Searched for: subject%3A%22Network%255C%252BSecurity%22
(1 - 13 of 13)
document
Van den Broeck, Senne (author)
Intrusion Detection Systems (IDSes) detect malicious traffic in computer networks and generate a large volume of alerts, which cannot be processed manually. SAGE is a deterministic algorithm that works without a priori network/expert knowledge and can compress these alerts into attack graphs (AGs), modelling intruders’ paths in the network....
bachelor thesis 2023
document
Thomas, Wessel (author)
Network Intrusion Detection Systems (NIDSs) defend our computer networks against malicious network attacks. Anomaly-based NIDSs use machine learning classifiers to categorise incoming traffic. Research has shown that classifiers are vulnerable to adversarial examples, perturbed inputs that lead the classifier into misclassifying the input....
master thesis 2023
document
Agiollo, A. (author), Bardhi, Enkeleda (author), Conti, M. (author), Lazzeretti, Riccardo (author), Losiouk, Eleonora (author), Omicini, Andrea (author)
In the context of Information-Centric Networking, Interest Flooding Attacks (IFAs) represent a new and dangerous sort of distributed denial of service. Since existing proposals targeting IFAs mainly focus on local information, in this paper we propose GNN4IFA as the first mechanism exploiting complex non-local knowledge for IFA detection by...
conference paper 2023
document
Presekal, A. (author), Stefanov, Alexandru (author), Subramaniam Rajkumar, Vetrivel (author), Palensky, P. (author)
Electrical power grids are vulnerable to cyber attacks, as seen in Ukraine in 2015 and 2016. However, existing attack detection methods are limited. Most of them are based on power system measurement anomalies that occur when an attack is successfully executed at the later stages of the cyber kill chain. In contrast, the attacks on the Ukrainian...
journal article 2023
document
Griffioen, H.J. (author)
The growing dependency on interconnected devices makes cyber crime increasingly lucrative. Together with the rise of premade tools to perform exploits, the number of cyber incidents grows rapidly each year. Defending against these threats becomes increasingly difficult as organizations depend heavily on the Internet and have many different...
doctoral thesis 2022
document
Frensel, Mees (author)
P4 programmable data-planes provide operators with a flexible method to set up data-plane forwarding logic. To deploy networks with confidence, a switch's forwarding logic should correspond with its intended behavior. Programs loaded onto programmable data-planes don't necessarily go through as much testing as traditional fixed-function devices...
bachelor thesis 2022
document
de Vos, Adriaan (author)
The upcoming IEEE 802.1CB standard aims to solve performance and reliability issues in Time-Sensitive Networking (TSN). Mission-critical systems often use these standards for communication in automotive, industrial, and avionic networks. However, researchers did not sufficiently investigate the security risks and possible mitigation solutions to...
master thesis 2022
document
Apruzzese, Giovanni (author), Pajola, Luca (author), Conti, M. (author)
Enhancing Network Intrusion Detection Systems (NIDS) with supervised Machine Learning (ML) is tough. ML-NIDS must be trained and evaluated, operations requiring data where benign and malicious samples are clearly labeled. Such labels demand costly expert knowledge, resulting in a lack of real deployments, as well as on papers always relying...
journal article 2022
document
Neeleman, Fimme (author)
The IPv6 routing protocol for low-power and lossy networks (RPL) is a routing protocol that is standardized for constrained devices. This standard only considers static nodes and consequently underperforms in networks with moving nodes. Several studies exist intending to mend this problem, but analyses of RPL's performance in mobile situations...
bachelor thesis 2021
document
Kerkhof, Jorden (author)
The urgency for high-security products for industrial networks is increasing as malicious hackers are improving their accessibility tools. A common practice for a company to protect its sensitive data is network segmentation. The network is segmented in different domains with distinctive security levels. The sensitive data is stored and managed...
master thesis 2021
document
Moelchand, Pravesh (author), Gnanavarothayan, Kabilan (author), Verheijde, Jim (author), van Stam, Just (author)
Intermax Cloudsourcing B.V. designs, implements and manages critical IT-infrastructures for Dutch clients from the medical, public and financial sectors. The information that passes over these IT-infrastructures is highly confidential and privacy-sensitive, therefore it is essential that these infrastructures are secure. To improve the security...
bachelor thesis 2019
document
Noroozian, A. (author), Koenders, Jan (author), van Veldhuizen, Eelco (author), Hernandez Ganan, C. (author), Alrwais, Sumayah (author), McCoy, Damon (author), van Eeten, M.J.G. (author)
This paper presents the first empirical study based on ground-truth data of a major Bullet-Proof Hosting (BPH) provider, a company called Maxided. BPH allows miscreants to host criminal activities in support of various cybercrime business models such as phishing, botnets, DDoS, spam, and counterfeit pharmaceutical websites. Maxided was legally...
conference paper 2019
document
Bortolameotti, Riccardo (author), van Ede, Thijs (author), Caselli, Marco (author), Everts, M.H. (author), Hartel, P.H. (author), Hofstede, Rick (author), Jonker, Willem (author), Peter, A. (author)
We present DECANTeR, a system to detect anomalous outbound HTTP communication, which passively extracts fingerprints for each application running on a monitored host. The goal of our system is to detect unknown malware and backdoor communication indicated by unknown fingerprints extracted from a host's network traffic. We evaluate a prototype...
conference paper 2017
Searched for: subject%3A%22Network%255C%252BSecurity%22
(1 - 13 of 13)