Essays about: "Computer network attack"

Showing result 1 - 5 of 25 essays containing the words Computer network attack.

  1. 1. Implicit Message Integrity Provision : In Heterogeneous Vehicular Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Paul Molloy; [2023]
    Keywords : Privacy; Code Generation; Vehicle-to-infrastructure; Vehicular ad hoc Networks; Standardization; Remote Procedure Calls; Safety; Integritet; Kodgenerering; Fordon-till-infrastruktur; Ad hoc-nät för Fordon; Standardisering; Samtal om fjärrprocedur; Säkerhet;

    Abstract : Vehicles on the road today are complex multi-node computer networks. Security has always been a critical issue in the automotive computing industry. It is becoming even more crucial with the advent of autonomous vehicles and driver assistant technology. There is potential for attackers to control vehicles maliciously. READ MORE

  2. 2. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jakub Reha; [2023]
    Keywords : Graph neural networks; Temporal graphs; Benchmark datasets; Anomaly detection; Heterogeneous graphs; Provenance graphs; Grafiska neurala nätverk; temporala grafer; benchmark-datauppsättningar; anomalidetektering; heterogena grafer; härkomstgrafer;

    Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE

  3. 3. Enhancing an Existing Attack Projection System with Deep Learning

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Mikael Kolanowski; [2023]
    Keywords : Cybersecurity; Attack projection; Deep learning; LSTM; Transformer; Cybersäkerhet; Attackprojicering; Djupinlärning; LSTM; Transformer;

    Abstract : As organizations and critical infrastructure increasingly rely on computer networks for their function, cyber defense becomes more and more important. A recent trend is to employ predictive methods in cybersecurity. Attack projection attempts to predict the next step in an ongoing attack. READ MORE

  4. 4. A case study of unauthorized login attempts against honeypots via remote desktop

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Oscar Rehnbäck; [2023]
    Keywords : ;

    Abstract :  Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. READ MORE

  5. 5. Evaluating the Security and Resilience of Typical off the Shelf CoAP IoT Devices : Assessing CoAP and Wi-Fi vulnerabilities

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Wolfgang Müller; [2022]
    Keywords : IoT; DoS; CoAP; Ethical hacking; IoT; DoS; CoAP; Ethical hacking;

    Abstract : Syftet med denna studie har varit att utvärdera säkerheten och motståndskraften hos CoAP-protokollet som används av ett multinationellt företag för kommunikationen mellan en gateway och appen för kontroll av smarta produkter. Utvärderingen började med att koppla gatewayn till nätverket och installera operativsystemet Kali Linux på datorn. READ MORE