Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Attack Plan). Showing records 1 – 2 of 2 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


NSYSU

1. Huang, Yu-Zhi. Detecting Attack Sequence in Cloud Based on Hidden Markov Model.

Degree: Master, Computer Science and Engineering, 2012, NSYSU

Cloud computing provides business new working paradigm with the benefit of cost reduce and resource sharing. Tasks from different users may be performed on the same machine. Therefore, one primary security concern is whether user data is secure in cloud. On the other hand, hacker may facilitate cloud computing to launch larger range of attack, such as a request of port scan in cloud with virtual machines executing such malicious action. In addition, hacker may perform a sequence of attacks in order to compromise his target system in cloud, for example, evading an easy-to-exploit machine in a cloud and then using the previous compromised to attack the target. Such attack plan may be stealthy or inside the computing environment, so intrusion detection system or firewall has difficulty to identify it. The proposed detection system analyzes logs from cloud to extract the intensions of the actions recorded in logs. Stealthy reconnaissance actions are often neglected by administrator for the insignificant number of violations. Hidden Markov model is adopted to model the sequence of attack performed by hacker and such stealthy events in a long time frame will become significant in the state-aware model. The preliminary results show that the proposed system can identify such attack plans in the real network. Advisors/Committee Members: Chia-Mei Chen (chair), D. J. Guan (committee member), Chun-I Fan (chair).

Subjects/Keywords: Cloud Computing; Hidden Markov Model; Attack Plan

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, Y. (2012). Detecting Attack Sequence in Cloud Based on Hidden Markov Model. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726112-150041

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Yu-Zhi. “Detecting Attack Sequence in Cloud Based on Hidden Markov Model.” 2012. Thesis, NSYSU. Accessed December 07, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726112-150041.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Yu-Zhi. “Detecting Attack Sequence in Cloud Based on Hidden Markov Model.” 2012. Web. 07 Dec 2019.

Vancouver:

Huang Y. Detecting Attack Sequence in Cloud Based on Hidden Markov Model. [Internet] [Thesis]. NSYSU; 2012. [cited 2019 Dec 07]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726112-150041.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang Y. Detecting Attack Sequence in Cloud Based on Hidden Markov Model. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726112-150041

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linnaeus University

2. Nariman, Goran Saman. A Framework for Secure Structural Adaptation.

Degree: computer science and media technology (CM), 2018, Linnaeus University

A (self-) adaptive system is a system that can dynamically adapt its behavior or structure during execution to "adapt" to changes to its environment or the system itself. From a security standpoint, there has been some research pertaining to (self-) adaptive systems in general but not enough care has been shown towards the adaptation itself. Security of systems can be reasoned about using threat models to discover security issues in the system. Essentially that entails abstracting away details not relevant to the security of the system in order to focus on the important aspects related to security. Threat models often enable us to reason about the security of a system quantitatively using security metrics. The structural adaptation process of a (self-) adaptive system occurs based on a reconfiguration plan, a set of steps to follow from the initial state (configuration) to the final state. Usually, the reconfiguration plan consists of multiple strategies for the structural adaptation process and each strategy consists of several steps steps with each step representing a specific configuration of the (self-) adaptive system. Different reconfiguration strategies have different security levels as each strategy consists of a different sequence configuration with different security levels. To the best of our knowledge, there exist no approaches which aim to guide the reconfiguration process in order to select the most secure available reconfiguration strategy, and the explicit security of the issues associated with the structural reconfiguration process itself has not been studied. In this work, based on an in-depth literature survey, we aim to propose several metrics to measure the security of configurations, reconfiguration strategies and reconfiguration plans based on graph-based threat models. Additionally, we have implemented a prototype to demonstrate our approach and automate the process. Finally, we have evaluated our approach based on a case study of our making. The preliminary results tend to expose certain security issues during the structural adaptation process and exhibit the effectiveness of our proposed metrics.

Subjects/Keywords: Self-Adaptive System; Adaptive System; Security; Threat Models; Security Metrics; Structural Adaptation; Reconfiguration Plan; Security Level; Graph-based Threat Models; Dynamic Reconfiguration; Structural Reconfiguration; Attack Graphs; T-HARM; Attack Trees; Attack Graphs Generation; MulVAL; Computer Sciences; Datavetenskap (datalogi); Computer Systems; Datorsystem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nariman, G. S. (2018). A Framework for Secure Structural Adaptation. (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-78658

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nariman, Goran Saman. “A Framework for Secure Structural Adaptation.” 2018. Thesis, Linnaeus University. Accessed December 07, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-78658.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nariman, Goran Saman. “A Framework for Secure Structural Adaptation.” 2018. Web. 07 Dec 2019.

Vancouver:

Nariman GS. A Framework for Secure Structural Adaptation. [Internet] [Thesis]. Linnaeus University; 2018. [cited 2019 Dec 07]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-78658.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nariman GS. A Framework for Secure Structural Adaptation. [Thesis]. Linnaeus University; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-78658

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.