Добірка наукової літератури з теми "Security attacks detection"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Security attacks detection".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Security attacks detection":
Jimmy, FNU. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (April 12, 2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p233.
Jimmy, Fnu. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (April 12, 2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p234.
Kumavat, Kavita S., and Joanne Gomes. "Common Mechanism for Detecting Multiple DDoS Attacks." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4 (May 4, 2023): 81–90. http://dx.doi.org/10.17762/ijritcc.v11i4.6390.
Kareem, Mohammed Ibrahim, Mohammad Jawad Kadhim Abood, and Karrar Ibrahim. "Machine learning-based PortScan attacks detection using OneR classifier." Bulletin of Electrical Engineering and Informatics 12, no. 6 (December 1, 2023): 3690–96. http://dx.doi.org/10.11591/eei.v12i6.4142.
Du, Dajun, Rui Chen, Xue Li, Lei Wu, Peng Zhou, and Minrui Fei. "Malicious data deception attacks against power systems: A new case and its detection method." Transactions of the Institute of Measurement and Control 41, no. 6 (January 8, 2018): 1590–99. http://dx.doi.org/10.1177/0142331217740622.
Kumar, Sunil, and Maninder Singh. "Detection and Isolation of Zombie Attack under Cloud Environment." Oriental journal of computer science and technology 10, no. 2 (April 12, 2017): 338–44. http://dx.doi.org/10.13005/ojcst/10.02.12.
Farane Shradha, Gotane Rutuja, Chandanshive Sakshi, Agrawal Khushi, and Khandekar Srushti. "Detection of cyber-attacks and network attacks using Machine Learning." World Journal of Advanced Engineering Technology and Sciences 12, no. 1 (May 30, 2024): 128–32. http://dx.doi.org/10.30574/wjaets.2024.12.1.0184.
Aslan, Ömer, Semih Serkant Aktuğ, Merve Ozkan-Okay, Abdullah Asim Yilmaz, and Erdal Akin. "A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions." Electronics 12, no. 6 (March 11, 2023): 1333. http://dx.doi.org/10.3390/electronics12061333.
Alamsyah, Hendri, Riska, and Abdussalam Al Akbar. "Analisa Keamanan Jaringan Menggunakan Network Intrusion Detection and Prevention System." JOINTECS (Journal of Information Technology and Computer Science) 5, no. 1 (January 25, 2020): 17. http://dx.doi.org/10.31328/jointecs.v5i1.1240.
Salih, Azar Abid, and Maiwan Bahjat Abdulrazzaq. "Cyber security: performance analysis and challenges for cyber attacks detection." Indonesian Journal of Electrical Engineering and Computer Science 31, no. 3 (September 1, 2023): 1763. http://dx.doi.org/10.11591/ijeecs.v31.i3.pp1763-1775.
Дисертації з теми "Security attacks detection":
Kazi, Shehab. "Anomaly based Detection of Attacks on Security Protocols." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4806.
Whitelaw, Clayton. "Precise Detection of Injection Attacks on Concrete Systems." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/6051.
Jan, Steve T. K. "Robustifying Machine Learning based Security Applications." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/99862.
Doctor of Philosophy
Machine learning (ML) is computer algorithms that aim to identify hidden patterns from the data. In recent years, machine learning has been widely used in many fields. The range of them is broad, from natural language to autonomous driving. However, there are growing concerns about the robustness of machine learning models. And these concerns are further amplified in security-critical applications — Attackers can manipulate their inputs (i.e., adversarial examples) to cause machine learning models to predict wrong, and it's highly expensive and difficult to obtain a huge amount of attackers' data because attackers are rare compared to the normal users. These make applying machine learning in security-critical applications concerning. In this dissertation, we seek to build better defenses in three types of machine learning based security applications. The first one is image recognition, by developing a method to generate realistic adversarial examples, the machine learning models are more robust for defending against adversarial examples by adversarial retraining. The second one is bot detection, we develop a data synthesis method to detect malicious bots when we only have the limit malicious bots data. For phishing websites, we implement a tool to detect domain name impersonation and detect phishing pages using dynamic and static analysis.
Taub, Lawrence. "Application of a Layered Hidden Markov Model in the Detection of Network Attacks." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/320.
Rosa, José Luís da Silva. "Customer-side detection of BGP routing attacks." Master's thesis, Universidade de Aveiro, 2016. http://hdl.handle.net/10773/17808.
A utilização diária da Internet tornou-se uma rotina que foi assimilada pelas pessoas sem considerarem a complexidade interna desta gigante rede. Até um certo ponto, o Border Gateway Protocol é o que mantem toda esta conectividade possível apesar de ser um protocolo defeituoso por natureza. Em 2008, um ataque Man-In-The-Middle foi pela primeira vez apresentado ao grande público e desde de então mais técnicas para explorar este protocolo e obter tráfego alheio de forma ilícita foram dadas a conhecer. Mesmo que o desvio não aconteça com natureza maliciosa, mas sim devido a um erro de configuração, este é um problema que deverá ser enfrentado. Alguns provedores de serviço e institutos de investigação já apresentaram propostas para novos protocolos e/ou sistemas de monitorização, mas estes estão atrasados no seu desenvolvimento ou apenas afetam a camada superior da rede, deixando utilizadores e um grande número de empresas que estão ligadas a um provedor sem meios para agir e sem informação sobre o encaminhamento do seu tráfego. Nesta dissertação, é apresentado, concebido e implementado um sistema que atinge uma monitorização ativa do BGP através da medição do tempo médio de viagem de vários pacotes enviados de várias localizações, através de uma rede mundial de sondas, e do processamento dos resultados obtidos, permitindo que todos os interessados possam ser alertados.
The daily use of the Internet has become a routine that many people absorbed into their lives without even thinking about the insides of this gigantic network. To an extent, the Border Gateway Protocol is what is keeping all this connectivity together despite being a very flawed protocol due to its design. In 2008 a Man-In-The-Middle attack was first presented to the general audience and ever since more techniques were reported to use the protocol to obtain traffic illicitly. Even if the routing deviation does not occur via a malicious intention but due to some poorly configured router, this is a problem that must be tackled. Some network providers and research institutes already presented some drafts for new protocols or monitoring systems but they are late into deployment or only affect the top layer of the network, leaving users and most part of the companies connected to the provider impotent and without any proper information about the routing of their traffic. In this dissertation a system is presented, implemented and deployed, achieving an active monitorization of BGP through measurements of the average travel time of several packets sent to various locations by a worldwide set of Probes and the collected results processed allowing all concerned actors to be alerted.
Lantz, David. "Detection of side-channel attacks targeting Intel SGX." Thesis, Linköpings universitet, Programvara och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177987.
Aditham, Santosh. "Mitigation of Insider Attacks for Data Security in Distributed Computing Environments." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6639.
Rubio, Hernan Jose Manuel. "Detection of attacks against cyber-physical industrial systems." Thesis, Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0015/document.
We address security issues in cyber-physical industrial systems. Attacks against these systems shall be handled both in terms of safety and security. Control technologies imposed by industrial standards already cover the safety dimension. From a security standpoint, the literature has shown that using only cyber information to handle the security of cyber-physical systems is not enough, since physical malicious actions are ignored. For this reason, cyber-physical systems have to be protected from threats to their cyber and physical layers. Some authors handle the attacks by using physical attestations of the underlying processes, f.i., physical watermarking to ensure the truthfulness of the process. However, these detectors work properly only if the adversaries do not have enough knowledge to mislead crosslayer data. This thesis focuses on the aforementioned limitations. It starts by testing the effectiveness of a stationary watermark-based fault detector, to detect, as well, malicious actions produced by adversaries. We show that the stationary watermark-based detector is unable to identify cyber-physical adversaries. We show that the approach only detects adversaries that do not attempt to get any knowledge about the system dynamics. We analyze the detection performance of the original design under the presence of adversaries that infer the system dynamics to evade detection. We revisit the original design, using a non-stationary watermark-based design, to handle those adversaries. We also propose a novel approach that combines control and communication strategies. We validate our solutions using numeric simulations and training cyber-physical testbeds
Wang, Le. "Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques." Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-theses/992.
Rubio, Hernan Jose Manuel. "Detection of attacks against cyber-physical industrial systems." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0015.
We address security issues in cyber-physical industrial systems. Attacks against these systems shall be handled both in terms of safety and security. Control technologies imposed by industrial standards already cover the safety dimension. From a security standpoint, the literature has shown that using only cyber information to handle the security of cyber-physical systems is not enough, since physical malicious actions are ignored. For this reason, cyber-physical systems have to be protected from threats to their cyber and physical layers. Some authors handle the attacks by using physical attestations of the underlying processes, f.i., physical watermarking to ensure the truthfulness of the process. However, these detectors work properly only if the adversaries do not have enough knowledge to mislead crosslayer data. This thesis focuses on the aforementioned limitations. It starts by testing the effectiveness of a stationary watermark-based fault detector, to detect, as well, malicious actions produced by adversaries. We show that the stationary watermark-based detector is unable to identify cyber-physical adversaries. We show that the approach only detects adversaries that do not attempt to get any knowledge about the system dynamics. We analyze the detection performance of the original design under the presence of adversaries that infer the system dynamics to evade detection. We revisit the original design, using a non-stationary watermark-based design, to handle those adversaries. We also propose a novel approach that combines control and communication strategies. We validate our solutions using numeric simulations and training cyber-physical testbeds
Книги з теми "Security attacks detection":
Dübendorfer, Thomas P. Impact analysis, early detection, and mitigation of large-scale Internet attacks. Aachen: Shaker, 2005.
Raghavan, S. V. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. India: Springer India Pvt. Ltd., 2011.
Nelson A. Rockefeller Institute of Government., ed. The role of "home" in homeland security: The prevention and detection of terrorist attacks : the challenge for state and local government. Albany, N.Y: The Institute, 2003.
Brancik, Kenneth C. Insider computer fraud: An indepth framework for detecting and defending against insider it attacks. Boca Raton: Auerbach Publications, 2007.
United States. Congress. House. Committee on Science and Technology (2007). Subcommittee on Technology and Innovation. Planning for the future of cyber attack attribution: Hearing before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, second session, July 15, 2010. Washington: U.S. G.P.O., 2010.
United States. Congress. House. Committee on Homeland Security. Subcommittee on the Prevention of Nuclear and Biological Attack. DHS coordination of nuclear detection efforts.: Hearing before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, April 19, 2005 and April 20, 2005. Washington: U.S. G.P.O., 2005.
Attack, United States Congress House Committee on Homeland Security Subcommittee on the Prevention of Nuclear and Biological. Enlisting foreign cooperation in U.S. efforts to prevent nuclear smuggling: Hearing before the Subcommittee on [the] Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, second session, May 25, 2006. Washington: U.S. G.P.O., 2007.
United States. Congress. House. Committee on Homeland Security. Subcommittee on the Prevention of Nuclear and Biological Attack. The science of prevention: Hearing before the Subcommittee on Prevention of Nuclear and Biological Attack of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, second session, September 14, 2006. Washington: U.S. G.P.O., 2007.
Attack, United States Congress House Committee on Homeland Security Subcommittee on the Prevention of Nuclear and Biological. Detecting nuclear weapons and radiological materials: How effective is available technology? : joint hearing before the Subcommittee on Prevention of Nuclear and Biological Attack with the Subcommittee on Emergency Preparedness, and Science, and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, June 21, 2005. Washington: U.S. G.P.O., 2007.
Bhattacharyya, Dhruba Kumar, and Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Taylor & Francis Group, 2016.
Частини книг з теми "Security attacks detection":
van Oorschot, Paul C. "Intrusion Detection and Network-Based Attacks." In Information Security and Cryptography, 309–38. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-33649-3_11.
van Oorschot, Paul C. "Intrusion Detection and Network-Based Attacks." In Information Security and Cryptography, 309–38. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-83411-1_11.
Lucas, Keane, Mahmood Sharif, Lujo Bauer, Michael K. Reiter, and Saurabh Shintre. "Deceiving ML-Based Friend-or-Foe Identification for Executables." In Advances in Information Security, 217–49. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16613-6_10.
Singh, Gulshan Kumar, and Gaurav Somani. "Detecting Cloud Originated DDoS Attacks at the Source Using Out-Cloud Attack Detection (OCAD)." In Information Systems Security, 169–85. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23690-7_10.
Narisada, Shintaro, Shoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, and Shinsaku Kiyomoto. "Stronger Targeted Poisoning Attacks Against Malware Detection." In Cryptology and Network Security, 65–84. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65411-5_4.
Arya, Shivani, and Saurabh Chamotra. "Multi Layer Detection Framework for Spear-Phishing Attacks." In Information Systems Security, 38–56. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92571-0_3.
Harish, R., and K. Praveen. "Review on Wi-Fi Attacks and Detection Methods." In Information Technology Security, 101–17. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0407-1_5.
Shirazi, Hossein, Bruhadeshwar Bezawada, Indrakshi Ray, and Charles Anderson. "Adversarial Sampling Attacks Against Phishing Detection." In Data and Applications Security and Privacy XXXIII, 83–101. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22479-0_5.
Szynkiewicz, Paweł. "Signature-Based Detection of Botnet DDoS Attacks." In Cybersecurity of Digital Service Chains, 120–35. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_6.
Salazar-Hernández, Rolando, and Jesús E. Díaz-Verdejo. "Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks." In Information and Communications Security, 416–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17650-0_29.
Тези доповідей конференцій з теми "Security attacks detection":
Mihai, Ioan cosmin, and Laurentiu Giurea. "MANAGEMENT OF ELEARNING PLATFORMS SECURITY." In eLSE 2016. Carol I National Defence University Publishing House, 2016. http://dx.doi.org/10.12753/2066-026x-16-061.
Kolodziej, Joanna, Mateusz Krzyszton, and Pawel Szynkiewicz. "Anomaly Detection In TCP/IP Networks." In 37th ECMS International Conference on Modelling and Simulation. ECMS, 2023. http://dx.doi.org/10.7148/2023-0542.
Segura, Gustavo A. Nunez, Arsenia Chorti, and Cíntia Borges Margi. "IDIT-SDN: Intrusion Detection Framework for Software-defined Wireless Sensor Networks." In Anais Estendidos do Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/sbrc_estendido.2023.817.
Ramesh Kumar, M., and Pradeep Sudhakaran. "Comprehensive Survey on Detecting Security Attacks of IoT Intrusion Detection Systems." In International Research Conference on IOT, Cloud and Data Science. Switzerland: Trans Tech Publications Ltd, 2023. http://dx.doi.org/10.4028/p-270t9z.
Lim, Wei Heng, Weng Foong Liew, Chun Yew Lum, and Seah Fang Lee. "Phishing Security: Attack, Detection, and Prevention Mechanisms." In International Conference on Digital Transformation and Applications (ICDXA 2020). Tunku Abdul Rahman University College, 2020. http://dx.doi.org/10.56453/icdxa.2020.1017.
Babbage, S. H. "Improved “exhaustive search” attacks on stream ciphers." In European Convention on Security and Detection. IEE, 1995. http://dx.doi.org/10.1049/cp:19950490.
Gregorio- de Souza, Ian, Vincent H. Berk, Annarita Giani, George Bakos, Marion Bates, George Cybenko, and Doug Madory. "Detection of complex cyber attacks." In Defense and Security Symposium, edited by Edward M. Carapezza. SPIE, 2006. http://dx.doi.org/10.1117/12.670131.
S. Jabor, Maytham, Aqeel Salman Azez, Azhar Hasan Nsaif, Azhar Sabah Abdulaziz, and Worud Mahdi Saleh. "Security Challenges and Threats in Wireless Sensor Networks: A Review." In IX. International Scientific Congress of Pure, Applied and Technological Sciences. Rimar Academy, 2023. http://dx.doi.org/10.47832/minarcongress9-21.
Baykara, Muhammet, and Zahit Ziya Gurel. "Detection of phishing attacks." In 2018 6th International Symposium on Digital Forensic and Security (ISDFS). IEEE, 2018. http://dx.doi.org/10.1109/isdfs.2018.8355389.
Kim, Hannah, Celia Cintas, Girmaw Abebe Tadesse, and Skyler Speakman. "Spatially Constrained Adversarial Attack Detection and Localization in the Representation Space of Optical Flow Networks." In Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. California: International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/107.
Звіти організацій з теми "Security attacks detection":
Fedchenko, Vitaly. Nuclear Security During Armed Conflict: Lessons From Ukraine. Stockholm International Peace Research Institute, March 2023. http://dx.doi.org/10.55163/zzsp5617.
Kolencik, Marian. A critical evaluation of the risk indicators of criminal conduct involving CBRN and explosive materials - Behavioural and observational analysis in crime detection and investigation. ISEM Institute, n.p.o., October 2023. http://dx.doi.org/10.52824/vzrb5079.
Tayeb, Shahab. Taming the Data in the Internet of Vehicles. Mineta Transportation Institute, January 2022. http://dx.doi.org/10.31979/mti.2022.2014.
Peterson, Dale. Cyber Security Audit and Attack Detection Toolkit. Office of Scientific and Technical Information (OSTI), May 2012. http://dx.doi.org/10.2172/1097617.
In Hot Water? The Growing Threat of Cyber Attacks to Water Distribution Systems. American Society of Civil Engineers, March 2022. http://dx.doi.org/10.1061/infographic.000003.