Essays about: "Attack simulering"

Showing result 6 - 10 of 14 essays containing the words Attack simulering.

  1. 6. Digital Twin-based Intrusion Detection for Industrial Control Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Seba Varghese; [2021]
    Keywords : Digital Twin; Intrusion Detection Systems; Industry 4.0; Industrial Control Systems; Machine Learning; Stacked Ensemble Model; Digital tvilling; Intrångsdetekteringssystem; Industri 4.0; Industriella styrsystem; Maskininlärning; Staplad ensemblemodell;

    Abstract : Digital twins for industrial control systems have gained significant interest over recent years. This attention is mainly because of the advanced capabilities offered by digital twins in the areas of simulation, optimization, and predictive maintenance. READ MORE

  2. 7. Measuring Coverage of Attack Simulations on MAL Attack Graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Nicklas Hersén; [2021]
    Keywords : ;

    Abstract : With the transition from traditional media and the increasing number of digital devices, the threats against digital infrastructure is greater than ever before. New and stricter security requirements are placed on digital platform in order to protect sensitive information against external cyber threats. READ MORE

  3. 8. Detecting ADS-B spoofing attacks : using collected and simulated data

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Alex Wahlgren; Joakim Thorn; [2021]
    Keywords : ADS-B; ATC; Spoofing; Air Communication; OpenSky; OpenScope; Security; SVM; Machine Learning;

    Abstract : In a time where general technology is progressing at a rapid rate, this thesis aims to present possible advancements to security in regard to air traffic communication. By highlighting how data can be extracted using simple hardware and open-source software the transparency and lack of authentication is showcased. READ MORE

  4. 9. Simulating ADS-B and CPDLC messages with SDR

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Hanna Gustafsson; Sofie Eskilsson; [2020]
    Keywords : ADS-B; CPDLC; SDR;

    Abstract : Several studies have shown insufficient security in air traffic communication. The increase in air traffic in recent years also increases the need for improved security. CPDLC is used to communicate in text over the data link and ADS-B determines the position of an aircraft. These techniques are looked upon and simulated in the thesis. READ MORE

  5. 10. vehicleLang: a probabilistic modeling and simulation language for vehicular cyber attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sotirios Katsikeas; [2018]
    Keywords : Domain Specific Language; Probabilistic Modeling; Cyber Security; Threat Modeling; Attack Graphs; Vehicular Security; Domänspecifikt språk; Probabilistisk modellering; Cybersäkerhet; Hotmodellering; Attackgrafer; Fordonsäkerhet;

    Abstract : The technological advancements in the automotive industry as well as in thefield of communication technologies done the last years have transformed thevehicles to complex machines that include not only electrical and mechanicalcomponents but also a great number of electronic components. Furthermore,modern vehicles are now connected to the Wide Area Network (WAN) and inthe near future communications will also be present between the cars (Vehicleto-Vehicle, V2V) and between cars and infrastructure (Vehicle-to-Infrastructure, V2I), something that can be found as Internet of Vehicles (IoV)in the literature. READ MORE