Essays about: "MITRE"

Showing result 1 - 5 of 10 essays containing the word MITRE.

  1. 1. Aligning Mitre attack framework with threat analysis and risk assesment (TARA) to support R155 compliance

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Zainab Anifowose; [2023]
    Keywords : Automotive; Connected vehicle; TARA; ISO 21434; R155; MITRE;

    Abstract : Cyber security is evidently more important in todays and tomorrows connected and autonomous vehicles because the increasing connectivity in these vehicles is widening the vehicle attack surface area. Without having a cyber-secure vehicle, it is not possible to argue that connected and autonomous vehicles are safe for all road-users. READ MORE

  2. 2. A method of detecting and predicting attack vectors based on genetic programming

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yekatierina Churakova; Oleksii Novikov; [2023]
    Keywords : MITTRE ATT CK; genetic programming; attack vectors; attack prediction;

    Abstract : This Master's thesis presents a novel approach for detecting and predicting attack vectors based on genetic programming. The proposed method utilizes a genetic algorithm to evolve a set of rules that predict attack vectors over the system based on caught indicators of compromise. READ MORE

  3. 3. Comparison of adversary emulation tools for reproducing behavior in cyber attacks

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Joakim Elgh; [2022]
    Keywords : Adversary emulation; Adversary emulation tools; Behavior; Event logs; APT; Advanced Persistent Threat;

    Abstract : As cyber criminals can find many different ways of gaining unauthorized access to systems without being detected, it is of high importance for organizations to monitor what is happening inside their systems. Adversary emulation is a way to mimic behavior of advanced adversaries within cyber security, which can be used to test detection capabilities of malicious behavior within a system of an organization. READ MORE

  4. 4. Hacking commercial IP cameras : Home Surveillance

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hristo Georgiev; Azad Mustafa; [2021]
    Keywords : Ethical Hacking; Penetration Testing; IP cameras; IoT; Home Surveillance; Etisk Hackning; Penetrationstestning; IP kameror; IoT; Hemövervakning.;

    Abstract : IP cameras have been around for a while and have been a growing part of the IoT scene. There is a variety of IP cameras being used in enterprises and homes with the main reason being for surveillance. This naturally attracts attackers to potentially take control of the camera feeds and or disable them completely. READ MORE

  5. 5. A monthly snapshot-based approach for threat hunting within Windows IT environments

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Moric Jacquier; [2021]
    Keywords : ;

    Abstract : This work aims at implementing a threat hunting method based on monthly data snapshots in Windows IT environments, and at assessing whether and how gaps between month-on-month snapshots may be analysed to enhance threat detection. The objective of our approach is to control monthly whether a set of IT systems has been compromised by an attacker, separately from the deployed monitoring systems (e. READ MORE