Kalbo, Naor Mirsky, Yisroel Shabtai, Asaf Elovici, Yuval
Published in
Sensors (Basel, Switzerland)
Over the last decade, video surveillance systems have become a part of the Internet of Things (IoT). These IP-based surveillance systems now protect industrial facilities, railways, gas stations, and even one’s own home. Unfortunately, like other IoT systems, there are inherent security risks which can lead to significant violations of a user’s pri...
anděra, jiří
Tato diplomová práce se zaobírá problematikou detekce anomálií v sítích. V teoretické části jsou sepsány metody, které využívající statistický přístup, až po metody strojového učení. Následně je vybrána jedna z popsaných metod. V rámci dané metody došlo ke zvolení dvou algoritmů, \textit{Isolation Forest} a \textit{Local Outlier Factor }. Bylo vytv...
Besimi, Adrian Shehu, Visar
Published in
SEEU Review
In the last period, especially during the COVID-19 pandemics, individuals as well as institutions globally and in North Macedonia particularly, have failed to correctly respond to the new challenges related to cyber security, online attacks, and fake news. Being that in a state of isolation and quarantine most governmental institutions have heavily...
Bajic, Alexander Becker, Georg T.
Published in
Proceedings on Privacy Enhancing Technologies
The Internet infrastructure has not been built with security or privacy in mind. As a result, an adversary who has control over a single Autonomous System can set-up mass surveillance systems to gather meta data by passively collecting the headers of the messages they route. To solve this problem, lightweight anonymous routing protocols such as LAP...
franc, michal
Tato práce se zabývá analýzou počítačové sítě společnosti T. J. Sokol Kolín - Atletika. Důraz je kladen především na kybernetickou bezpečnost. Během analýzy je postupováno podle standardu The Penetration Testing Execution Standard. Pro identifikaci a kategorizaci hrozeb je použita metodika STRIDE. Na analýzu je navázáno návrhem a implementací opatř...
jančička, jakub
V dnešní době má většina větších organizací zřízen svůj bezpečnostní tým, který analyzuje síťový provoz a řeší bezpečnostní incidenty, které by mohly ohrozit provoz organizace. Ač dnes existuje mnoho automatických nástrojů na detekci incidentů, stále má při analýze nezastupitelnou roli člověk. Nástroje na vizualizaci síťového provozu dokáží paralel...
Vaccari, Ivan Aiello, Maurizio Cambiaso, Enrico
Published in
Sensors (Basel, Switzerland)
Security of the Internet of Things is a crucial topic, due to the criticality of the networks and the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry Transport (MQTT) protocol used in IoT environments for communication between IoT devices. We exploit a specific weakness of MQTT which was identified during our res...
Lanson, Julian P.
Internet application servers are currently designed to maximize resource efficiency by servicing many thousands of users that may fall within disparate privilege classes. Pooling users into a shared execution context in this way enables adversaries not only to laterally propagate attacks against other clients, but also to use the application server...
Théron, Paul Kott, Alexander Drašar, Martin Rzadca, Krzysztof Le Blanc, Benoit Pihelgas, Mauno Mancini, Luigi de Gaspari, Fabio
Military strategies will shortly make intensive use of autonomous systems while the Internet of Battle Things (IoBT) will grow military systems’ complexity to new heights. The cyber defense of the battlespace will then become arduous for humans, if not impossible, due to disconnections, the difficulty of supervising masses of interconnected devices...
Voronkov, Artem
Firewalls are an important component of network security that serve to protect networks by regulating incoming and outgoing traffic. However, setting up firewalls correctly is a challenging task, which becomes more difficult with the growth of the network's size. Firewall configuration files consist of rule sets that might be hard to understand eve...