Essays about: "Attackgraf"

Showing result 1 - 5 of 6 essays containing the word Attackgraf.

  1. 1. HackerGraph : Creating a knowledge graph for security assessment of AWS systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexios Stournaras; [2023]
    Keywords : Cloud security; Knowledge graph; Attack graph; Vulnerability ssessment; Attack paths; Vulnerable-by-design systems; Cloudgoat; Molnsäkerhet; Kunskapsgraf; Attackgraf; Sårbarhetsanalysis; Sårbara miljöer; Cloudgoat;

    Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE

  2. 2. Learning Policies for Path Selection in Attack Graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Manuel Rickli; [2022]
    Keywords : ;

    Abstract : IT systems are indispensable nowadays. With thousands of hacking attempts happening daily, cyber defense mechanisms are crucial for maintaining a working state of those systems. Simulating an attacker is a means of preparing for future hacking attacks by determining the most likely vulnerabilities where an attack could be attempted. READ MORE

  3. 3. Using machine learning to visualize and analyze attack graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Antoine Cottineau; [2021]
    Keywords : Attack graph; Graph visualization; Graph clustering; Network security; Node embedding; Attackgraf; grafvisualisering; grafklustering; nätverkssäkerhet; inbäddning av noder;

    Abstract : In recent years, the security of many corporate networks have been compromised by hackers who managed to obtain important information by leveraging the vulnerabilities of those networks. Such attacks can have a strong economic impact and affect the image of the entity whose network has been attacked. READ MORE

  4. 4. Towards Extending Probabilistic Attack Graphs with Forensic Evidence : An investigation of property list files in macOS

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Olle Hovmark; Emma Schüldt; [2020]
    Keywords : ;

    Abstract : Cyber-attacks against all types of systems is a growing problem in society. Since the Mac operating systems are becoming more common, so are the attacks against them. Probabilistic attack graphs are a way to model cyber- attacks. READ MORE

  5. 5. SCLEX-Lang : A Threat Modeling Language for Substation Automation Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Luyi Sun; [2020]
    Keywords : Meta Attack Language; Automated Substation; Threat Modeling; Attack Graph; Security; Meta Attack Language; automatiserad transformatorstation; hotmodell; attackgraf; säkerhet;

    Abstract : Power systems in the industry today are adopting automated substations because of a growing trend of digitization. Substation automation has greatly reduced intervention from human as well as operation and maintenance costs. READ MORE