To see the other types of publications on this topic, follow the link: Classification of Cyber- Attacks.

Dissertations / Theses on the topic 'Classification of Cyber- Attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Classification of Cyber- Attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Lyn, Kevin G. "Classification of and resilience to cyber-attacks on cyber-physical systems." Thesis, Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53926.

Full text
Abstract:
The growing connectivity of cyber-physical systems (CPSes) has led to an increased concern over the ability of cyber-attacks to inflict physical damage. Current cybersecurity measures focus on preventing attacks from penetrating control supervisory networks. These reactive techniques, however, are often plagued with vulnerabilities and zero-day exploits. Embedded processors in CPS field devices often possess little security of their own, and are easily exploited once the network is penetrated. In response, researchers at Georgia Tech and Virginia Tech have proposed a Trustworthy Autonomic Inte
APA, Harvard, Vancouver, ISO, and other styles
2

Thames, John Lane. "Advancing cyber security with a semantic path merger packet classification algorithm." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45872.

Full text
Abstract:
This dissertation investigates and introduces novel algorithms, theories, and supporting frameworks to significantly improve the growing problem of Internet security. A distributed firewall and active response architecture is introduced that enables any device within a cyber environment to participate in the active discovery and response of cyber attacks. A theory of semantic association systems is developed for the general problem of knowledge discovery in data. The theory of semantic association systems forms the basis of a novel semantic path merger packet classification algorithm. The theo
APA, Harvard, Vancouver, ISO, and other styles
3

Hurst, William. "Behavioural observation for critical infrastructure security support." Thesis, Liverpool John Moores University, 2014. http://researchonline.ljmu.ac.uk/4382/.

Full text
Abstract:
Critical infrastructures include sectors such as energy resources, finance, food and water distribution, health, manufacturing and government services. In recent years, critical infrastructures have become increasingly dependent on ICT; more interconnected and are often, as a result, linked to the Internet. Consequently, this makes these systems more vulnerable and increases the threat of cyber-attack. In addition, the growing use of wireless networks means that infrastructures can be more susceptible to a direct digital attack than ever before. Traditionally, protecting against environmental
APA, Harvard, Vancouver, ISO, and other styles
4

Kameníček, Lukáš. "Kybernetická bezpečnost z pohledu podnikové informatiky." Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-264292.

Full text
Abstract:
This thesis deals with the issue of cyber security in enterprises. The main objective of this thesis is to compile a comprehensive overview of the issue of cyber security related to the Czech business entities. It is written in the context in Czech language and in less technical form. This thesis first identifies the current cyber threats, supported by examples of actual incidents. On the basis of the threats thesis defines the categories of business entities that are vulnerable to the threats, and with regard to the Czech legal system analyzes cybersecurity responsibilities. Above the legal o
APA, Harvard, Vancouver, ISO, and other styles
5

Bedhammar, Jennifer, and Oliver Johansson. "Visualization of cyber security attacks." Thesis, Linköpings universitet, Medie- och Informationsteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167144.

Full text
Abstract:
The Swedish Defence Research Agency (FOI) simulates cyber attacks for research and education purposes in their cyber range, CRATE, with a system called SVED. This thesis describes the process of creating a visualization of the log files produced by SVED, with the purpose of increasing the users’ comprehension of the log files and thereby increasing their knowledge of the simulated attacks. To create an effective visualization a user study was held to know the users’ needs, experiences and requirements. Several designs were created based on the results and one was selected and refined using fee
APA, Harvard, Vancouver, ISO, and other styles
6

Masood, Ummi Hani Binti. "Countering cyber attacks in Malaysian law : assessing the concept of cyber attacks and the countermeasures." Thesis, University of Leeds, 2017. http://etheses.whiterose.ac.uk/17787/.

Full text
Abstract:
An examination of the nature of cyber attacks (meaning attacks on computer systems and the disruption of national security and order through online seditious and defamatory statements) and the appropriate countermeasures under the law of Malaysia and international law are undertaken in this project. This study explores the emergence of cyber attacks as a serious threat to security and a challenge to current legal norms. As such, it uses ontologies to encapsulate and analyse the existence and reality of the cyber attacks phenomenon. It provides an open-ended concept and categories of cyber atta
APA, Harvard, Vancouver, ISO, and other styles
7

Hätty, Niklas. "Representing attacks in a cyber range." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-159838.

Full text
Abstract:
Trained security experts can be a mitigating factor to sophisticated cyberattacks that aim to violate the confidentiality, integrity, and availability of information. Reproducible sessions in a safe training environment is an effective way of increasing the excellence of security experts. One approach to achieving this is by using cyber ranges, which essentially is a set of hardware nodes that can virtually represent a large organization or system. The Swedish Defense Research Agency (FOI) develops and maintains a fully functioning cyber range and has the ability to automatically deploy sophis
APA, Harvard, Vancouver, ISO, and other styles
8

Liivakant, André. "Web Warfare : NATO, Cyber-attacks and Territoriality." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-341302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dai, Pei-Ying. "Non-technical approaches to fighting cyber attacks." Thesis, University of Lincoln, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.685305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yermalovich, Pavel. "Risk estimation and prediction of cyber attacks." Doctoral thesis, Université Laval, 2021. http://hdl.handle.net/20.500.11794/67982.

Full text
Abstract:
L’utilisation de l’information est étroitement liée à sa sécurité. Le fait d’exploiter des vulnérabilités permet à une tierce personne de compromettre la sécurité d’un système d’information. La modélisation des menaces aide à prévoir les attaques les plus probables visant une infrastructure donnée afin de mieux les contrer. Le projet de recherche proposé « Estimation des risques et prédiction des cyber-attaques » vise la combinaison de différentes techniques de prédiction de cyber-attaques pour mieux protéger un système informatique. Il est nécessaire de trouver les paramètres les plus informa
APA, Harvard, Vancouver, ISO, and other styles
11

Whyte, David L. 1967. "Using a systems-theoretic approach to analyze cyber attacks on cyber-physical systems." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/110143.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, School of Engineering, System Design and Management Program, 2017.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 113-118).<br>With increased Internet connectivity and the advent of the industrial Internet, cyber-physical systems are increasingly being targeted by cyber attacks. Unlike, cyber attacks on IT networks, successfully compromising a cyber-physical environment takes considerably more time, motivation, expertise, and operational costs to the adversary. This thesis
APA, Harvard, Vancouver, ISO, and other styles
12

Garcia, Colleen Elizabeth. "Regulating nation-state cyber attacks in counterterrorism operations." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FGarcia.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Combating Terrorism: Policy and Strategy))--Naval Postgraduate School, June 2010.<br>Thesis Advisor(s): Denning, Dorothy ; Russell, James. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Cyber attack, international law, China, Russia, United States, al Qaeda, Hamas, Hezbollah, FARC, Botnet, worm, virus, malicious code, hack, jus in bello, jus ad bellum, Law of Armed Conflict (LOAC), laws of war, counterterrorism operations (CT), cyber strategy, military strategy, foreign policy, national policy, use of fo
APA, Harvard, Vancouver, ISO, and other styles
13

Rubio, Hernan Jose Manuel. "Detection of attacks against cyber-physical industrial systems." Thesis, Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0015/document.

Full text
Abstract:
Nous abordons des problèmes de sécurité dans des systèmes cyber-physiques industriels. Les attaques contre ces systèmes doivent être traitées à la fois en matière de sûreté et de sécurité. Les technologies de contrôles imposés par les normes industrielles, couvrent déjà la sûreté. Cependant, du point de vue de la sécurité, la littérature a prouvé que l’utilisation de techniques cyber pour traiter la sécurité de ces systèmes n’est pas suffisante, car les actions physiques malveillantes seront ignorées. Pour cette raison, on a besoin de mécanismes pour protéger les deux couches à la fois. Certai
APA, Harvard, Vancouver, ISO, and other styles
14

Hachem, Nabil. "MPLS-based mitigation technique to handle cyber attacks." Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0013/document.

Full text
Abstract:
Les cyber-attaques pourraient engendrer des pertes qui sont de plus en plus importantes pour les utilisateurs finaux et les fournisseurs de service. Ces attaques sont, en outre, élevées par une myriade des ressources infectées et comptent surtout sur les réseaux pour être contrôlées, se propager ou endommager. Face à ces risques, il y a un besoin essentiel qui se manifeste dans la réponse à ces nombreuses attaques par des stratégies de défense efficaces. Malgré les multitudes efforts dévouées pour mettre en œuvre des techniques de défense complètes afin de se protéger contre les attaques résea
APA, Harvard, Vancouver, ISO, and other styles
15

Rubio, Hernan Jose Manuel. "Detection of attacks against cyber-physical industrial systems." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0015.

Full text
Abstract:
Nous abordons des problèmes de sécurité dans des systèmes cyber-physiques industriels. Les attaques contre ces systèmes doivent être traitées à la fois en matière de sûreté et de sécurité. Les technologies de contrôles imposés par les normes industrielles, couvrent déjà la sûreté. Cependant, du point de vue de la sécurité, la littérature a prouvé que l’utilisation de techniques cyber pour traiter la sécurité de ces systèmes n’est pas suffisante, car les actions physiques malveillantes seront ignorées. Pour cette raison, on a besoin de mécanismes pour protéger les deux couches à la fois. Certai
APA, Harvard, Vancouver, ISO, and other styles
16

Hachem, Nabil. "MPLS-based mitigation technique to handle cyber attacks." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0013.

Full text
Abstract:
Les cyber-attaques pourraient engendrer des pertes qui sont de plus en plus importantes pour les utilisateurs finaux et les fournisseurs de service. Ces attaques sont, en outre, élevées par une myriade des ressources infectées et comptent surtout sur les réseaux pour être contrôlées, se propager ou endommager. Face à ces risques, il y a un besoin essentiel qui se manifeste dans la réponse à ces nombreuses attaques par des stratégies de défense efficaces. Malgré les multitudes efforts dévouées pour mettre en œuvre des techniques de défense complètes afin de se protéger contre les attaques résea
APA, Harvard, Vancouver, ISO, and other styles
17

Fava, Daniel Schnetzer. "Characterization of cyber attacks through variable length Markov models /." Online version of thesis, 2007. http://hdl.handle.net/1850/4776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Argauer, Brian John. "VTAC : virtual terrain assisted impact assessment for cyber attacks /." Online version of thesis, 2007. http://hdl.handle.net/1850/4872.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Mao, Xinyue. "Visualization and Natural Language Representation of Simulated Cyber Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246090.

Full text
Abstract:
The attack path is an effective tool for showing possible hacking routestaken by an attacker to target a specific computer network. It also informsadministrators about potential weakness in a network helpingthem roll-out network configuration changes. Based on predefinedcomputing methods, a large number of attack paths can be generated.However, attack paths show all possible routes for each calculationand represent them with terminologies specific to the cybersecurityfield. A major portion of attack routes and representations aretoo complicated for normal users, making it difficult to identify
APA, Harvard, Vancouver, ISO, and other styles
20

Harshe, Omkar Anand. "Preemptive Detection of Cyber Attacks on Industrial Control Systems." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/54005.

Full text
Abstract:
Industrial Control Systems (ICSes), networked through conventional IT infrastructures, are vulnerable to attacks originating from network channels. Perimeter security techniques such as access control and firewalls have had limited success in mitigating such attacks due to the frequent updates required by standard computing platforms, third-party hardware and embedded process controllers. The high level of human-machine interaction also aids in circumventing perimeter defenses, making an ICS susceptible to attacks such as reprogramming of embedded controllers. The Stuxnet and Aurora attacks ha
APA, Harvard, Vancouver, ISO, and other styles
21

Lambert, Glenn M. II. "Security Analytics: Using Deep Learning to Detect Cyber Attacks." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/728.

Full text
Abstract:
Security attacks are becoming more prevalent as cyber attackers exploit system vulnerabilities for financial gain. The resulting loss of revenue and reputation can have deleterious effects on governments and businesses alike. Signature recognition and anomaly detection are the most common security detection techniques in use today. These techniques provide a strong defense. However, they fall short of detecting complicated or sophisticated attacks. Recent literature suggests using security analytics to differentiate between normal and malicious user activities. The goal of this research is to
APA, Harvard, Vancouver, ISO, and other styles
22

Saglam, Mehmet. "A Military Planning Methodology for Conducting Cyber Attacks on Power Grid." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/49435.

Full text
Abstract:
Power grids are regarded as significant military targets and have been targeted with kinetic attacks in previous military operations. These attacks resulted in significant levels of physical destruction, which, in the long-term, both undermined the success of the operations and caused severe adverse effects on the human terrain. Since power grids have grown as a result of introducing advanced technologies, they have also become more dependent upon cyberspace and are thus exposed to cyber attacks. Since cyber attacks have demonstrated the ability to creating physical/nonphysical effects with s
APA, Harvard, Vancouver, ISO, and other styles
23

Agarwal, Rahul. "Graph-Based Simulation for Cyber-Physical Attacks on Smart Buildings." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/103614.

Full text
Abstract:
As buildings evolve towards the envisioned smart building paradigm, smart buildings' cyber-security issues and physical security issues are mingling. Although research studies have been conducted to detect and prevent physical (or cyber) intrusions to smart building systems(SBS), it is still unknown (1) how one type of intrusion facilitates the other, and (2) how such synergic attacks compromise the security protection of whole systems. To investigate both research questions, the author proposes a graph-based testbed to simulate cyber-physical attacks on smart buildings. The testbed models bot
APA, Harvard, Vancouver, ISO, and other styles
24

Flamholz, David B. "Baiting for defense against stealthy attacks on cyber-physical systems." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/121858.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 63-64).<br>The goal of this thesis is to develop a defense methodology for a cyber-physical system (CPS) by which an attempted stealthy cyber-attack is detected in near real time. Improvements in networked communication have enabled vast and complex dynamic control systems to exploit networked control schemes to seamlessly integrate parts and processes. These cyber-physical systems exhibit a level of flexibility t
APA, Harvard, Vancouver, ISO, and other styles
25

Yaseen, Amer Atta. "Toward self-detection of cyber-physical attacks in control systems." Thesis, Lille 1, 2019. http://www.theses.fr/2019LIL1I040/document.

Full text
Abstract:
Un Système Contrôlé en Réseau (SCR en français, NCS (Networked Control System) en anglais) est un système de contrôle/commande distribué dans lequel les informations sont échangées en temps réel via un réseau reliant capteurs, actionneurs, contrôleurs, …) Ces SCR sont présents dans de nombreuses applications industrielles tels que les systèmes de production, les systèmes contrôlés à distance, les véhicules autonomes, la téléopération, …. Les principaux avantages de ces systèmes sont la flexibilité de leur architecture et la réduction des coûts d'installation et de maintenance, le principal inc
APA, Harvard, Vancouver, ISO, and other styles
26

Myers, David. "Detecting cyber attacks on industrial control systems using process mining." Thesis, Queensland University of Technology, 2019. https://eprints.qut.edu.au/130799/1/David_Myers_Thesis.pdf.

Full text
Abstract:
Industrial control systems conduct processes which are core to our lives, from the generation, transmission, and distribution of power, to the treatment and supply of water. These industrial control systems are moving from dedicated, serial-based communications to switched and routed corporate networks to facilitate the monitoring and management of an industrial processes. However, this connection to corporate networks can expose industrial control systems to the Internet, placing them at risk of cyber-attack. In this study, we develop and evaluate a process-mining based anomaly detection syst
APA, Harvard, Vancouver, ISO, and other styles
27

Nsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.

Full text
Abstract:
This study was carried out with the intention of examining the defensive mechanism employed against the latest cyber espionage methods including both insider and outsider attacks. The main focus of this study was on web servers as the targets of the cyber attacks. Information in connection to the study was obtained from researchers’ online articles. A survey was also conducted at MidSweden University in order to obtain information about the latest cyber attacks on web servers and about the existing defensive mechanism against such attacks. The existing defensive mechanism was surveyed and a si
APA, Harvard, Vancouver, ISO, and other styles
28

Cheng, Long. "Program Anomaly Detection Against Data-Oriented Attacks." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/84937.

Full text
Abstract:
Memory-corruption vulnerability is one of the most common attack vectors used to compromise computer systems. Such vulnerabilities could lead to serious security problems and would remain an unsolved problem for a long time. Existing memory corruption attacks can be broadly classified into two categories: i) control-flow attacks and ii) data-oriented attacks. Though data-oriented attacks are known for a long time, the threats have not been adequately addressed due to the fact that most previous defense mechanisms focus on preventing control-flow exploits. As launching a control-flow attack bec
APA, Harvard, Vancouver, ISO, and other styles
29

Puttaroo, Mohammad Ally Rehaz. "A behavioural study in runtime analysis environments and drive-by download attacks." Thesis, University of West London, 2017. https://repository.uwl.ac.uk/id/eprint/4751/.

Full text
Abstract:
In the information age, the growth in availability of both technology and exploit kits have continuously contributed in a large volume of websites being compromised or set up with malicious intent. The issue of drive-by-download attacks formulate a high percentage (77%) of the known attacks against client systems. These attacks originate from malicious web-servers or compromised web-servers and attack client systems by pushing malware upon interaction. Within the detection and intelligence gathering area of research, high-interaction honeypot approaches have been a longstanding and well-establ
APA, Harvard, Vancouver, ISO, and other styles
30

Do, Van Long. "Sequential detection and isolation of cyber-physical attacks on SCADA systems." Thesis, Troyes, 2015. http://www.theses.fr/2015TROY0032/document.

Full text
Abstract:
Cette thèse s’inscrit dans le cadre du projet « SCALA » financé par l’ANR à travers le programme ANR-11-SECU-0005. Son objectif consiste à surveiller des systèmes de contrôle et d’acquisition de données (SCADA) contre des attaques cyber-physiques. Il s'agit de résoudre un problème de détection-localisation séquentielle de signaux transitoires dans des systèmes stochastiques et dynamiques en présence d'états inconnus et de bruits aléatoires. La solution proposée s'appuie sur une approche par redondance analytique composée de deux étapes : la génération de résidus, puis leur évaluation. Les rési
APA, Harvard, Vancouver, ISO, and other styles
31

Radziwill-Širjajev, Yaroslav. "Cyber-attacks and international law : imperfections of a stagnant legal regime." Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/62716/.

Full text
Abstract:
States are on the brink of entering an age of total cyber-warfare without due regard to its legal ramifications. In particular, there has been no express agreement on which principles of international law are applicable, which legal methods should be used in approaching cyber-attacks, which previous state practice (if any) is relevant, what institutions are responsible for handling this threat and how they are going to coordinate action amongst each other. While members of the Shanghai Cooperation Organization (led by the Russian Federation) have repeatedly suggested developing and agreeing up
APA, Harvard, Vancouver, ISO, and other styles
32

Nicholson, Andrew. "Wide spectrum attribution : using deception for attribution intelligence in cyber attacks." Thesis, De Montfort University, 2015. http://hdl.handle.net/2086/11418.

Full text
Abstract:
Modern cyber attacks have evolved considerably. The skill level required to conduct a cyber attack is low. Computing power is cheap, targets are diverse and plentiful. Point-and-click crimeware kits are widely circulated in the underground economy, while source code for sophisticated malware such as Stuxnet is available for all to download and repurpose. Despite decades of research into defensive techniques, such as firewalls, intrusion detection systems, anti-virus, code auditing, etc, the quantity of successful cyber attacks continues to increase, as does the number of vulnerabilities identi
APA, Harvard, Vancouver, ISO, and other styles
33

Katsikeas, Sotirios. "vehicleLang: a probabilistic modeling and simulation language for vehicular cyber attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-232182.

Full text
Abstract:
The technological advancements in the automotive industry as well as in thefield of communication technologies done the last years have transformed thevehicles to complex machines that include not only electrical and mechanicalcomponents but also a great number of electronic components. Furthermore,modern vehicles are now connected to the Wide Area Network (WAN) and inthe near future communications will also be present between the cars (Vehicleto-Vehicle, V2V) and between cars and infrastructure (Vehicle-to-Infrastructure, V2I), something that can be found as Internet of Vehicles (IoV)in the l
APA, Harvard, Vancouver, ISO, and other styles
34

Liu, Jessamyn. "Anomaly detection methods for detecting cyber attacks in industrial control systems." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/129055.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Sloan School of Management, Operations Research Center, September, 2020<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 119-123).<br>Industrial control systems (ICS) are pervasive in modern society and increasingly under threat of cyber attack. Due to the critical nature of these systems, which govern everything from power and wastewater plants to refineries and manufacturing, a successful ICS cyber attack can result in serious physical consequences. This thesis evaluates multiple anomaly detection meth
APA, Harvard, Vancouver, ISO, and other styles
35

Dayanikli, Gokcen Yilmaz. "Electromagnetic Interference Attacks on Cyber-Physical Systems: Theory, Demonstration, and Defense." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/104862.

Full text
Abstract:
A cyber-physical system (CPS) is a complex integration of hardware and software components to perform well-defined tasks. Up to this point, many software-based attacks targeting the network and computation layers have been reported by the researchers. However, the physical layer attacks that utilize natural phenomena (e.g., electromagnetic waves) to manipulate safety-critic signals such as analog sensor outputs, digital data, and actuation signals have recently taken the attention. The purpose of this dissertation is to detect the weaknesses of cyber-physical systems against low-power Intentio
APA, Harvard, Vancouver, ISO, and other styles
36

Mousavinejad, Seyed Eman. "Cyber-Physical Attack Detection for Networked Control Systems." Thesis, Griffith University, 2020. http://hdl.handle.net/10072/395098.

Full text
Abstract:
Until 1960s, control systems consisted mainly of mechanical or analog electronic devices exchanging information among system components, i.e., sensors, controllers, and actuators, via wired communication. However, recent advancement in computer and communication industries have led to the growing use of Internet, embedded systems, wireless and digital communication technologies in many industrial control systems and transformed them into Networked Control Systems (NCSs). A defining feature of an NCS is that it consists of a number of devices implemented distributively so that system informatio
APA, Harvard, Vancouver, ISO, and other styles
37

Alhomoud, Adeeb M. "A self-healing framework to combat cyber attacks : analysis and development of a self-healing mitigation framework against controlled malware attacks for enterprise networks." Thesis, University of Bradford, 2014. http://hdl.handle.net/10454/7331.

Full text
Abstract:
Cybercrime costs a total loss of about $338 billion annually which makes it one of the most profitable criminal activities in the world. Controlled malware (Botnet) is one of the most prominent tools used by cybercriminals to infect, compromise computer networks and steal important information. Infecting a computer is relatively easy nowadays with malware that propagates through social networking in addition to the traditional methods like SPAM messages and email attachments. In fact, more than 1/4 of all computers in the world are infected by malware which makes them viable for botnet use. Th
APA, Harvard, Vancouver, ISO, and other styles
38

Mossberg, Sofia. "Self-Defence Against Non-State Cyber Attacks : The Attribution Problem in Cyberspace." Thesis, Uppsala universitet, Juridiska institutionen, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-411823.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Aiello, Brady Benjamin. "Analyzing Global Cyber Attack Correlates Through an Open Database." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1898.

Full text
Abstract:
As humanity becomes more reliant on digital storage and communication for every aspect of life, cyber attacks pose a growing threat. However, cyber attacks are generally understood as individual incidents reported in technological circles, sometimes tied to a particular vulnerability. They are not generally understood through the macroscopic lens of statistical analysis spanning years over several countries and sectors, leaving researchers largely ignorant of the larger trends and correlates between attacks. This is large part due to the lack of a coherent and open database of prominent attack
APA, Harvard, Vancouver, ISO, and other styles
40

Oseku-Afful, Thomas. "The use of Big Data Analytics to protect Critical Information Infrastructures from Cyber-attacks." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-59779.

Full text
Abstract:
Unfortunately, cyber-attacks, which are the consequence of our increasing dependence on digital technology, is a phenomenon that we have to live with today. As technology becomes more advanced and complex, so have the types of malware that are used in these cyber-attacks. Currently, targeted cyber-attacks directed at CIIs such as financial institutions and telecom companies are on the rise. A particular group of malware known as APTs, which are used for targeted attacks, are very difficult to detect and prevent due to their sophisticated and stealthy nature. These malwares are able to attack a
APA, Harvard, Vancouver, ISO, and other styles
41

Wardle, Madelyn. "Offensive Cyber Operations: An Examination of Their Revolutionary Capabilities." Wright State University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=wright1620995515559657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Graziano, Timothy Michael. "Establishment of a Cyber-Physical Systems (CPS) Test Bed to Explore Traffic Collision Avoidance System (TCAS) Vulnerabilities to Cyber Attacks." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104624.

Full text
Abstract:
Traffic Collision Avoidance Systems (TCAS) are safety-critical, unauthenticated, ranging systems required in commercial aircraft. Previous work has proposed TCAS vulnerabilities to attacks from malicious actors with low cost software defined radios (SDR) and inexpensive open-source software (GNU radio) where spoofing TCAS radio signals in now possible. This paper outlines a proposed threat model for several TCAS vulnerabilities from an adversarial perspective. Periodic and aperiodic attack models are explored as possible low latency solutions to spoof TCAS range estimation. A TCAS test bed is
APA, Harvard, Vancouver, ISO, and other styles
43

Haataja, Samuli. "Cyber Attacks and International Law on the Use of Force: an Informational Approach." Thesis, Griffith University, 2017. http://hdl.handle.net/10072/365740.

Full text
Abstract:
This thesis examines the intersection of law and technology in the context of cyber attacks and international law on the use of force. It is argued that the law embodies an ontologically constrained view of violence which limits its capacity to regulate cyber attacks. As a means of overcoming these constraints, this thesis draws on Luciano Floridi’s information ethics to develop an informational approach. This involves depicting the state as an information entity and reconceptualising violence through the concept of entropy. Therefore, by updating the law with an informational ontology, it is
APA, Harvard, Vancouver, ISO, and other styles
44

Johansson, Jonatan. "COUNTERMEASURES AGAINST COORDINATED CYBER-ATTACKS TOWARDS POWER GRID SYSTEMS : A systematic literature study." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17715.

Full text
Abstract:
A study on countermeasures against coordinated cyber-attacks (CCA) towards power grid systems has been carried out. A coordinated cyber-attack is a cyber-based attack where multiple attackers use multiple attack-mechanisms towards multiple targets in a coordinated fashion. The coordination is based on that the different attack-mechanisms help each other in attacking the target. A CCA is made up of different stages where each stage consists of a number of attack-mechanisms and together have a certain purpose. The different stages are used to systematically advance towards its goal, which is to
APA, Harvard, Vancouver, ISO, and other styles
45

Holm, Linnéa. "Cyber attacks & coercion in the digital era. : A qualitative case analysis of the North Korean cyber attack on Sony Pictures." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-323583.

Full text
Abstract:
The 2014 cyber attack on Sony Pictures Entertainment is an example of a disruptive event where a nation state utilized cyber tools in order to coerce a target into changing their course of action. Cyber attacks, something that might be perceived as a looming futuristic threat, became reality for Sony and its employees under the course of a few months in late 2014. The coercer’s attempt to change the behavior of the company eventually failed and North Korea who was attributed as coercer was imposed with new sanctions. This paper takes on the task of evaluating the Sony case against both the tra
APA, Harvard, Vancouver, ISO, and other styles
46

Vuković, Ognjen, and György Dán. "On the Security of Distributed Power System State Estimation under Targeted Attacks." KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-122442.

Full text
Abstract:
State estimation plays an essential role in the monitoring and control of power transmission systems. In modern, highly inter-connected power systems the state estimation should be performed in a distributed fashion and requires information exchange between the control centers of directly connected systems. Motivated by recent reportson trojans targeting industrial control systems, in this paper we investigate how a single compromised control center can affect the outcome of distributed state estimation. We describe five attack strategies, and evaluate their impact on the IEEE 118 benchmark po
APA, Harvard, Vancouver, ISO, and other styles
47

Rodofile, Nicholas R. "Generating attacks and labelling attack datasets for industrial control intrusion detection systems." Thesis, Queensland University of Technology, 2018. https://eprints.qut.edu.au/121760/1/Nicholas_Rodofile_Thesis.pdf.

Full text
Abstract:
To address the arising Cyber Security threats against SCADA-based Critical infrastructure, the security research community have identified the application of Intrusion Detection and IA as an ideal security measure for such systems. The research presents a cyber-attack classification for critical infrastructure, to identify the cyber-attack landscape for critical infrastructure attacks. To further aid in the development and evaluation of AI using intrusion detection, the thesis presents a SCADA cyber-attack generation framework. The cyber-attack generation framework provides a collection of alg
APA, Harvard, Vancouver, ISO, and other styles
48

Rafighdoust, Hamed. "The right of self-defence against cyber attacks by states and non-state actors." Doctoral thesis, Universitat Autònoma de Barcelona, 2018. http://hdl.handle.net/10803/666857.

Full text
Abstract:
Actualment, l’evolució tecnològica, particularment en el camp del espai cibernètic, ha donat lloc a reptes seriosos per la seguretat dels Estats. Ocasionalment, els atacs cibernètics tenen els mateixos efectes destructius que les armes militars. Donada la manca d’acords entre Estats per tal de constituir noves normes sobre el ciberespai, la comunitat internacional ha provat de fer front als atacs cibernètics mitjançant l’aplicació per analogia del Dret Internacional existent. En el primer capítol, el nostre estudi inicia amb una aproximació històrica al principi de la prohibició de l’ús de la
APA, Harvard, Vancouver, ISO, and other styles
49

Duessel, Patrick [Verfasser]. "Detection of unknown cyber attacks using convolution kernels over attributed language models / Patrick Duessel." Bonn : Universitäts- und Landesbibliothek Bonn, 2018. http://d-nb.info/1162953187/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Jolley, Jason. "Attribution, state responsibility, and the duty to prevent malicious cyber-attacks in international law." Thesis, University of Glasgow, 2017. http://theses.gla.ac.uk/8452/.

Full text
Abstract:
Malicious cyber-attacks, those cyber-attacks which do not rise to the level of force in international law, pose a significant problem to the international community. Attributing responsibility for malicious cyber-attacks is imperative if states are to respond and prevent the attacks from continuing. Unfortunately, due to both technical and legal issues attributing malicious cyber-attacks to the responsible state or non-state actor is difficult if not impossible in the vast majority of attacks. Even if an injured state may recursively trace the malicious cyber-attack to the responsible IP addre
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!