Letteratura scientifica selezionata sul tema "Tests d'intrusion"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Tests d'intrusion".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Tesi sul tema "Tests d'intrusion"
Abou, El Houda Zakaria. "Security Enforcement through Software Defined Networks (SDN)". Thesis, Troyes, 2021. http://www.theses.fr/2021TROY0023.
Testo completoThe original design of Internet did not take into consideration security aspects of the network; the priority was to facilitate the process of communication. Therefore, many of the protocols that are part of the Internet infrastructure expose a set of vulnerabilities that can be exploited by attackers to carry out a set of attacks. Distributed Denial-of-Service (DDoS) represents a big threat and one of the most devastating and destructive attacks plaguing network operators and Internet service providers (ISPs) in stealthy way. Software defined networks (SDN) is an emerging technology that promises to solve the limitations of the conventional network architecture by decoupling the control plane from the data plane. On one hand, the separation of the control plane from the data plane allows for more control over the network and brings new capabilities to deal with DDoS attacks. On the other hand, this separation introduces new challenges regarding the security of the control plane. This thesis aims to deal with DDoS attacks while protecting the resources of the control plane. In this thesis, we contribute to the mitigation of both intra-domain and inter-domain DDoS attacks, and we contribute to the reinforcement of security aspects in SDN
Gadelrab, Mohammed El-Sayed Gadelrab. "Évaluation des systèmes de détection d'intrusion". Toulouse 3, 2008. http://thesesups.ups-tlse.fr/435/.
Testo completoThis thesis contributes to the improvement of intrusion detection system (IDS) evaluation. The work is motivated by two problems. First, the observed increase in the number and the complexity of attacks requires that IDSes evolve to stay capable of detecting new attack variations efficiently. Second, the large number of false alarms that are generated by current IDSes renders them ineffective or even useless. Test and evaluation mechanisms are necessary to determine the quality of detection of IDSes or of their detection algorithms. Unfortunately, there is currently no IDS evaluation method that would be unbiased and scientifically rigorous. During our study, we have noticed that current IDS evaluations suffer from three major weaknesses: 1) the lack of a rigorous methodology; 2) the use of non-representative test datasets; and 3) the use of incorrect metrics. From this perspective, we have introduced a rigorous approach covering most aspects of IDS evaluation. In the first place, we propose an evaluation methodology that allows carrying out the evaluation process in a systematic way. Secondly, in order to create representative test datasets, we have characterized attacks by classifying attack activities with respect to IDS-relevant manifestations or features. This allows not only to select attacks that will be included in the evaluation dataset but also to analyze the evaluation result with respect to attack classes rather than individual attack instances. Third, we have analyzed a large number of attack incidents and malware samples, such as viruses and worms. Thanks to this analysis, we built a model for the attack process that exhibits the dynamics of attack activities. This model allows us to generate a large number of realistic and diverse attack scenarios. The proposed methods have been experimented on two very different IDSes to show how general is our approach. The results show that the proposed approach allows overcoming the two main weaknesses of existing evaluations, i. E. , the lack of a rigorous methodology and the use of non-representative datasets. .
Gad, El Rab Mohammed. "Evaluation des systèmes de détection d'intrusion". Phd thesis, Université Paul Sabatier - Toulouse III, 2008. http://tel.archives-ouvertes.fr/tel-00366690.
Testo completoSavary, Aymerick. "Détection de vulnérabilités appliquée à la vérification de code intermédiaire de Java Card". Thèse, Université de Sherbrooke, 2016. http://hdl.handle.net/11143/9584.
Testo completoMuench, Marius. "Dynamic binary firmware analysis : challenges & solutions". Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS265.
Testo completoEmbedded systems are a key component of modern life and their security is of utmost importance. Hence, the code running on those systems, called "firmware", has to be carefully evaluated and tested to minimize the risks accompanying the ever-growing deployment of embedded systems. One common way to evaluate the security of firmware, especially in the absence of source code, is dynamic analysis. Unfortunately, compared to analysis and testing on desktop system, dynamic analysis for firmware is lacking behind. In this thesis, we identify the main challenges preventing dynamic analysis and testing techniques from reaching their full potential on firmware. Furthermore we point out that rehosting is a promising approach to tackle these problems and develop avatar2, a multi-target orchestration framework which is capable of running firmware in both fully, and partially emulated settings. Using this framework, we adapt several dynamic analysis techniques to successfully operate on binary firmware. In detail we use its scriptability to easily replicate a previous study, we demonstrate that it allows to record and replay the execution of an embedded system, and implement heuristics for better fault detection as run-time monitors. Additionally, the framework serves as building block for an experimental evaluation of fuzz testing on embedded systems, and is used as part in a scalable concolic execution engine for firmware. Last but not least, we present Groundhogger, a novel approach for unpacking embedded devices' firmware which, unlike other unpacking tools, uses dynamic analysis to create unpackers and evaluate it against three real world devices
Libri sul tema "Tests d'intrusion"
Tiller, James S. CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits. Auerbach Publishers, Incorporated, 2016.
Cerca il testo completoCISO's guide to penetration testing: A framework to plan, manage, and maximize benefits. Boca Raton, FL: CRC Press, 2012.
Cerca il testo completoTiller, James S. CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits. Auerbach Publishers, Incorporated, 2016.
Cerca il testo completoTiller, James S. Ciso's Guide to Penetration Testing. Taylor & Francis Group, 2020.
Cerca il testo completoTiller, James S. CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits. Auerbach Publishers, Incorporated, 2016.
Cerca il testo completoTiller, James S. CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits. Auerbach Publishers, Incorporated, 2016.
Cerca il testo completoBaloch, Rafay. Ethical Hacking and Penetration Testing Guide. Auerbach Publishers, Incorporated, 2017.
Cerca il testo completoBaloch, Rafay. Ethical Hacking and Penetration Testing Guide. Auerbach Publishers, Incorporated, 2017.
Cerca il testo completoBaloch, Rafay. Ethical Hacking and Penetration Testing Guide. Auerbach Publishers, Incorporated, 2017.
Cerca il testo completoBaloch, Rafay. Ethical Hacking and Penetration Testing Guide. Taylor & Francis Group, 2014.
Cerca il testo completo