Searched for: subject%3A%22Network%255C+security%22
(1 - 20 of 26)

Pages

document
Koursiounis, Giorgos (author)
<div>Security researchers and industry firms employ Internet-wide scanning for information collection, vulnerability detection and security evaluation, while cybercriminals make use of it to find and attack unsecured devices. Internet scanning plays a considerable role in threat detection &amp; response, and cyber threat intelligence. We adopt a...
master thesis 2024
document
Constantinescu, Vlad (author)
The interpretability of an attack graph is a key principle as it reflects the difficulty of a specialist to take insights into attacker strategies. However, the quantification of interpretability is considered to be a subjective manner and complex attack graphs can be challenging to read and interpret. In this research paper, we propose a new...
bachelor thesis 2023
document
Van den Broeck, Senne (author)
Intrusion Detection Systems (IDSes) detect malicious traffic in computer networks and generate a large volume of alerts, which cannot be processed manually. SAGE is a deterministic algorithm that works without a priori network/expert knowledge and can compress these alerts into attack graphs (AGs), modelling intruders’ paths in the network....
bachelor thesis 2023
document
Thomas, Wessel (author)
Network Intrusion Detection Systems (NIDSs) defend our computer networks against malicious network attacks. Anomaly-based NIDSs use machine learning classifiers to categorise incoming traffic. Research has shown that classifiers are vulnerable to adversarial examples, perturbed inputs that lead the classifier into misclassifying the input....
master thesis 2023
document
Agiollo, A. (author), Bardhi, Enkeleda (author), Conti, M. (author), Lazzeretti, Riccardo (author), Losiouk, Eleonora (author), Omicini, Andrea (author)
In the context of Information-Centric Networking, Interest Flooding Attacks (IFAs) represent a new and dangerous sort of distributed denial of service. Since existing proposals targeting IFAs mainly focus on local information, in this paper we propose GNN4IFA as the first mechanism exploiting complex non-local knowledge for IFA detection by...
conference paper 2023
document
Presekal, A. (author), Stefanov, Alexandru (author), Subramaniam Rajkumar, Vetrivel (author), Palensky, P. (author)
Electrical power grids are vulnerable to cyber attacks, as seen in Ukraine in 2015 and 2016. However, existing attack detection methods are limited. Most of them are based on power system measurement anomalies that occur when an attack is successfully executed at the later stages of the cyber kill chain. In contrast, the attacks on the Ukrainian...
journal article 2023
document
Griffioen, H.J. (author)
The growing dependency on interconnected devices makes cyber crime increasingly lucrative. Together with the rise of premade tools to perform exploits, the number of cyber incidents grows rapidly each year. Defending against these threats becomes increasingly difficult as organizations depend heavily on the Internet and have many different...
doctoral thesis 2022
document
Frensel, Mees (author)
P4 programmable data-planes provide operators with a flexible method to set up data-plane forwarding logic. To deploy networks with confidence, a switch's forwarding logic should correspond with its intended behavior. Programs loaded onto programmable data-planes don't necessarily go through as much testing as traditional fixed-function devices...
bachelor thesis 2022
document
de Vos, Adriaan (author)
The upcoming IEEE 802.1CB standard aims to solve performance and reliability issues in Time-Sensitive Networking (TSN). Mission-critical systems often use these standards for communication in automotive, industrial, and avionic networks. However, researchers did not sufficiently investigate the security risks and possible mitigation solutions to...
master thesis 2022
document
Chiba, Daiki (author), Akiyama, Mitsuaki (author), Otsuki, Yuto (author), Hada, Hiroki (author), Yagi, Takeshi (author), Fiebig, Tobias (author), van Eeten, M.J.G. (author)
Security Operations Centers (SOCs) are in need of automation for triaging alerts. Current approaches focus on analyzing and enriching individual alerts. We take a different approach and analyze the population of alerts. In an observational study over 24 weeks, we find a surprising pattern: some domains get analyzed again and again by different...
journal article 2022
document
Apruzzese, Giovanni (author), Pajola, Luca (author), Conti, M. (author)
Enhancing Network Intrusion Detection Systems (NIDS) with supervised Machine Learning (ML) is tough. ML-NIDS must be trained and evaluated, operations requiring data where benign and malicious samples are clearly labeled. Such labels demand costly expert knowledge, resulting in a lack of real deployments, as well as on papers always relying...
journal article 2022
document
Vermeer, M. (author), van Eeten, M.J.G. (author), Hernandez Ganan, C. (author)
Notwithstanding the predicted demise of signature-based network monitoring, it is still part of the bedrock of security operations. Rulesets are fundamental to the efficacy of Network Intrusion Detection Systems (NIDS). Yet, they have rarely been studied in production environments. We partner with a Managed Security Service Provider (MSSP) to...
conference paper 2022
document
Förstel, Irène (author)
Nowadays does the internet presence of companies increase, and with it, their attack surface and the probability of breaches: every information system in the company's network may be an entry point for an outsider. Therefore, companies need to secure their information systems. However, current risk assessment frameworks fail to connect the...
master thesis 2021
document
d' Estalenx, Antoine (author)
IoT devices keep entering our homes with the promise of delivering more services and enhancing user experience; however, these new devices also carry along an alarming number of vulnerabilities and security issues. In most cases, the users of these devices are completely unaware of the security risks that connecting these devices entail. Current...
master thesis 2021
document
Neeleman, Fimme (author)
The IPv6 routing protocol for low-power and lossy networks (RPL) is a routing protocol that is standardized for constrained devices. This standard only considers static nodes and consequently underperforms in networks with moving nodes. Several studies exist intending to mend this problem, but analyses of RPL's performance in mobile situations...
bachelor thesis 2021
document
Epifanov, Mikhail (author)
Malware Packet-sequence Clustering and Analysis (MalPaCA) is a unsupervised clustering application for malicious network behavior, it currently uses solely sequential features to characterize network behavior. In this paper an extensive comparison between those features and statistical features is performed. During the comparison a better...
bachelor thesis 2021
document
Kerkhof, Jorden (author)
The urgency for high-security products for industrial networks is increasing as malicious hackers are improving their accessibility tools. A common practice for a company to protect its sensitive data is network segmentation. The network is segmented in different domains with distinctive security levels. The sensitive data is stored and managed...
master thesis 2021
document
Bortolameotti, Riccardo (author), Van Ede, Thijs (author), Continella, Andrea (author), Hupperich, Thomas (author), Everts, Maarten H. (author), Rafati, Reza (author), Jonker, Willem (author), Hartel, P.H. (author), Peter, Andreas (author)
Passive application fingerprinting is a technique to detect anomalous outgoing connections. By monitoring the network traffic, a security monitor passively learns the network characteristics of the applications installed on each machine, and uses them to detect the presence of new applications (e.g., malware infection). In this work, we...
conference paper 2020
document
Knezevic, Karlo (author), Picek, S. (author), Jakobovic, Domagoj (author), Hernandez-Castro, Julio (author)
Finding optimal adversarial dynamics between defenders and attackers in large network systems is a complex problem one can approach from several perspectives. The results obtained are often not satisfactory since they either concentrate on only one party or run very simplified scenarios that are hard to correlate with realistic settings. To...
conference paper 2020
document
Moelchand, Pravesh (author), Gnanavarothayan, Kabilan (author), Verheijde, Jim (author), van Stam, Just (author)
Intermax Cloudsourcing B.V. designs, implements and manages critical IT-infrastructures for Dutch clients from the medical, public and financial sectors. The information that passes over these IT-infrastructures is highly confidential and privacy-sensitive, therefore it is essential that these infrastructures are secure. To improve the security...
bachelor thesis 2019
Searched for: subject%3A%22Network%255C+security%22
(1 - 20 of 26)

Pages