Teses / dissertações sobre o tema "Attack Path"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 16 melhores trabalhos (teses / dissertações) para estudos sobre o assunto "Attack Path".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja as teses / dissertações das mais diversas áreas científicas e compile uma bibliografia correta.
Mirheidari, Seyed Ali. "Confused by Path: Analysis of Path Confusion Based Attacks". Doctoral thesis, Università degli studi di Trento, 2020. http://hdl.handle.net/11572/280512.
Texto completo da fonteMirheidari, Seyed Ali. "Confused by Path: Analysis of Path Confusion Based Attacks". Doctoral thesis, Università degli studi di Trento, 2020. http://hdl.handle.net/11572/280512.
Texto completo da fonteVega-Nevarez, Juan. "Online Path Planning and Control Solution for a Coordinated Attack of Multiple Unmanned Aerial Vehicles in a Dynamic Environment". Master's thesis, University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5551.
Texto completo da fonteID: 031001316; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Adviser: Houman A. Sadri.; Title from PDF title page (viewed March 26, 2013).; Thesis (M.A.)--University of Central Florida, 2012.; Includes bibliographical references (p. 89-99).
M.S.E.E.
Masters
Electrical Engineering and Computing
Engineering and Computer Science
Electrical Engineering; Controls and Robotics
Mao, Xinyue. "Visualization and Natural Language Representation of Simulated Cyber Attacks". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246090.
Texto completo da fonteAnfallsstigen är ett effektivt verktyg för att visa möjliga hackningsvägarsom en angripare tar emot ett specifikt datornätverk. Det informerarockså administratörer om eventuell svaghet i ett nätverk somhjälper dem att utrulla nätverkskonfigurationsändringar. Baserat påfördefinierade datormetoder kan ett stort antal attackvägar genereras.Åtkomstvägar visar dock alla möjliga vägar för varje beräkning och representerardem med terminologier som är specifika för fältet Cybersecurity.En stor del av attackvägar och representationer är för kompliceradeför vanliga användare vilket gör det svårt att identifiera de delarsom de borde ägna mer uppmärksamhet åt. I denna avhandlingsrapportbeskrivs ett ramverk för att generera en kortfattad och användarvänligattackväg genom att gruppera kontinuerliga angreppssteg.Ramverket är utformat med 6 nivåer av hierarkisk abstraktion. Topp3 nivåer av dessa abstraktioner klassificeras baserat på den fördefinieradestrukturen av mjukvaran och namngiven strukturell uppdelning.De övriga 3 lägre nivåerna klassificeras baserat på semantik meden taxonomi för naturlig språkrepresentation som heter SCV (SecurityCommunity Vocabulary), namngiven semantikavdelning. Denna visualiseringsmetodsläpps som en del av securiCADR en cybersecurityproduktsom släpptes av Foreseeti, vilket ger en kortfattad och förståeliginteraktion genom att aggregera ursprungliga attacksteg enligtolika kunders krav.
Thames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm". Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.
Texto completo da fonteDube, Raghav. "Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet Marking". Texas A&M University, 2004. http://hdl.handle.net/1969.1/1476.
Texto completo da fonteExurville, Ingrid. "Détection non destructive de modification malveillante de circuits intégrés". Thesis, Saint-Etienne, EMSE, 2015. http://www.theses.fr/2015EMSE0800/document.
Texto completo da fonteThe globalization of integrated circuits fabrication involves several questions about the integrity of the fabricated circuits. Malicious modifications called Hardware Trojans (HT) can be introduced during the circuit production process. Due to the complexity of an integrated circuit, it is really difficult to find this kind of alterations.This work focuses on a non-destructive method of HT detection. We use the paths delays of the studied design as a channel to detect HT. A model to describe paths delays is defined. It takes into account two important parameters which are the experimental conditions and the process variations.Faults attacks by clock glitches based on timing constraints violations have been performed to measure data paths delays. Reliable circuits are used for reference. After validating the relevance of this channel to get information on the internal behavior of the targeted design, experimental detections of HT inserted on two different abstraction levels (RTL and after place and route) were achieved. Process variations are taken into consideration in the studies to detect if the tested circuits are infected
Kasse, Mamadou. "Système de Ρréventiοn cοntre les vulnérabilités et de Détectiοn des Anοmalies dans les Réseaux Ιnfοrmatiques". Electronic Thesis or Diss., Normandie, 2024. https://theses.hal.science/tel-04885354.
Texto completo da fonteTools for vulnerability prevention and anomaly detection are essential for the security of computer networks. This thesis focuses on using MITRE ATT&CK data, CVSS scores, and the ISO 27002:2022 standard to automate and consolidate vulnerability analysis and anomaly detection.The main objectives are: -Vulnerability Diagnosis: Identify the most vulnerable sub-networks by combining MITRE ATT&CK data, CVSS scores, and the ISO 27002:2022 standard. To achieve this, a database called Data ISO-MA was created. An algorithm evaluates the vulnerability of network paths, identifying those most at risk. - Anomaly Detection: Analyze traffic flows to detect unusual behaviors in vulnerable paths. An approach inspired by the Path-scan model introduced by Joshua Neil et al. (2013) was used. Each network connection is modeled with a 3-state Markov model and the Generalized Likelihood Ratio Test (GLRT), allowing for the capture and identification of abnormal behaviors.These two tools aim to enhance the security of computer networks by providing an integrated solution for vulnerability prevention and anomaly detection
Evensjö, Lina. "Probability analysis and financial model development of MITRE ATT&CK Enterprise Matrix's attack steps and mitigations". Thesis, KTH, Hälsoinformatik och logistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-289636.
Texto completo da fonteCyberattacker håller på att bli ett större orosmoment allteftersom vårt samhälle digitaliseras i större utsräckning, där lagring av känslig information snarare har blivit regel än undantag. Detta utgör ett behov av ett tids- och kostnadseffektivt sätt att bedömma cybersäkerheten hos ett företag. Hotmodelleringsspråket enterpriseLang är just detta, där antagandet av ett generellt företagssystem möjliggör återanvändning på flera olika system. Språket är skapat med Meta Attack Language och är baserat på kända attack- och försvarssteg från MITRE ATT&CK Enterprise matris. Eftersom alla möjliga attackvägar inte utnyttjas i lika stor utsträckning, behöver sannolikhetsfördelningar tilldelas till attack- och försvarsstegen. Arbetet som presenteras i den här rapporten inkluderar tilldelningen av sannolikhetsfördelningar till en handfull av dem, i synnerhet de kopplade till att få inital åtkomst till ett system med hjälp av användarutföranden. Utöver detta undersöks också den finansiella påverkan en attack kan ha samt om försvarsåtgärder är finansiellt lönsamma. En modell för avkastning på en sådan investering utvecklas för att kunna beräkna detta.
Palla, Srikanth. "A Multi-Variate Analysis of SMTP Paths and Relays to Restrict Spam and Phishing Attacks in Emails". Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5402/.
Texto completo da fonteJirattigalachote, Amornrat. "Provisioning Strategies for Transparent Optical Networks Considering Transmission Quality, Security, and Energy Efficiency". Doctoral thesis, KTH, Optical Network Laboratory (ON Lab), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-94011.
Texto completo da fonteQC 20120508
Liou, Hong-Ming, e 劉泓銘. "Using Path-Encoding information against Distributed Denial of Service Attack". Thesis, 2004. http://ndltd.ncl.edu.tw/handle/83411881963334572063.
Texto completo da fonte淡江大學
資訊管理學系碩士班
94
In this paper,we present a solution for Distributed Denial of Service Attack. Owing to the insecurity design of IP Protocol,it could not identify source. And those online company might be threatened and lost a lot of money. Yaar presented PI scheme to use path-encoding information against the attack. It is good to proceed to encode internet framework with the complete binary tree. However,The CAIDA study show that only 27% interfaces is more than 2 interfaces. After that, Gao improved the problem of insufficient interfaces of PI scheme. But it is not enough for the scheme. By Bit-Encoding and PS-Number information ,We strengthen the above-mentioned schemes. It could either improve the efficiency of Traceback and decrease the possible of attack paths.
林立洲. "A Path Authentication Scheme for Routing Disruption Attack Prevention in Ad Hoc Network". Thesis, 2004. http://ndltd.ncl.edu.tw/handle/98846724663106109523.
Texto completo da fonte國立交通大學
資訊工程系所
92
Ad hoc routing protocols are vulnerable due to the absence of security mechanism. Forged routing advertisement can disrupt the routing scheme. Research work has been proposed for securing the routing protocol in ad hoc networks. Some of them deployed the asymmetric cryptographic primitive, which are often infeasible in the mobile environment. In this paper, we discovered a strict, cooperative disruption attack behavior on the route path and identify the deficiency about present secure mechanisms for protecting the routing information. We proposed a path authentication scheme which relies on efficient symmetric cryptographic authentication approach. The Random Assignment Path Authentication (RAPA scheme) guarantees the integrity of a complete request route path in route discovery procedure and help the current on-demand routing protocol for resisting against the routing disruption attacks. Our scheme can be adjusted to meet different efficiency and security requirements for the various applications.
Kuo, Pu-Tsun, e 郭溥村. "The Analysis and Reconstruction of Attack Paths for Botnet". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/52029945034619760924.
Texto completo da fonte崑山科技大學
資訊管理研究所
98
Available botnet detection schemes all supposed that ISPs would be cooperative to record or generate the necessary routing information for path reconstruction. In practice, ISP’s service constantly is a mutual benefit for intelligence exchange. Therefore the constraint, require cooperation between ISPs, ought to be relaxed. A new IP traceback scheme based on ant colony optimization (ACO) algorithm is proposed for incomplete attack information formed by routing honeypots or routers’ logs. The aim of our work is to develop an analysis model for reconstruction of attack paths to traceback the botnet Command and Control (C&C) via ant-inspired collective intelligence to find possible routes with support and confidence degree. The validation of model uses NS2 (Network Simulator, version2) complied by dark IP map, to simulate the scenario of spoofed IP attacks, to test the effectiveness of model. Furthermore, sensitivity analysis is conducted to investigate significant parameters’ effect on the output of attack paths. Experimental results show that the proposed approach effectively suggests the best attack path and Command and Control of botnet in a dynamic network environment.
Yu, Sheng-Han, e 余昇瀚. "A Fast Attack Paths Reconstruction Method using SD-FEMM". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/52601665835129245480.
Texto completo da fonte樹德科技大學
資訊工程系碩士班
100
With the development of computer technology, IT-related devices, such as desktop computers, laptops, and even smart mobile phones etc., are becoming more and more popular with people all over the world. However, for lack of basic computer security knowledge, most people easily get malwares on their computer. Among some common Internet attacks, Distributed Denial of Service (DDoS) attack is still hard to defend. It purposely consumes a large poison of computing and network resources using weaknesses in network protocols or system exploits in order to prevent valid users from accessing these ones. Therefore, DDoS becomes one of the most serious network security issues in recent years. A IP Traceback method, called Probabilistic Packet Marking (PPM), is proposed to overcome the DDoS problem. Victims can reconstruct attack paths by collecting and analyzing marked information embedded in packets. However, the original PPM uses only the number of hops to classify marked information and discovers links along attack paths by combining marked information brute-forcely. The number of hops here stands for the distance between some router and the victim. Therefore, if there are two or more routers with the same distance from the victim, marked information produced by these routers will be classified into the same state. The computing time of rebuilding attack paths will dramatically increase. To make matters worse, combining these different routers marked data in the same state could reconstruct false positive paths. In this thesis, we modified Space-Domain Fast Extensible Markov Model (SD-FEMM) to identify every marked information and arrange respectively each one into its own state. Therefore, we could just pick up one sample from each state for combination, and that reduces the cost of computing resource. Moreover, the proposed scheme also improves the time of attack path reconstruction.
Tsou, Jui-Hsueh, e 鄒瑞雪. "Study of patch antenna for Van Atta element". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/88615578321257867142.
Texto completo da fonte元智大學
通訊工程學系
98
In this paper, I use double layers structure of Proximity Coupled Feed, and Microstrip Antenna to build Van Atta Array. By 2X1, 2X2, 4X1, and 4X4 array unit structure formats, I use Electromagnetic Field simulation analysis with CST simulation software. Under linear polarization structure, transmission line and radiation element of antenna are in the different planes. Through the back wave which coupled energy effects to pair antenna units, I will discuss array unit numbers, unit gap, array unit arrangement for each array and relationship which is affected by length of transmission line. Finally I will verify those by measuring far field experiment.