Essays about: "Nätverks attacker"

Found 5 essays containing the words Nätverks attacker.

  1. 1. Howthe difficulty of obtaining intrusion artifacts can influence threat modeling : An experiment that shows how IT forensics can be used preventingly

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oscar Meyer; [2022]
    Keywords : Threat modeling; IT Forensics; Linux; IT Defense; Risk assessment; Opensource; Volatility; Hotmodellering; IT Forensik; Linux; IT Försvar; Risk-bedömning; Opensource; Volatility;

    Abstract : IT system intrusions are a problem today and the belief that all you need is a strong outer defense has faded. Today continuous monitoring of the IT infrastructure is widespread and alerts are continuously investigated. READ MORE

  2. 2. Improving deep learning assistedfar-field electromagnetic sidechannelattacks on AES : Effects on attack efficiency from using additive noise and otherdata augmentation techniques

    University essay from KTH/Mekatronik

    Author : Axel Zedigh; [2022]
    Keywords : ;

    Abstract : Profiled side-channel attacks on hardware implemented cryptographic algorithms have been a well-researched topic for the past two decades and many countermeasures against these attacks have been proposed and adopted by the industry. Recently, a new form of far field EM side channel called "screaming channel attacks" have been highlighted. READ MORE

  3. 3. Impacts of misbehavior in Intelligent Transportation Systems (ITS) : The case of cooperative maneuvers

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Andreas Henriksson; [2022]
    Keywords : Intelligent Transportation System; Connected vehicles; Vehicular Communication; Cooperative maneuvers; Maneuver Coordination; Networks attacks; Selective jamming attacks; Falsification attacks; Intelligenta transporteringssytem; Uppkopplade fordon; Fordonskommunikation; Kooperativa manövrar; Manöverkoordinering; Nätverks attacker; Selektiva utstörningsattacker; Förfalskningsattacker;

    Abstract : Connected and autonomous vehicles are emerging technologies that have fostered the Intelligent Transportation System (ITS). ITS has the objective of optimizing traffic safety, mobility, and fuel consumption. To achieve this, a range of different services are provided that utilize communication in a vehicular network. READ MORE

  4. 4. Scanning and Host Fingerprinting Methods for Command and Control Server Detection

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yuki Nakamura; Björn Åström; [2021]
    Keywords : command and control; C2; CnC; botnet; scanning; probing;

    Abstract : Background. Detecting malware command and control infrastructure has impor-tant applications for protecting against attacks. Much research has focused on thisproblem, but a majority of this research has used traffic monitoring methods fordetection. Objectives. READ MORE

  5. 5. Reactive security of IoT communications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Younes Laaboudi; [2019]
    Keywords : ;

    Abstract : IoT networks’ intrinsic vulnerabilities can be protected through intru- sion detection and response systems (IDRS). Anomaly-based intrusion detection offers multiple advantages: it can detect unknown attacks and it can adapt to multiple types of protocols. READ MORE