Essays about: "Nätverks attacker"
Found 5 essays containing the words Nätverks attacker.
-
1. Howthe difficulty of obtaining intrusion artifacts can influence threat modeling : An experiment that shows how IT forensics can be used preventingly
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : IT system intrusions are a problem today and the belief that all you need is a strong outer defense has faded. Today continuous monitoring of the IT infrastructure is widespread and alerts are continuously investigated. READ MORE
-
2. Improving deep learning assistedfar-field electromagnetic sidechannelattacks on AES : Effects on attack efficiency from using additive noise and otherdata augmentation techniques
University essay from KTH/MekatronikAbstract : Profiled side-channel attacks on hardware implemented cryptographic algorithms have been a well-researched topic for the past two decades and many countermeasures against these attacks have been proposed and adopted by the industry. Recently, a new form of far field EM side channel called "screaming channel attacks" have been highlighted. READ MORE
-
3. Impacts of misbehavior in Intelligent Transportation Systems (ITS) : The case of cooperative maneuvers
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Connected and autonomous vehicles are emerging technologies that have fostered the Intelligent Transportation System (ITS). ITS has the objective of optimizing traffic safety, mobility, and fuel consumption. To achieve this, a range of different services are provided that utilize communication in a vehicular network. READ MORE
-
4. Scanning and Host Fingerprinting Methods for Command and Control Server Detection
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Detecting malware command and control infrastructure has impor-tant applications for protecting against attacks. Much research has focused on thisproblem, but a majority of this research has used traffic monitoring methods fordetection. Objectives. READ MORE
-
5. Reactive security of IoT communications
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : IoT networks’ intrinsic vulnerabilities can be protected through intru- sion detection and response systems (IDRS). Anomaly-based intrusion detection offers multiple advantages: it can detect unknown attacks and it can adapt to multiple types of protocols. READ MORE