Essays about: "Advanced Persistent Threat"

Found 5 essays containing the words Advanced Persistent Threat.

  1. 1. Active learning for text classification in cyber security

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Amanda Carp; [2023]
    Keywords : Interactive machine learning; Active learning; Cost-effective active learning; Cyber environment; Interaktiv maskininlärning; Aktiv inlärning; Kostnadseffektiv aktiv inlärning; Cyberdomänen;

    Abstract : In the domain of cyber security, machine learning promises advanced threat detection. However, the volume of available unlabeled data poses challenges for efficient data management. This study investigates the potential for active learning, a subset of interactive machine learning, to reduce the effort required for manual data labelling. READ MORE

  2. 2. Evaluating hardware isolation for secure software development in Highly Regulated Environments

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Andre Brogärd; [2023]
    Keywords : Hardware Isolation; Supply chain attacks; HRE; Intel SGX; CI; Hårdvaruisolering; Distributionskedjeattacker; HRE; Intel SGX; CI;

    Abstract : Organizations in highly regulated industries have an increasing need to protect their intellectual assets, because Advanced Persistent Threat (APT) entities are capable of using supply chain attacks to bypass traditional defenses. This work investigates the feasibility of preventing supply chain attacks by isolating the build environment of the software using hardware isolation. READ MORE

  3. 3. Cybersecurity of remote work migration: A study on the VPN security landscape post covid-19 outbreak

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Lukas Einler Larsson; Kushtrim Qollakaj; [2023]
    Keywords : Cybersecurity; Remote work; VPN; Exploit; Hardening;

    Abstract : Background. The pandemic outbreak commenced a large migration of employees from all kinds of industries from previously working in an industrial or office environment to working from home. The remote migration allowed many kinds of work to continue as usual even during a pandemic. READ MORE

  4. 4. Comparison of adversary emulation tools for reproducing behavior in cyber attacks

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Joakim Elgh; [2022]
    Keywords : Adversary emulation; Adversary emulation tools; Behavior; Event logs; APT; Advanced Persistent Threat;

    Abstract : As cyber criminals can find many different ways of gaining unauthorized access to systems without being detected, it is of high importance for organizations to monitor what is happening inside their systems. Adversary emulation is a way to mimic behavior of advanced adversaries within cyber security, which can be used to test detection capabilities of malicious behavior within a system of an organization. READ MORE

  5. 5. Detecting Lateral Movement in Microsoft Active Directory Log Files : A supervised machine learning approach

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Viktor Uppströmer; Henning Råberg; [2019]
    Keywords : Advanced Persistent Threat; Lateral Movement; Active Directory; Multiclass Classification; Intrusion Detection System; Avancerade långvariga hot; Lateral rörelse; Active Directory; Multiklassklassificering; Intrångsdetektering;

    Abstract : Cyberattacker utgör ett stort hot för dagens företag och organisationer, med engenomsnittlig kostnad för ett intrång på ca 3,86 miljoner USD. För att minimera kostnaden av ett intrång är det viktigt att detektera intrånget i ett så tidigt stadium som möjligt. READ MORE