To see the other types of publications on this topic, follow the link: Malicious attacks.

Dissertations / Theses on the topic 'Malicious attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Malicious attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Opie, Jake Weyman. "Securing softswitches from malicious attacks." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1007714.

Full text
Abstract:
Traditionally, real-time communication, such as voice calls, has run on separate, closed networks. Of all the limitations that these networks had, the ability of malicious attacks to cripple communication was not a crucial one. This situation has changed radically now that real-time communication and data have merged to share the same network. The objective of this project is to investigate the securing of softswitches with functionality similar to Private Branch Exchanges (PBX) from malicious attacks. The focus of the project will be a practical investigation of how to secure ILANGA, an ASTER
APA, Harvard, Vancouver, ISO, and other styles
2

Abu-Bakar, Kamalrulnizam. "Protecting agents against malicious host attacks." Thesis, Aston University, 2004. http://publications.aston.ac.uk/10612/.

Full text
Abstract:
The introduction of agent technology raises several security issues that are beyond conventional security mechanisms capability and considerations, but research in protecting the agent from malicious host attack is evolving. This research proposes two approaches to protecting an agent from being attacked by a malicious host. The first approach consists of an obfuscation algorithm that is able to protect the confidentiality of an agent and make it more difficult for a malicious host to spy on the agent. The algorithm uses multiple polynomial functions with multiple random inputs to convert an a
APA, Harvard, Vancouver, ISO, and other styles
3

Fischer, Benjamin. "Vehicular Group Membership Resilient to Malicious Attacks." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158086.

Full text
Abstract:
There is a range of tools and techniques in the realm of information security that can be used to enhance the security of a distributed network protocol and some of them introduce new problems. A security analysis of the distributed network protocol SLMP is made and three vulnerabilities are identified; messages can be intercepted and tampered with, nodes can fake id, and leader nodes can do a lot of harm if they are malicious. Three versions of SLMP that aims to remedy these vulnerabilities are implemented and the results show that while they remedy the vulnerabilities some of them introduce
APA, Harvard, Vancouver, ISO, and other styles
4

Casile, Roberta <1986&gt. "GNSS interference management techniques against malicious attacks." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/7025/1/Casile_Roberta_tesi.pdf.

Full text
Abstract:
This thesis collects the outcomes of a Ph.D. course in Telecommunications Engineering and it is focused on the study and design of possible techniques able to counteract interference signal in Global Navigation Satellite System (GNSS) systems. The subject is the jamming threat in navigation systems, that has become a very increasingly important topic in recent years, due to the wide diffusion of GNSS-based civil applications. Detection and mitigation techniques are developed in order to fight out jamming signals, tested in different scenarios and including sophisticated signals. The thesis i
APA, Harvard, Vancouver, ISO, and other styles
5

Casile, Roberta <1986&gt. "GNSS interference management techniques against malicious attacks." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/7025/.

Full text
Abstract:
This thesis collects the outcomes of a Ph.D. course in Telecommunications Engineering and it is focused on the study and design of possible techniques able to counteract interference signal in Global Navigation Satellite System (GNSS) systems. The subject is the jamming threat in navigation systems, that has become a very increasingly important topic in recent years, due to the wide diffusion of GNSS-based civil applications. Detection and mitigation techniques are developed in order to fight out jamming signals, tested in different scenarios and including sophisticated signals. The thesis i
APA, Harvard, Vancouver, ISO, and other styles
6

Sivakumaran, Arun. "Malicious user attacks in decentralised cognitive radio networks." Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/79657.

Full text
Abstract:
Cognitive radio networks (CRNs) have emerged as a solution for the looming spectrum crunch caused by the rapid adoption of wireless devices over the previous decade. This technology enables efficient spectrum utility by dynamically reusing existing spectral bands. A CRN achieves this by requiring its users – called secondary users (SUs) – to measure and opportunistically utilise the band of a legacy broadcaster – called a primary user (PU) – in a process called spectrum sensing. Sensing requires the distribution and fusion of measurements from all SUs, which is facilitated by a variety of arch
APA, Harvard, Vancouver, ISO, and other styles
7

Mahlburg, Karl. "Structure Attacks in Cryptographic Protocols." Scholarship @ Claremont, 2001. https://scholarship.claremont.edu/hmc_theses/130.

Full text
Abstract:
Cryptographic protocols are in general difficult to analyze, and complicated attacks exposing security flaws have remained hidden years after a protocol is developed. Recently developed tools such as strand spaces and inductive logical proofs provide mechanical procedures for analyzing protocols. The key to these methods is that a generous upper bound on the activity of a malicious penetrator is often much easier to work with than a tighter bound. However, these formalizations make strong assumptions about the algebraic structure of the cryptosystem that are never met in a real application. In
APA, Harvard, Vancouver, ISO, and other styles
8

Narasimhan, Mayur Harn Lein. "Protecting a mobile agent from colluded truncation attacks by malicious hosts." Diss., UMK access, 2007.

Find full text
Abstract:
Thesis (M.S.)--School of Computing and Engineering. University of Missouri--Kansas City, 2007.<br>"A thesis in computer science." Typescript. Advisor: Lein Harn. Vita. Title from "catalog record" of the print edition Description based on contents viewed May 23, 2008. Includes bibliographical references (leaves 57-58). Online version of the print edition.
APA, Harvard, Vancouver, ISO, and other styles
9

Jolley, Jason. "Attribution, state responsibility, and the duty to prevent malicious cyber-attacks in international law." Thesis, University of Glasgow, 2017. http://theses.gla.ac.uk/8452/.

Full text
Abstract:
Malicious cyber-attacks, those cyber-attacks which do not rise to the level of force in international law, pose a significant problem to the international community. Attributing responsibility for malicious cyber-attacks is imperative if states are to respond and prevent the attacks from continuing. Unfortunately, due to both technical and legal issues attributing malicious cyber-attacks to the responsible state or non-state actor is difficult if not impossible in the vast majority of attacks. Even if an injured state may recursively trace the malicious cyber-attack to the responsible IP addre
APA, Harvard, Vancouver, ISO, and other styles
10

Likarish, Peter F. "Early detection of malicious web content with applied machine learning." Diss., University of Iowa, 2011. https://ir.uiowa.edu/etd/4871.

Full text
Abstract:
This thesis explores the use of applied machine learning techniques to augment traditional methods of identifying and preventing web-based attacks. Several factors complicate the identification of web-based attacks. The first is the scale of the web. The amount of data on the web and the heterogeneous nature of this data complicate efforts to distinguish between benign sites and attack sites. Second, an attacker may duplicate their attack at multiple, unexpected locations (multiple URLs spread across different domains) wit
APA, Harvard, Vancouver, ISO, and other styles
11

Srivastava, Abhinav. "Robust and secure monitoring and attribution of malicious behaviors." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41161.

Full text
Abstract:
Worldwide computer systems continue to execute malicious software that degrades the systemsâ performance and consumes network capacity by generating high volumes of unwanted traffic. Network-based detectors can effectively identify machines participating in the ongoing attacks by monitoring the traffic to and from the systems. But, network detection alone is not enough; it does not improve the operation of the Internet or the health of other machines connected to the network. We must identify malicious code running on infected systems, participating in global attack networks. This dissertat
APA, Harvard, Vancouver, ISO, and other styles
12

Kambhampaty, Krishna Kanth. "Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices." Diss., North Dakota State University, 2019. https://hdl.handle.net/10365/29914.

Full text
Abstract:
There are a variety of communication mediums or devices for interaction. Users hop from one medium to another frequently. Though the increase in the number of devices brings convenience, it also raises security concerns. Provision of platform to users is as much important as its security. In this dissertation we propose a security approach that captures user behavior for identifying malicious activities. System users exhibit certain behavioral patterns while utilizing the resources. User behaviors such as device location, accessing certain files in a server, using a designated or specific use
APA, Harvard, Vancouver, ISO, and other styles
13

Khraisat, Ansam. "Intelligent zero-day intrusion detection framework for internet of things." Thesis, Federation University Australia, 2020. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/179729.

Full text
Abstract:
Zero-day intrusion detection system faces serious challenges as hundreds of thousands of new instances of malware are being created every day to cause harm or damage to the computer system. Cyber-attacks are becoming more sophisticated, leading to challenges in intrusion detection. There are many Intrusion Detection Systems (IDSs), which are proposed to identify abnormal activities, but most of these IDSs produce a large number of false positives and low detection accuracy. Hence, a significant quantity of false positives could generate a high-level of alerts in a short period of time as the n
APA, Harvard, Vancouver, ISO, and other styles
14

Alberdi, Ion. "Malicious trafic observation using a framework to parallelize and compose midpoint inspection devices." Thesis, Toulouse, INSA, 2010. http://www.theses.fr/2010ISAT0008/document.

Full text
Abstract:
Notre thèse stipule qu'au vu de l'ampleur des agissements malveillants dans l'Internet, les logiciels d'extrémité doivent être surveillés. Pour limiter le nombre de points de surveillance, nous proposons de surveiller les logiciels depuis un point d'interconnexion. Nous avons dans ce but conçu Luth, un outil permettant de composer et de paralléliser un ensemble d'inspecteurs de points d'interconnexion (appelés MI) qui implémentent des mini IDS, IPS ou pare-feux, tout en vérifiant la correction et l'optimalité de ces derniers, à l'aide d'un langage de configuration et des algorithmes associés.
APA, Harvard, Vancouver, ISO, and other styles
15

Alberdi, Ion. "Malicious trafic observation using a framework to parallelize and compose midpoint inspection devices." Electronic Thesis or Diss., Toulouse, INSA, 2010. http://www.theses.fr/2010ISAT0008.

Full text
Abstract:
Notre thèse stipule qu'au vu de l'ampleur des agissements malveillants dans l'Internet, les logiciels d'extrémité doivent être surveillés. Pour limiter le nombre de points de surveillance, nous proposons de surveiller les logiciels depuis un point d'interconnexion. Nous avons dans ce but conçu Luth, un outil permettant de composer et de paralléliser un ensemble d'inspecteurs de points d'interconnexion (appelés MI) qui implémentent des mini IDS, IPS ou pare-feux, tout en vérifiant la correction et l'optimalité de ces derniers, à l'aide d'un langage de configuration et des algorithmes associés.
APA, Harvard, Vancouver, ISO, and other styles
16

Leithead, Travis S. "Challenging Policies That Do Not Play Fair: A Credential Relevancy Framework Using Trust Negotiation Ontologies." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd1007.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Canali, Davide. "Plusieurs axes d'analyse de sites web compromis et malicieux." Thesis, Paris, ENST, 2014. http://www.theses.fr/2014ENST0009/document.

Full text
Abstract:
L'incroyable développement du World Wide Web a permis la création de nouveaux métiers, services, ainsi que de nouveaux moyens de partage de connaissance. Le web attire aussi des malfaiteurs, qui le considèrent comme un moyen pour gagner de l'argent en exploitant les services et la propriété d'autrui. Cette thèse propose une étude des sites web compromis et malicieux sous plusieurs axes d'analyse. Même si les attaques web peuvent être de nature très compliquées, on peut quasiment toujours identifier quatre acteurs principaux dans chaque cas. Ceux sont les attaquants, les sites vulnérables héber
APA, Harvard, Vancouver, ISO, and other styles
18

Canali, Davide. "Plusieurs axes d'analyse de sites web compromis et malicieux." Electronic Thesis or Diss., Paris, ENST, 2014. http://www.theses.fr/2014ENST0009.

Full text
Abstract:
L'incroyable développement du World Wide Web a permis la création de nouveaux métiers, services, ainsi que de nouveaux moyens de partage de connaissance. Le web attire aussi des malfaiteurs, qui le considèrent comme un moyen pour gagner de l'argent en exploitant les services et la propriété d'autrui. Cette thèse propose une étude des sites web compromis et malicieux sous plusieurs axes d'analyse. Même si les attaques web peuvent être de nature très compliquées, on peut quasiment toujours identifier quatre acteurs principaux dans chaque cas. Ceux sont les attaquants, les sites vulnérables héber
APA, Harvard, Vancouver, ISO, and other styles
19

Andersson, Stig. "Detecting and characterising malicious executable payloads." Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/30325/1/Stig_Andersson_Thesis.pdf.

Full text
Abstract:
Buffer overflow vulnerabilities continue to prevail and the sophistication of attacks targeting these vulnerabilities is continuously increasing. As a successful attack of this type has the potential to completely compromise the integrity of the targeted host, early detection is vital. This thesis examines generic approaches for detecting executable payload attacks, without prior knowledge of the implementation of the attack, in such a way that new and previously unseen attacks are detectable. Executable payloads are analysed in detail for attacks targeting the Linux and Windows operating syst
APA, Harvard, Vancouver, ISO, and other styles
20

Andersson, Stig. "Detecting and characterising malicious executable payloads." Queensland University of Technology, 2009. http://eprints.qut.edu.au/30325/.

Full text
Abstract:
Buffer overflow vulnerabilities continue to prevail and the sophistication of attacks targeting these vulnerabilities is continuously increasing. As a successful attack of this type has the potential to completely compromise the integrity of the targeted host, early detection is vital. This thesis examines generic approaches for detecting executable payload attacks, without prior knowledge of the implementation of the attack, in such a way that new and previously unseen attacks are detectable. Executable payloads are analysed in detail for attacks targeting the Linux and Windows operating syst
APA, Harvard, Vancouver, ISO, and other styles
21

Prathapani, Anoosha. "Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1289939348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Yu, Yue. "Resilience Strategies for Network Challenge Detection, Identification and Remediation." Thesis, The University of Sydney, 2013. http://hdl.handle.net/2123/10277.

Full text
Abstract:
The enormous growth of the Internet and its use in everyday life make it an attractive target for malicious users. As the network becomes more complex and sophisticated it becomes more vulnerable to attack. There is a pressing need for the future internet to be resilient, manageable and secure. Our research is on distributed challenge detection and is part of the EU Resumenet Project (Resilience and Survivability for Future Networking: Framework, Mechanisms and Experimental Evaluation). It aims to make networks more resilient to a wide range of challenges including malicious attacks, misconfig
APA, Harvard, Vancouver, ISO, and other styles
23

Sung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.

Full text
Abstract:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2007.<br>Xu, Jun, Committee Chair ; Ahamad, Mustaque, Committee Member ; Ammar, Mostafa, Committee Member ; Bing, Benny, Committee Member ; Zegura, Ellen, Committee Member.
APA, Harvard, Vancouver, ISO, and other styles
24

Langer, André, and Tom Kühnert. "Security issues in Address Autoconfiguration Protocols." Universitätsbibliothek Chemnitz, 2007. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200700491.

Full text
Abstract:
Dynamic address assignment is one of the most important features in wireless ad hoc networks if nodes should be enabled to join and to work in the network by automatically configuring all necessary settings. Different approaches have been developed throughout the last years to achieve this objective of Dynamic Address Autoconfiguration but research primarily focused on efficiency and correctness, less on security issues. Whereas Duplicate Address Detection has become reliable in commonplace scenarios, it is still relatively easy to suspend the whole network functionality in extraordinary situa
APA, Harvard, Vancouver, ISO, and other styles
25

FAVALE, THOMAS. "Strengthening Privacy and Cybersecurity through Anonymization and Big Data." Doctoral thesis, Politecnico di Torino, 2023. https://hdl.handle.net/11583/2975701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

KALLAS, KASSEM. "A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks." Doctoral thesis, Università di Siena, 2017. http://hdl.handle.net/11365/1005735.

Full text
Abstract:
Every day we share our personal information through digital systems which are constantly exposed to threats. For this reason, security-oriented disciplines of signal processing have received increasing attention in the last decades: multimedia forensics, digital watermarking, biometrics, network monitoring, steganography and steganalysis are just a few examples. Even though each of these fields has its own peculiarities, they all have to deal with a common problem: the presence of one or more adversaries aiming at making the system fail. Adversarial Signal Processing lays the basis of a genera
APA, Harvard, Vancouver, ISO, and other styles
27

Chang, Chung-Cheng, and 張仲丞. "Withstanding Malicious RREQ Packets Flooding Attacks in MANET." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/06901169012462375417.

Full text
Abstract:
碩士<br>國立清華大學<br>資訊工程學系<br>95<br>Mobile ad hoc network (MANET) is a group of mobile wireless nodes that communicate with each other without the aid of the infrastructure such as base station. It has been used in many applications, for example, military application, personal electronic device, ad hoc meeting, etc. Because of the shortcoming of the routing protocol, MANET is vulnerable to some kinds of attacks. Black hole attack, gray hole attack, wormhole attack, traffic analysis attack, and rushing attack are common attacks in ad hoc network. In this thesis, we introduce a critical attack in MA
APA, Harvard, Vancouver, ISO, and other styles
28

Chien-Hung, Chen. "Maximization of Network Survivability against Intelligent and Malicious Attacks." 2005. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-1707200615234200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Tsai, Jen-Sheng, and 蔡仁勝. "Feature-Based Multipurpose Image Watermarking Resistant against Malicious Attacks." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/33484253343750229545.

Full text
Abstract:
碩士<br>國立成功大學<br>資訊工程學系碩博士班<br>94<br>In this thesis, a feature-based multipurpose image watermarking algorithm is proposed to achieve the goal of image authentication and protection simultaneously. Copyright protection and ownership verification are usually performed by robust watermarks, and fragile watermarks are mainly applied to content authentication and integrity attestation. The proposed watermarking algorithm uses the Hessian-Affine feature detector to extract the characteristic regions of an image. Then the proposed robust embedded scheme exploits the local orientation of each pixel to
APA, Harvard, Vancouver, ISO, and other styles
30

Chen, Chien-Hung, and 陳建宏. "Maximization of Network Survivability against Intelligent and Malicious Attacks." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/00281366107324361645.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>94<br>Since the 911 terrorist attacks in the United States, how to protect critical information infrastructures effectively has become an even more important topic. One critical information infrastructure, the Internet, has drawn increasing attention from network security experts because of the growing number of malicious attacks on it. However, experience tells us that, in both theory and practice, a system cannot be 100% secured. Therefore, we should not ask “Is the system secure?” but “How secure is the system?” A quantitative “survivability” concept has become a
APA, Harvard, Vancouver, ISO, and other styles
31

Ramasamy, Harigovind Venkatraj. "Parsimonious service replication for tolerating malicious attacks in asynchronous environments /." 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3223699.

Full text
Abstract:
Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2006.<br>Source: Dissertation Abstracts International, Volume: 67-07, Section: B, page: 3913. Adviser: William H. Sanders. Includes bibliographical references (leaves 189-193) Available on microfilm from Pro Quest Information and Learning.
APA, Harvard, Vancouver, ISO, and other styles
32

Chen, Chun-Wei, and 陳俊維. "Maximization of Network Survival Time upon Intelligent and Malicious Attacks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/54993919407182351736.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>95<br>No information system in a network is absolutely secure. Sophisticated attackers may adopt various types of hacking techniques, such as staff abuses, system vulnerabilities, dictionary attacks, or brute force attacks, to penetrate and damage the system. Therefore, it is essential that effective defense strategies be devised by network administrators to maximize the survival time of critical/core components in networks upon attacks so as to achieve the longest response time. In this thesis, the problem of maximization of the core node survival time upon in
APA, Harvard, Vancouver, ISO, and other styles
33

Chen, Chun-Wei. "Maximization of Network Survival Time upon Intelligent and Malicious Attacks." 2007. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2507200700194900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Lin, Cheng-Hsu, and 林承旭. "Populating Malicious Flow Entries Against SDN Operations: Attacks and Countermeasures." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/ss887w.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊科學與工程研究所<br>105<br>Software-defined networking (SDN) is a new networking paradigm that enables programmatic control over the network at a centralized controller. The controller offers APIs to allow SDN applications (SDN-Apps) to take care of control-plane functions (e.g., traffic engineering, routing, load balancing, security, etc.). However, some SDN-Apps may be malicious, since benign ones might be compromised or they were developed by untrusted third parties. Though there have been many solutions proposed to block malicious SDN-Apps, all of them did not consider that malic
APA, Harvard, Vancouver, ISO, and other styles
35

Lin, hsin-hung, and 林信宏. "A Robust Gray-level Image Watermarking Scheme Against Malicious/Unwitting Attacks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/39953727486820295707.

Full text
Abstract:
碩士<br>國立暨南國際大學<br>資訊工程學系<br>95<br>Digital watermarking technologies have been developed for many years as a means for copyright protection of multimedia data. Most of those technologies can be divided into two main categories: spatial domain and frequency domain. Recently, a few new watermarking techniques were proposed based on the adjutant data which is produced directly from the feature of the copyrighted image and kept privately by the image owner. Because such methods do not modify the original image, those techniques are very easy be counterfeited. Traditional digital watermarking te
APA, Harvard, Vancouver, ISO, and other styles
36

Pan, Jia-ling, and 潘佳伶. "Effective Network Planning and Defending Strategies to Minimize Attackers’ Success Probabilities under Malicious and Epidemic Attacks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/66477210972395804144.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>99<br>Due to the Internet’s scalability and connectivity, enterprises and organizations increasingly rely upon the Internet to provide services and to engage in electronic commerce. On the other hand, attackers intelligently attack enterprises and organizations though continuous vulnerability exploitation and advanced attack strategies to achieve the goals of service interruption and/or theft of confidential information. Recently, many attackers apply the characteristics of fast propagation and infection of epidemic attacks to plan more deliberate strategies by usin
APA, Harvard, Vancouver, ISO, and other styles
37

Lee, Yu-Hsuan, and 李昱璇. "Droidivision : Vulnerability Analysis of Multiple Layer Collusion Attacks Using Malicious Intent Simulation." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/r5w7jw.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>資訊工程系<br>103<br>Among the various smartphone operating systems, Android becomes more and more popular in the mobile operating system. With highly popularity of Android users, there are over 50 billion downloaded apps and the Android platforms have generated high benefit, which has attracted cyber criminals and increased malware in Android platforms at an alarming rate. Android malware samples are even over 650,000. Although Android security mechanism is based on permission model, the applications, improperly use inter-component communication (ICC) which lead to privilege esca
APA, Harvard, Vancouver, ISO, and other styles
38

Shen, Chi-En, and 沈祈恩. "A Flexible Framework for Malicious Open XML Document Detection against APT Attacks." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/55150067458488796714.

Full text
Abstract:
碩士<br>國立清華大學<br>資訊系統與應用研究所<br>102<br>The defense against Advanced Persistence Threat (APT) attacks is a hot issue in recent years. Many organizations and enterprises even governments have been victims of APT attacks. Since APT attacks have a specific objective and are skillfully crafted, motivated, organized and well founded, they should not be ignored. Malicious documents have always been used with the spear phishing attack in the initial infection phase of an APT attack. The detection of malicious documents is important for an early stage defensive APT attack. In recent years, Open XML has
APA, Harvard, Vancouver, ISO, and other styles
39

Chang, Yao-Yuan, and 張耀元. "Network Defense and Recovery Strategies for Maximization of Network Survivability under Malicious Attacks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/88861509387291225501.

Full text
Abstract:
碩士<br>臺灣大學<br>資訊管理學研究所<br>98<br>Because of the rapid advancement of computer and telecommunication technologies in recent years, smaller, less expensive and high performance devices are available for companies and individuals, which accelerate the growth of the Internet and make available to users a variety of new network applications/services. However, our dependency on the Internet has made the PCs and servers connected to the network more vulnerable to attacks, causing great losses to enterprises and individuals. Moreover, an increasing number of new threats, evolution of attack tactics and
APA, Harvard, Vancouver, ISO, and other styles
40

"Hitch-hiking attacks in online social networks and their defense via malicious URL classification." 2012. http://library.cuhk.edu.hk/record=b5549120.

Full text
Abstract:
近年來,網絡的犯罪數量一直在迅速增加。現在,惡意軟件作者編寫惡意程序竊取用戶的個人信息,或提供基於垃圾郵件的營銷服務為利潤的地方。為了更有效地傳播惡意軟件,黑客已經開始瞄準流行的在線社交網絡服務(SNS)的 SNS用戶和服務的互動性之間固有的信任關係。一種常見的攻擊方法是惡意軟件自動登錄使用偷來的 SNS用戶憑據,然後提供接觸/被盜的用戶帳戶的朋友名單,他們通過在一些短消息嵌入惡意 URL(鏈接)。受害人然後認為是他們的朋友提供的鏈接,按一下被感染。然而,這種方法是有效的,惡意軟件來模仿人類類似的行為,它可以超越任何一個/兩個班輪對話。在這篇論文中,我們首先介紹一個新類型的攻擊,提供惡意網址 SNS用戶之間的合法對話。為了證明其概念,我們設計和實施名為 Hitchbot惡意軟件[1],其中包括多個攻擊源,為實現我們所提出的攻擊。特別是,當一個 SNS用戶發送一個鏈接/ URL到他/她的朋友,Hitchbot悄悄地取代類似,但惡意攔截在幾個可能的點之一,互動式輸入/輸出鏈接系統。由於惡意鏈接在一些適當的對話上下文之間的合法用戶交付,這使得它更難以對受害者(以及吊具)來實現攻擊,從而可以大幅增加轉換率。這方法也使 Hitchbot的繞過大多數現有的防禦計劃,主要是靠對用戶的行為或流量異常檢測。 Hitchbot是基於客戶端模塊的形式可以順利上常見的社交網絡服務,包括雅虎和微軟的郵件客戶
APA, Harvard, Vancouver, ISO, and other styles
41

LEE, Yi-Fan, and 李奕汎. "Defense Mechanism Against Malicious and Selective Forwarding Attacks in Large & Mobile Wireless Networks." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/q2k9gk.

Full text
Abstract:
碩士<br>國立中正大學<br>資訊管理系研究所<br>106<br>In this study, we want to propose a new algorithm for large-scale distributed wireless networks, which can be applied to the following conditions: 1) The number of nodes and the wide range of networks, this study is based on supporting the network node is up to 100,000 ; 2) In the high rate of network flow, we will respond to the high rate in this study, so that the network will still maintain a high match probability; 3) We also responded to the malicious attacks on the network, even if the network is still maintain a high match probability; 4) self-adaptati
APA, Harvard, Vancouver, ISO, and other styles
42

Wu, Yu-Pu, and 吳育溥. "Maximization of Network Survivability through Deception Mechanisms under Malicious Collaborative Attacks in Virtualization Environment." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/91557274591659567133.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>101<br>Virtualization plays an important role in the information technology, especially in the enterprise application. Adopting this technology, legitimate users can utilize computing power and storage resources more flexibly without the geography and hardware limitations. Furthermore, it could save a large amount of budget and raise the utilization to the system. Nevertheless, virtualization also brings great problem with high complexity of information security, especially under the threat of collaborative attack, a new attack trend in recent years. As a service pr
APA, Harvard, Vancouver, ISO, and other styles
43

Lee, Chia-Ling, and 李佳玲. "Effective resource allocation strategies to assure service continuity considering malicious attacks and natural disasters." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/53826400742396768950.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>101<br>Companies or governments rely on Internet to provide all kinds of service to customers and use Internet to propagate them in order to attract more customers to create more profits. Not only external customers, within the company, they also build their own intranet to handle daily operations. Once companies’ network being broken, they cannot provide regular service to user and also cannot run the daily process which may cause serious problem. Therefore, according to some research, cyber-attacks still is the most significant risk that business worried about sin
APA, Harvard, Vancouver, ISO, and other styles
44

Kuo, Chien-Ting, and 郭建廷. "An Effective Priority Queue-based Scheme to Alleviate Malicious Packet Flows from Distributed DoS attacks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/02344370863990907472.

Full text
Abstract:
碩士<br>東海大學<br>資訊工程與科學系<br>97<br>Distributed Denial-of-Service attacks reduce available bandwidth and resources of targeted systems. By flooding networks and disrupting access to services, they may damage multimedia network services and cause unpredictable losses for Internet Service Providers. In the thesis, we propose to analyze the behavior of packet flows and adopt a priority queue-based algorithm that assigns packets from normal users to a high priority queue and packets from suspected attackers to a low priority queue. Simulations in the network simulator, NS2, prove our proposed priority
APA, Harvard, Vancouver, ISO, and other styles
45

Chan, Chi-Hsiang, and 詹棨翔. "Effective Network Planning and Defending Strategies to Minimize Service Compromise Probabilities under Malicious Collaborative Attacks." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/55048445757700088710.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>100<br>Recently, Cloud computing which base on virtualization and network technology becomes a popular issue. Through the novel model it provides, users and organizations can decrease the cost on resources and access the applications without geographic limit. The convenient technologies bring a lot of profits but also raise the complexity of information security. In this thesis, we model the network attack and defense scenario as a mathematical formulation and solve the bi-level problem through simulation and mathematical programming. Because of the complexity and n
APA, Harvard, Vancouver, ISO, and other styles
46

Jiang, Kun-Dao, and 江坤道. "A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/27717984998726634904.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>95<br>Modern organizations have increasingly relied on information technology to facilitate daily business operations. However, the dependency is built upon an environment where hazardous events happen frequently and malicious attacks emerge in an endless stream. To attain the objective of “continuity of services”, we propose an approach based on redundancy allocation to reduce the possibility of threats occurring to an acceptable degree. In the thesis, we formulate a “battle” between the attacker and the network into a two-level programming problem. In the inne
APA, Harvard, Vancouver, ISO, and other styles
47

Jiang, Kun-Dao. "A Near-Optimal Redundancy Allocation Policy to Minimize System Vulnerability against Hazardous Events and Malicious Attacks." 2007. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-1907200713220500.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Chuang, Ho-Yang, and 莊禾暘. "A Study on Exposing Evidences of Malicious Attacks and Features of Malwares Based on Memory Forensics." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/7xq84v.

Full text
Abstract:
碩士<br>國立政治大學<br>資訊科學系<br>106<br>Currently, most of the DDoS attacks that exceed 1 TB per second are executed from large-scale-IoT botnets. If these attacks were aimed at critical industrial infrastructure, it could have caused damage to our society at an extraordinary scale. The rising threat of DDoS attacks are fueled by the increased development of IoTs, which has now reached its fourth stage, called the WoT. WoT is a term used to describe approaches, software architectural styles and programming patterns that allow previously IoT objects to be part of the World Wide Web. As WoT approaches r
APA, Harvard, Vancouver, ISO, and other styles
49

Sayed, Bassam. "Protection against malicious JavaScript using hybrid flow-sensitive information flow monitoring." Thesis, 2015. http://hdl.handle.net/1828/7063.

Full text
Abstract:
Modern web applications use several third-party JavaScript libraries to achieve higher levels of engagement. The third-party libraries range from utility libraries such as jQuery to libraries that provide services such as Google Analytics and context- sensitive advertisement. These third-party libraries have access to most (if not all) the elements of the displayed webpage. This allows malicious third-party libraries to perform attacks that steal information from the end-user or perform an action without the end-user consent. These types of attacks are the stealthiest and the hardest to defend
APA, Harvard, Vancouver, ISO, and other styles
50

Chen, Quen-Ting, and 陳冠廷. "Recovery and Resource Reallocation Strategies to Maximize Network Survivability for Multi-Stage Defense Resource Allocation under Malicious Attacks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/93188278162261584891.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>99<br>The Internet enriches our lives, but it also brings lots of threats to individuals and cooperates from information security. It is difficult to keep network safe forever because cyber attacker could launch attack through the network unlimited by time and space. Consequently, it is a more and more important and critical issue about how to efficiently evaluate network survivability. In this thesis, an innovative metric called Average Degree of Disconnectivity (Average DOD) is proposed. The Average DOD combining the concept of the probability calculated by contes
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!