Essays about: "Cyberattack detection"

Showing result 1 - 5 of 6 essays containing the words Cyberattack detection.

  1. 1. A method of detecting and predicting attack vectors based on genetic programming

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yekatierina Churakova; Oleksii Novikov; [2023]
    Keywords : MITTRE ATT CK; genetic programming; attack vectors; attack prediction;

    Abstract : This Master's thesis presents a novel approach for detecting and predicting attack vectors based on genetic programming. The proposed method utilizes a genetic algorithm to evolve a set of rules that predict attack vectors over the system based on caught indicators of compromise. READ MORE

  2. 2. Data-driven cyberattack detection for microgrids

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jiaying Mao; [2022]
    Keywords : Cyberattack detection; Deep learning network; Microgrid; Smart inverter; Cyber-physical system; Distributed system; Detektering av cyberattacker; Djupinlärning nätverk; Microgrid; Smart växelriktare; Cyberfysiska system; Distribuerade system;

    Abstract : Microgrids are undergoing higher penetrations of renewables and associated power electronics, along with precise and sophisticated control and communication networks. However, such cyber-physical systems might suffer from potential cybersecurity threats and inherent low inertia. READ MORE

  3. 3. Cyber resilience for critical infrastructure : A systematic review

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Vahid Naserinia; [2021]
    Keywords : Cyber resilience; critical infrastructures; systematic review;

    Abstract : Critical infrastructure is a term to define the network of crucial assets for the functioning of a society and modern economies. The complexity of critical infrastructures and the ability to connect smart devices to these networks make them more vulnerable to cyberattacks. READ MORE

  4. 4. C&C architecture : Automation of the deployment of a sophisticated infrastructure, for new malicious uses, harder to detect

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Timon Glasser; [2021]
    Keywords : Command Control; botnets; RAT; detection; implementation; Red Team; Command Control; botnät; RAT; upptäckt; genomförande; Red Team;

    Abstract : Today cybersecurity is becoming a major concern for all of society. Companies can lose billions of dollars because of cyberattacks. States need to keep the vital infrastructure of the country running and must prepare for cyberwar against cyberterrorism and other states. READ MORE

  5. 5. Towards Extending Probabilistic Attack Graphs with Forensic Evidence : An investigation of property list files in macOS

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Olle Hovmark; Emma Schüldt; [2020]
    Keywords : ;

    Abstract : Cyber-attacks against all types of systems is a growing problem in society. Since the Mac operating systems are becoming more common, so are the attacks against them. Probabilistic attack graphs are a way to model cyber- attacks. READ MORE