Essays about: "Attack simulering"

Showing result 1 - 5 of 14 essays containing the words Attack simulering.

  1. 1. StrideLang : Creation of a Domain-Specific Threat Modeling Language using STRIDE, DREAD and MAL

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lazar Cerovic; [2022]
    Keywords : Meta attack language; Domain specific language; Attack graphs; Threat modeling; STRIDE; DREAD; Attack simulation; Cyber defence; Meta attack language; Domänspecifika språk; Attack grafer; Hotmodellering; STRIDE; DREAD; Attack simulering; Cyberförsvar;

    Abstract : Cybersecurity is still one of the main challenges of the digital era for organizations and individuals alike. Threat modeling is an important tool for building systems that are reliable and secure. The research question for this study is to create a domain specific language (DSL) with the Meta Attack Language (MAL), STRIDE and DREAD. READ MORE

  2. 2. Smart Attack Detection for IoT Networks

    University essay from KTH/Kommunikationssystem, CoS

    Author : Yang Yang; [2022]
    Keywords : Internet of Things; Security; Machine learning; Intrusion detection; Sakernas Internet; Säkerhet; Maskininlärning; Intrångsdetektering;

    Abstract : The Internet of Things (IoT) is becoming related to more and more people's daily life. It is a network that consists of resource-constrained devices. Nowadays, the application of IoT like smart wearable devices is very common. Due to the wide and important application of IoT, its security also attracts research attention without any doubt. READ MORE

  3. 3. Simulating ADS-B vulnerabilities by imitating aircrafts : Using an air traffic management simulator

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Axel Boström; Oliver Börjesson; [2022]
    Keywords : ADS-B; ATC; Impersonation attack; Sybil attack; Air Traffic Communication; openScope; Security; Machine learning; K nearest neighbour; Naive Bayes; Decision tree;

    Abstract : Air traffic communication is one of the most vital systems for air traffic management controllers. It is used every day to allow millions of people to travel safely and efficiently across the globe. READ MORE

  4. 4. Evaluation of a Proposed Traffic-Splitting Defence for Tor : Using Directional Time and Simulation Against TrafficSliver

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Jonathan Magnusson; [2021]
    Keywords : Tor; Website Fingerprinting; Deep Learning; Deep Fingerprinting; Traffic Splitting; TrafficSliver;

    Abstract : Tor is a Privacy-Enhancing Technology based on onion routing which lets its users browse the web anonymously. Even though the traffic is encrypted in multiple layers, traffic analysis can still be used to gather information from meta-data such as time, size, and direction of the traffic. READ MORE

  5. 5. Formalise Defense Strategies in Design Patterns of Threat Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Settlin; [2021]
    Keywords : Cyber Security; Security Patterns; Threat Models; Meta Attack Language; Defense Mechanisms; Structural Defenses; Datasäkerhet; Säkerhetsmönster; Hotmodeller; Meta Attack Language; Försvarsmekanismer; Strukturella Försvar;

    Abstract : Cyber-attacks are an increasing problem for organizations across the world. The attacks on systems are getting more and more sophisticated and thereby more and more difficult to protect against. The security of systems is crucial to protect your data from unauthorized access. READ MORE