Littérature scientifique sur le sujet « Security attacks detection »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Sommaire
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Security attacks detection ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Security attacks detection"
Jimmy, FNU. « Cyber security Vulnerabilities and Remediation Through Cloud Security Tools ». Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no 1 (12 avril 2024) : 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p233.
Texte intégralJimmy, Fnu. « Cyber security Vulnerabilities and Remediation Through Cloud Security Tools ». Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no 1 (12 avril 2024) : 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p234.
Texte intégralKumavat, Kavita S., et Joanne Gomes. « Common Mechanism for Detecting Multiple DDoS Attacks ». International Journal on Recent and Innovation Trends in Computing and Communication 11, no 4 (4 mai 2023) : 81–90. http://dx.doi.org/10.17762/ijritcc.v11i4.6390.
Texte intégralKareem, Mohammed Ibrahim, Mohammad Jawad Kadhim Abood et Karrar Ibrahim. « Machine learning-based PortScan attacks detection using OneR classifier ». Bulletin of Electrical Engineering and Informatics 12, no 6 (1 décembre 2023) : 3690–96. http://dx.doi.org/10.11591/eei.v12i6.4142.
Texte intégralDu, Dajun, Rui Chen, Xue Li, Lei Wu, Peng Zhou et Minrui Fei. « Malicious data deception attacks against power systems : A new case and its detection method ». Transactions of the Institute of Measurement and Control 41, no 6 (8 janvier 2018) : 1590–99. http://dx.doi.org/10.1177/0142331217740622.
Texte intégralKumar, Sunil, et Maninder Singh. « Detection and Isolation of Zombie Attack under Cloud Environment ». Oriental journal of computer science and technology 10, no 2 (12 avril 2017) : 338–44. http://dx.doi.org/10.13005/ojcst/10.02.12.
Texte intégralFarane Shradha, Gotane Rutuja, Chandanshive Sakshi, Agrawal Khushi et Khandekar Srushti. « Detection of cyber-attacks and network attacks using Machine Learning ». World Journal of Advanced Engineering Technology and Sciences 12, no 1 (30 mai 2024) : 128–32. http://dx.doi.org/10.30574/wjaets.2024.12.1.0184.
Texte intégralAslan, Ömer, Semih Serkant Aktuğ, Merve Ozkan-Okay, Abdullah Asim Yilmaz et Erdal Akin. « A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions ». Electronics 12, no 6 (11 mars 2023) : 1333. http://dx.doi.org/10.3390/electronics12061333.
Texte intégralAlamsyah, Hendri, Riska et Abdussalam Al Akbar. « Analisa Keamanan Jaringan Menggunakan Network Intrusion Detection and Prevention System ». JOINTECS (Journal of Information Technology and Computer Science) 5, no 1 (25 janvier 2020) : 17. http://dx.doi.org/10.31328/jointecs.v5i1.1240.
Texte intégralSalih, Azar Abid, et Maiwan Bahjat Abdulrazzaq. « Cyber security : performance analysis and challenges for cyber attacks detection ». Indonesian Journal of Electrical Engineering and Computer Science 31, no 3 (1 septembre 2023) : 1763. http://dx.doi.org/10.11591/ijeecs.v31.i3.pp1763-1775.
Texte intégralThèses sur le sujet "Security attacks detection"
Kazi, Shehab. « Anomaly based Detection of Attacks on Security Protocols ». Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4806.
Texte intégralWhitelaw, Clayton. « Precise Detection of Injection Attacks on Concrete Systems ». Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/6051.
Texte intégralJan, Steve T. K. « Robustifying Machine Learning based Security Applications ». Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/99862.
Texte intégralDoctor of Philosophy
Machine learning (ML) is computer algorithms that aim to identify hidden patterns from the data. In recent years, machine learning has been widely used in many fields. The range of them is broad, from natural language to autonomous driving. However, there are growing concerns about the robustness of machine learning models. And these concerns are further amplified in security-critical applications — Attackers can manipulate their inputs (i.e., adversarial examples) to cause machine learning models to predict wrong, and it's highly expensive and difficult to obtain a huge amount of attackers' data because attackers are rare compared to the normal users. These make applying machine learning in security-critical applications concerning. In this dissertation, we seek to build better defenses in three types of machine learning based security applications. The first one is image recognition, by developing a method to generate realistic adversarial examples, the machine learning models are more robust for defending against adversarial examples by adversarial retraining. The second one is bot detection, we develop a data synthesis method to detect malicious bots when we only have the limit malicious bots data. For phishing websites, we implement a tool to detect domain name impersonation and detect phishing pages using dynamic and static analysis.
Taub, Lawrence. « Application of a Layered Hidden Markov Model in the Detection of Network Attacks ». NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/320.
Texte intégralRosa, José Luís da Silva. « Customer-side detection of BGP routing attacks ». Master's thesis, Universidade de Aveiro, 2016. http://hdl.handle.net/10773/17808.
Texte intégralA utilização diária da Internet tornou-se uma rotina que foi assimilada pelas pessoas sem considerarem a complexidade interna desta gigante rede. Até um certo ponto, o Border Gateway Protocol é o que mantem toda esta conectividade possível apesar de ser um protocolo defeituoso por natureza. Em 2008, um ataque Man-In-The-Middle foi pela primeira vez apresentado ao grande público e desde de então mais técnicas para explorar este protocolo e obter tráfego alheio de forma ilícita foram dadas a conhecer. Mesmo que o desvio não aconteça com natureza maliciosa, mas sim devido a um erro de configuração, este é um problema que deverá ser enfrentado. Alguns provedores de serviço e institutos de investigação já apresentaram propostas para novos protocolos e/ou sistemas de monitorização, mas estes estão atrasados no seu desenvolvimento ou apenas afetam a camada superior da rede, deixando utilizadores e um grande número de empresas que estão ligadas a um provedor sem meios para agir e sem informação sobre o encaminhamento do seu tráfego. Nesta dissertação, é apresentado, concebido e implementado um sistema que atinge uma monitorização ativa do BGP através da medição do tempo médio de viagem de vários pacotes enviados de várias localizações, através de uma rede mundial de sondas, e do processamento dos resultados obtidos, permitindo que todos os interessados possam ser alertados.
The daily use of the Internet has become a routine that many people absorbed into their lives without even thinking about the insides of this gigantic network. To an extent, the Border Gateway Protocol is what is keeping all this connectivity together despite being a very flawed protocol due to its design. In 2008 a Man-In-The-Middle attack was first presented to the general audience and ever since more techniques were reported to use the protocol to obtain traffic illicitly. Even if the routing deviation does not occur via a malicious intention but due to some poorly configured router, this is a problem that must be tackled. Some network providers and research institutes already presented some drafts for new protocols or monitoring systems but they are late into deployment or only affect the top layer of the network, leaving users and most part of the companies connected to the provider impotent and without any proper information about the routing of their traffic. In this dissertation a system is presented, implemented and deployed, achieving an active monitorization of BGP through measurements of the average travel time of several packets sent to various locations by a worldwide set of Probes and the collected results processed allowing all concerned actors to be alerted.
Lantz, David. « Detection of side-channel attacks targeting Intel SGX ». Thesis, Linköpings universitet, Programvara och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177987.
Texte intégralAditham, Santosh. « Mitigation of Insider Attacks for Data Security in Distributed Computing Environments ». Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6639.
Texte intégralRubio, Hernan Jose Manuel. « Detection of attacks against cyber-physical industrial systems ». Thesis, Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0015/document.
Texte intégralWe address security issues in cyber-physical industrial systems. Attacks against these systems shall be handled both in terms of safety and security. Control technologies imposed by industrial standards already cover the safety dimension. From a security standpoint, the literature has shown that using only cyber information to handle the security of cyber-physical systems is not enough, since physical malicious actions are ignored. For this reason, cyber-physical systems have to be protected from threats to their cyber and physical layers. Some authors handle the attacks by using physical attestations of the underlying processes, f.i., physical watermarking to ensure the truthfulness of the process. However, these detectors work properly only if the adversaries do not have enough knowledge to mislead crosslayer data. This thesis focuses on the aforementioned limitations. It starts by testing the effectiveness of a stationary watermark-based fault detector, to detect, as well, malicious actions produced by adversaries. We show that the stationary watermark-based detector is unable to identify cyber-physical adversaries. We show that the approach only detects adversaries that do not attempt to get any knowledge about the system dynamics. We analyze the detection performance of the original design under the presence of adversaries that infer the system dynamics to evade detection. We revisit the original design, using a non-stationary watermark-based design, to handle those adversaries. We also propose a novel approach that combines control and communication strategies. We validate our solutions using numeric simulations and training cyber-physical testbeds
Wang, Le. « Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques ». Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-theses/992.
Texte intégralRubio, Hernan Jose Manuel. « Detection of attacks against cyber-physical industrial systems ». Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0015.
Texte intégralWe address security issues in cyber-physical industrial systems. Attacks against these systems shall be handled both in terms of safety and security. Control technologies imposed by industrial standards already cover the safety dimension. From a security standpoint, the literature has shown that using only cyber information to handle the security of cyber-physical systems is not enough, since physical malicious actions are ignored. For this reason, cyber-physical systems have to be protected from threats to their cyber and physical layers. Some authors handle the attacks by using physical attestations of the underlying processes, f.i., physical watermarking to ensure the truthfulness of the process. However, these detectors work properly only if the adversaries do not have enough knowledge to mislead crosslayer data. This thesis focuses on the aforementioned limitations. It starts by testing the effectiveness of a stationary watermark-based fault detector, to detect, as well, malicious actions produced by adversaries. We show that the stationary watermark-based detector is unable to identify cyber-physical adversaries. We show that the approach only detects adversaries that do not attempt to get any knowledge about the system dynamics. We analyze the detection performance of the original design under the presence of adversaries that infer the system dynamics to evade detection. We revisit the original design, using a non-stationary watermark-based design, to handle those adversaries. We also propose a novel approach that combines control and communication strategies. We validate our solutions using numeric simulations and training cyber-physical testbeds
Livres sur le sujet "Security attacks detection"
Dübendorfer, Thomas P. Impact analysis, early detection, and mitigation of large-scale Internet attacks. Aachen : Shaker, 2005.
Trouver le texte intégralRaghavan, S. V. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks : Critical Information Infrastructure Protection. India : Springer India Pvt. Ltd., 2011.
Trouver le texte intégralNelson A. Rockefeller Institute of Government., dir. The role of "home" in homeland security : The prevention and detection of terrorist attacks : the challenge for state and local government. Albany, N.Y : The Institute, 2003.
Trouver le texte intégralBrancik, Kenneth C. Insider computer fraud : An indepth framework for detecting and defending against insider it attacks. Boca Raton : Auerbach Publications, 2007.
Trouver le texte intégralUnited States. Congress. House. Committee on Science and Technology (2007). Subcommittee on Technology and Innovation. Planning for the future of cyber attack attribution : Hearing before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, second session, July 15, 2010. Washington : U.S. G.P.O., 2010.
Trouver le texte intégralUnited States. Congress. House. Committee on Homeland Security. Subcommittee on the Prevention of Nuclear and Biological Attack. DHS coordination of nuclear detection efforts. : Hearing before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, April 19, 2005 and April 20, 2005. Washington : U.S. G.P.O., 2005.
Trouver le texte intégralAttack, United States Congress House Committee on Homeland Security Subcommittee on the Prevention of Nuclear and Biological. Enlisting foreign cooperation in U.S. efforts to prevent nuclear smuggling : Hearing before the Subcommittee on [the] Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, second session, May 25, 2006. Washington : U.S. G.P.O., 2007.
Trouver le texte intégralUnited States. Congress. House. Committee on Homeland Security. Subcommittee on the Prevention of Nuclear and Biological Attack. The science of prevention : Hearing before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, second session, September 14, 2006. Washington : U.S. G.P.O., 2007.
Trouver le texte intégralAttack, United States Congress House Committee on Homeland Security Subcommittee on the Prevention of Nuclear and Biological. Detecting nuclear weapons and radiological materials : How effective is available technology ? : joint hearing before the Subcommittee on Prevention of Nuclear and Biological Attack with the Subcommittee on Emergency Preparedness, and Science, and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, June 21, 2005. Washington : U.S. G.P.O., 2007.
Trouver le texte intégralBhattacharyya, Dhruba Kumar, et Jugal Kumar Kalita. DDoS Attacks : Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Trouver le texte intégralChapitres de livres sur le sujet "Security attacks detection"
van Oorschot, Paul C. « Intrusion Detection and Network-Based Attacks ». Dans Information Security and Cryptography, 309–38. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-33649-3_11.
Texte intégralvan Oorschot, Paul C. « Intrusion Detection and Network-Based Attacks ». Dans Information Security and Cryptography, 309–38. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-83411-1_11.
Texte intégralLucas, Keane, Mahmood Sharif, Lujo Bauer, Michael K. Reiter et Saurabh Shintre. « Deceiving ML-Based Friend-or-Foe Identification for Executables ». Dans Advances in Information Security, 217–49. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16613-6_10.
Texte intégralSingh, Gulshan Kumar, et Gaurav Somani. « Detecting Cloud Originated DDoS Attacks at the Source Using Out-Cloud Attack Detection (OCAD) ». Dans Information Systems Security, 169–85. Cham : Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23690-7_10.
Texte intégralNarisada, Shintaro, Shoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji et Shinsaku Kiyomoto. « Stronger Targeted Poisoning Attacks Against Malware Detection ». Dans Cryptology and Network Security, 65–84. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65411-5_4.
Texte intégralArya, Shivani, et Saurabh Chamotra. « Multi Layer Detection Framework for Spear-Phishing Attacks ». Dans Information Systems Security, 38–56. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92571-0_3.
Texte intégralHarish, R., et K. Praveen. « Review on Wi-Fi Attacks and Detection Methods ». Dans Information Technology Security, 101–17. Singapore : Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0407-1_5.
Texte intégralShirazi, Hossein, Bruhadeshwar Bezawada, Indrakshi Ray et Charles Anderson. « Adversarial Sampling Attacks Against Phishing Detection ». Dans Data and Applications Security and Privacy XXXIII, 83–101. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22479-0_5.
Texte intégralSzynkiewicz, Paweł. « Signature-Based Detection of Botnet DDoS Attacks ». Dans Cybersecurity of Digital Service Chains, 120–35. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_6.
Texte intégralSalazar-Hernández, Rolando, et Jesús E. Díaz-Verdejo. « Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks ». Dans Information and Communications Security, 416–29. Berlin, Heidelberg : Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17650-0_29.
Texte intégralActes de conférences sur le sujet "Security attacks detection"
Mihai, Ioan cosmin, et Laurentiu Giurea. « MANAGEMENT OF ELEARNING PLATFORMS SECURITY ». Dans eLSE 2016. Carol I National Defence University Publishing House, 2016. http://dx.doi.org/10.12753/2066-026x-16-061.
Texte intégralKolodziej, Joanna, Mateusz Krzyszton et Pawel Szynkiewicz. « Anomaly Detection In TCP/IP Networks ». Dans 37th ECMS International Conference on Modelling and Simulation. ECMS, 2023. http://dx.doi.org/10.7148/2023-0542.
Texte intégralSegura, Gustavo A. Nunez, Arsenia Chorti et Cíntia Borges Margi. « IDIT-SDN : Intrusion Detection Framework for Software-defined Wireless Sensor Networks ». Dans Anais Estendidos do Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/sbrc_estendido.2023.817.
Texte intégralRamesh Kumar, M., et Pradeep Sudhakaran. « Comprehensive Survey on Detecting Security Attacks of IoT Intrusion Detection Systems ». Dans International Research Conference on IOT, Cloud and Data Science. Switzerland : Trans Tech Publications Ltd, 2023. http://dx.doi.org/10.4028/p-270t9z.
Texte intégralLim, Wei Heng, Weng Foong Liew, Chun Yew Lum et Seah Fang Lee. « Phishing Security : Attack, Detection, and Prevention Mechanisms ». Dans International Conference on Digital Transformation and Applications (ICDXA 2020). Tunku Abdul Rahman University College, 2020. http://dx.doi.org/10.56453/icdxa.2020.1017.
Texte intégralBabbage, S. H. « Improved “exhaustive search” attacks on stream ciphers ». Dans European Convention on Security and Detection. IEE, 1995. http://dx.doi.org/10.1049/cp:19950490.
Texte intégralGregorio- de Souza, Ian, Vincent H. Berk, Annarita Giani, George Bakos, Marion Bates, George Cybenko et Doug Madory. « Detection of complex cyber attacks ». Dans Defense and Security Symposium, sous la direction de Edward M. Carapezza. SPIE, 2006. http://dx.doi.org/10.1117/12.670131.
Texte intégralS. Jabor, Maytham, Aqeel Salman Azez, Azhar Hasan Nsaif, Azhar Sabah Abdulaziz et Worud Mahdi Saleh. « Security Challenges and Threats in Wireless Sensor Networks : A Review ». Dans IX. International Scientific Congress of Pure, Applied and Technological Sciences. Rimar Academy, 2023. http://dx.doi.org/10.47832/minarcongress9-21.
Texte intégralBaykara, Muhammet, et Zahit Ziya Gurel. « Detection of phishing attacks ». Dans 2018 6th International Symposium on Digital Forensic and Security (ISDFS). IEEE, 2018. http://dx.doi.org/10.1109/isdfs.2018.8355389.
Texte intégralKim, Hannah, Celia Cintas, Girmaw Abebe Tadesse et Skyler Speakman. « Spatially Constrained Adversarial Attack Detection and Localization in the Representation Space of Optical Flow Networks ». Dans Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. California : International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/107.
Texte intégralRapports d'organisations sur le sujet "Security attacks detection"
Fedchenko, Vitaly. Nuclear Security During Armed Conflict : Lessons From Ukraine. Stockholm International Peace Research Institute, mars 2023. http://dx.doi.org/10.55163/zzsp5617.
Texte intégralKolencik, Marian. A critical evaluation of the risk indicators of criminal conduct involving CBRN and explosive materials - Behavioural and observational analysis in crime detection and investigation. ISEM Institute, n.p.o., octobre 2023. http://dx.doi.org/10.52824/vzrb5079.
Texte intégralTayeb, Shahab. Taming the Data in the Internet of Vehicles. Mineta Transportation Institute, janvier 2022. http://dx.doi.org/10.31979/mti.2022.2014.
Texte intégralPeterson, Dale. Cyber Security Audit and Attack Detection Toolkit. Office of Scientific and Technical Information (OSTI), mai 2012. http://dx.doi.org/10.2172/1097617.
Texte intégralIn Hot Water ? The Growing Threat of Cyber Attacks to Water Distribution Systems. American Society of Civil Engineers, mars 2022. http://dx.doi.org/10.1061/infographic.000003.
Texte intégral