Essays about: "Attack Graphs"

Showing result 6 - 10 of 30 essays containing the words Attack Graphs.

  1. 6. Modelling Cyber Security of Networks as a Reinforcement Learning Problem using Graphs : An Application of Reinforcement Learning to the Meta Attack Language

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sandor Berglund; [2022]
    Keywords : Attack graphs; reinforcement learning; graph neural networks; Meta Attack Language; MAL; deepQ-learning DQN ; Attackgrafer; förstärningsinlärning; artificiella neuronnät; grafneuronnät; djup Qinlärning; Meta Attack Language; MAL;

    Abstract : ICT systems are part of the vital infrastructure in today’s society. These systems are under constant threat and efforts are continually being put forth by cyber security experts to protect them. By applying modern AI methods, can these efforts both be improved and alleviated of the cost of expert work. READ MORE

  2. 7. Security Analysis of Volvo’s Infotainment System

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Dana Ismail; Porsev Aslan; [2022]
    Keywords : Threat Modeling; Attack Simulations; Risk Analysis; Cybersecurity; Infotainment System; Vehicle Security; Hotmodeller; Attacksimuleringar; Riskanalys; Cybersäkerhet; Infotainmentsystem; Fordonssäkerhet;

    Abstract : Today’s car development is progressing rapidly, and new car models are constantly being produced. These new vehicles are adapted to today’s digital society and all its needs. An important issue is how well security is involved in this technological development. With all these successes, there are also possible vulnerabilities. READ MORE

  3. 8. StrideLang : Creation of a Domain-Specific Threat Modeling Language using STRIDE, DREAD and MAL

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lazar Cerovic; [2022]
    Keywords : Meta attack language; Domain specific language; Attack graphs; Threat modeling; STRIDE; DREAD; Attack simulation; Cyber defence; Meta attack language; Domänspecifika språk; Attack grafer; Hotmodellering; STRIDE; DREAD; Attack simulering; Cyberförsvar;

    Abstract : Cybersecurity is still one of the main challenges of the digital era for organizations and individuals alike. Threat modeling is an important tool for building systems that are reliable and secure. The research question for this study is to create a domain specific language (DSL) with the Meta Attack Language (MAL), STRIDE and DREAD. READ MORE

  4. 9. Learning Policies for Path Selection in Attack Graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Manuel Rickli; [2022]
    Keywords : ;

    Abstract : IT systems are indispensable nowadays. With thousands of hacking attempts happening daily, cyber defense mechanisms are crucial for maintaining a working state of those systems. Simulating an attacker is a means of preparing for future hacking attacks by determining the most likely vulnerabilities where an attack could be attempted. READ MORE

  5. 10. Early-stage detection of bark beetle infested spruce forest stands using Sentinel-2 data and vegetation indices

    University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskap

    Author : Karl Piltz; [2022]
    Keywords : Geomatics; Remote sensing; Bark beetle; Early-stage; Vegetation index; Sentinel-2; Spruce; Forestry; Earth and Environmental Sciences;

    Abstract : The European spruce bark beetle is an insect that is often referred to as a pest. Responsible for the destruction of over 150 million m3 of Norwegian spruce forest in Europe over the last 50 years makes this insect one of the major disturbances to the forest industry. READ MORE