Duy, Cédric Escudero, Emil Dumitrescu et Eric Zamaï. « Actuator and Sensor Attacks Detection Method based on Attack Reconstruction ». Dans 2024 32nd Mediterranean Conference on Control and Automation (MED). IEEE, 2024. http://dx.doi.org/10.1109/med61351.2024.10566177.
Texte intégralSheng, Chen, et Chen Gang. « APT Attack and Detection Technology ». Dans 2024 IEEE 6th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC). IEEE, 2024. http://dx.doi.org/10.1109/imcec59810.2024.10575432.
Texte intégralQiu, Bohua, Muheng Wei, Wen Xi, Yongjie Li et Qizhong Li. « CPS Attack Detection of Ships using Particle Filter ». Dans 2021 China Automation Congress (CAC). IEEE, 2021. http://dx.doi.org/10.1109/cac53003.2021.9728218.
Texte intégralSatam, Shruti Sanjay, Akansha Anadrao Patil, Devyani Bhagwan Narkhede, Sumit Singh et Namita Pulgam. « Zero-Day Attack Detection and Prevention ». Dans 2023 7th International Conference On Computing, Communication, Control And Automation (ICCUBEA). IEEE, 2023. http://dx.doi.org/10.1109/iccubea58933.2023.10392272.
Texte intégralGu, Tianbo, Allaukik Abhishek, Hao Fu, Huanle Zhang, Debraj Basu et Prasant Mohapatra. « Towards Learning-automation IoT Attack Detection through Reinforcement Learning ». Dans 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, 2020. http://dx.doi.org/10.1109/wowmom49955.2020.00029.
Texte intégralRuotsalainen, Henri, Albert Treytl et Thilo Sauter. « Watermarking Based Sensor Attack Detection in Home Automation Systems ». Dans 2021 IEEE 26th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE, 2021. http://dx.doi.org/10.1109/etfa45728.2021.9613634.
Texte intégralRapports d'organisations sur le sujet "Attack Detection Automation"
Berney, Ernest, Naveen Ganesh, Andrew Ward, J. Newman et John Rushing. Methodology for remote assessment of pavement distresses from point cloud analysis. Engineer Research and Development Center (U.S.), avril 2021. http://dx.doi.org/10.21079/11681/40401.
Texte intégral