Sökning: "attack analysis"

Visar resultat 1 - 5 av 173 avhandlingar innehållade orden attack analysis.

  1. 1. Analysis of Attacks on Controlled Stochastic Systems

    Författare :Alessio Russo; Alexandre Proutiere; György Dán; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; reinforcement learning; markov decision process; attack; detection; data poisoning; online learning; Datalogi; Computer Science; Electrical Engineering; Elektro- och systemteknik;

    Sammanfattning : In this thesis, we investigate attack vectors against Markov decision processes anddynamical systems. This work is motivated by the recent interest in the researchcommunity towards making Machine Learning models safer to malicious attacks. LÄS MER

  2. 2. Enhancing IT Systems Cyber Resilience through Threat Modeling : Cyber Security Analysis of Enterprise Systems and Connected Vehicles

    Författare :Wenjun Xiong; Robert Lagerström; Simon Hacks; Jelena Zdravkovic; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Cyber Security; Threat Modeling; Attack Simulations; IT Systems; Security Analysis; Electrical Engineering; Elektro- och systemteknik;

    Sammanfattning : Information technology (IT) systems are growing in complexity and are becoming more and more connected. Such connected systems can increase flexibility and productivity while also introducing security threats. LÄS MER

  3. 3. On Adapting Data Collection to Intrusion Detection

    Författare :Ulf Larson; Chalmers tekniska högskola; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; attack manifestation; data reduction; in-vehicle network; attack analysis; adaptation; intrusion detection; computer security; data collection; forensic investigation;

    Sammanfattning : Intrusion detection systems (IDSs) are capable of detecting both suspicious insider activity and attacks from external penetrators. They can also detect both known and previously unknown attacks. These capabilities make them valuableassets in the protection of computer systems and networks. LÄS MER

  4. 4. Practical Experimentation as a Tool for Vulnerability Analysis and Security Evaluation

    Författare :Tomas Olovsson; Chalmers tekniska högskola; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; computers; dependability; vulnerabilities; tiger teams; taxonomy; operational security; analysis; security; terminology;

    Sammanfattning : The first part of this thesis describes the results of applying dependability methods to the security area. A uniform taxonomy for security, expected to contain all characteristic attributes, is presented. This taxonomy will hopefully increase the understanding of security issues. LÄS MER

  5. 5. Stealthy Sensor Attacks on Feedback Systems : Attack Analysis and Detector-based Defense Mechanisms

    Författare :David Umsonst; Henrik Sandberg; Hideaki Ishii; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Electrical Engineering; Elektro- och systemteknik;

    Sammanfattning : In this thesis, we investigate sensor attacks on feedback systems and how anomaly detectors can be used as a defense mechanism. We consider an attacker with access to all sensor measurements and full knowledge about the closed-loop system model. LÄS MER