You searched for subject:(Targeted attacks)
.
Showing records 1 – 5 of
5 total matches.
No search limiters apply to these results.

Delft University of Technology
1.
Dhiman, Ashish Kumar (author).
Measuring the robustness of network controllability.
Degree: 2020, Delft University of Technology
URL: http://resolver.tudelft.nl/uuid:76b1aaca-f1f6-4eb5-9fbb-fec2fe443f10
► Networks are all around us, telecommunication networks, road transportation networks, and the Internet are a few examples of networks that we encounter every day. The…
(more)
▼ Networks are all around us, telecommunication networks, road transportation networks, and the Internet are a few examples of networks that we encounter every day. The entities in a network are represented by nodes and the interconnections between them are represented by links. For example, in a telecommunication network, a node could be an end point for data transmission, a redistribution point or in physical terms, an entity that is capable of receiving, transmitting or redistributing information and a link could be a wired or a wireless connection between the nodes. It is of prime importance that the networks perform their functions properly. To ensure the effective operation of such networks, we need to control them by applying external inputs on some nodes which are known as driver nodes. We say that a network is controllable if it can be driven from any arbitrary state to any desired state in finite time under the control of driver nodes which are attached to the external inputs. Networks are often confronted with perturbations in the form of targeted and random attacks to disrupt their operation. Such perturbations make these networks less controllable. Thus, more driver nodes are needed to gain the full controllability of these networks. As a result, the robustness of network controllability decreases. In this study, the minimum number of driver nodes which gain full controllability after failures or attacks is chosen as the robustness metric. Existing closed-form analytical approximations estimate the normalized minimum number of driver nodes as a function of the fraction of removed links in both targeted and random attacks. However, the approximations sometimes do not fit with the simulations and the errors between the approximations and simulations are large. The main objectives of this study are to improve the analytical approximations using machine learning methods for both targeted and random attacks and additionally, derive a suitable analytical approximation for the out-in degree-based attack. Specifically, we use Linear Regression, Random Forest, and Artificial Neural Networks. To evaluate the performance of our machine learning models, we compare them with analytical approximations and simulations. In addition to this, we also study the attack based variability in estimating the minimum number of driver nodes using robustness envelopes. Based on the performance evaluations, we found that the approximations using machine learning models significantly outperform the existing closed-form analytical approximations for the minimum number of driver nodes, both in real-world and synthetic networks. Furthermore, we also assess the performance of our analytical approximations for the out-in degree-based attacks by comparing them with simulations.
Electrical Engineering | Telecommunications and Sensing Systems
Advisors/Committee Members: Kooij, Robert (mentor), Sun, Peng (mentor), Kitsak, Maksim (graduation committee), Dubbeldam, Johan (graduation committee), Delft University of Technology (degree granting institution).
Subjects/Keywords: Network controllability; Robustness; Targeted attacks; Random attacks; Machine Learning
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Dhiman, A. K. (. (2020). Measuring the robustness of network controllability. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:76b1aaca-f1f6-4eb5-9fbb-fec2fe443f10
Chicago Manual of Style (16th Edition):
Dhiman, Ashish Kumar (author). “Measuring the robustness of network controllability.” 2020. Masters Thesis, Delft University of Technology. Accessed January 15, 2021.
http://resolver.tudelft.nl/uuid:76b1aaca-f1f6-4eb5-9fbb-fec2fe443f10.
MLA Handbook (7th Edition):
Dhiman, Ashish Kumar (author). “Measuring the robustness of network controllability.” 2020. Web. 15 Jan 2021.
Vancouver:
Dhiman AK(. Measuring the robustness of network controllability. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Jan 15].
Available from: http://resolver.tudelft.nl/uuid:76b1aaca-f1f6-4eb5-9fbb-fec2fe443f10.
Council of Science Editors:
Dhiman AK(. Measuring the robustness of network controllability. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:76b1aaca-f1f6-4eb5-9fbb-fec2fe443f10

Florida International University
2.
Kamhoua, Georges Arsene K.
Mitigating Colluding Attacks in Online Social Networks and Crowdsourcing Platforms.
Degree: PhD, Computer Science, 2019, Florida International University
URL: https://digitalcommons.fiu.edu/etd/4281
;
FIDC007703
► Online Social Networks (OSNs) have created new ways for people to communicate, and for companies to engage their customers – with these new avenues…
(more)
▼ Online Social Networks (OSNs) have created new ways for people to communicate, and for companies to engage their customers – with these new avenues for communication come new vulnerabilities that can be exploited by attackers. This dissertation aims to investigate two attack models: Identity Clone
Attacks (ICA) and Reconnaissance
Attacks (RA). During an ICA, attackers impersonate users in a network and attempt to infiltrate social circles and extract confidential information. In an RA, attackers gather information on a target's resources, employees, and relationships with other entities over public venues such as OSNs and company websites. This was made easier for the RA to be efficient because well-known social networks, such as Facebook, have a policy to force people to use their real identities for their accounts. The goal of our research is to provide mechanisms to defend against colluding attackers in the presence of ICA and RA collusion
attacks. In this work, we consider a scenario not addressed by previous works, wherein multiple attackers collude against the network, and propose defense mechanisms for such an attack. We take into account the asymmetric nature of social networks and include the case where colluders could add or modify some attributes of their clones. We also consider the case where attackers send few friend requests to uncover their targets.
To detect fake reviews and uncovering colluders in crowdsourcing, we propose a semantic similarity measurement between reviews and a community detection algorithm to overcome the non-adversarial attack. ICA in a colluding attack may become stronger and more sophisticated than in a single attack. We introduce a token-based comparison and a friend list structure-matching approach, resulting in stronger identifiers even in the presence of attackers who could add or modify some attributes on the clone. We also propose a stronger RA collusion mechanism in which colluders build their own legitimacy by considering asymmetric relationships among users and, while having partial information of the networks, avoid recreating social circles around their targets. Finally, we propose a defense mechanism against colluding RA which uses the weakest person (e.g., the potential victim willing to accept friend requests) to reach their target.
Advisors/Committee Members: Niki Pissinou, Sundaraja Sitharama Iyengar, Deng Pan, Jean H. Andrian, Leonardo Bobadilla.
Subjects/Keywords: Cybersecurity; Colluding Attacks; Online Social Networks; Crowdsourcing; Threats and Solutions; Social Network Analysis; Colluding Targeted Reconnaissance Attack; Identity Clone Attack; Community Detection; Communication Technology and New Media; Mass Communication; Other Electrical and Computer Engineering; Social Media
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Kamhoua, G. A. K. (2019). Mitigating Colluding Attacks in Online Social Networks and Crowdsourcing Platforms. (Doctoral Dissertation). Florida International University. Retrieved from https://digitalcommons.fiu.edu/etd/4281 ; FIDC007703
Chicago Manual of Style (16th Edition):
Kamhoua, Georges Arsene K. “Mitigating Colluding Attacks in Online Social Networks and Crowdsourcing Platforms.” 2019. Doctoral Dissertation, Florida International University. Accessed January 15, 2021.
https://digitalcommons.fiu.edu/etd/4281 ; FIDC007703.
MLA Handbook (7th Edition):
Kamhoua, Georges Arsene K. “Mitigating Colluding Attacks in Online Social Networks and Crowdsourcing Platforms.” 2019. Web. 15 Jan 2021.
Vancouver:
Kamhoua GAK. Mitigating Colluding Attacks in Online Social Networks and Crowdsourcing Platforms. [Internet] [Doctoral dissertation]. Florida International University; 2019. [cited 2021 Jan 15].
Available from: https://digitalcommons.fiu.edu/etd/4281 ; FIDC007703.
Council of Science Editors:
Kamhoua GAK. Mitigating Colluding Attacks in Online Social Networks and Crowdsourcing Platforms. [Doctoral Dissertation]. Florida International University; 2019. Available from: https://digitalcommons.fiu.edu/etd/4281 ; FIDC007703

Universitat de Girona
3.
Rueda Pepinosa, Diego Fernando.
Geographical interdependent robustness measures in transportation networks.
Degree: Departament d'Arquitectura i Tecnologia de Computadors, 2018, Universitat de Girona
URL: http://hdl.handle.net/10803/665989
► La mayoría de redes de transporte interactúan con otras para para soportar el modo de vida de la sociedad moderna. En las redes interdependientes, el…
(more)
▼ La mayoría de redes de transporte interactúan con otras para para soportar el modo de vida de la sociedad moderna. En las redes interdependientes, el correcto funcionamiento depende de la operación normal de las redes que están interconectadas. El objetivo de esta tesis es medir y analizar la robustez de diferentes modelos de redes interdependientes bajo fallas de gran escala y, en particular, considerar redes interdependientes donde al menos una de las redes es una red de telecomunicaciones. Los efectos de diferentes modelos de red y procesos dinámicos de propagación de fallos entre redes son considerados. Nuevas estrategias de interconexión son propuestas para mejorar la robustez de las redes interconectadas mediante el análisis de la vulnerabilidad de las redes a fallas y ataques dirigidos. Además, se propone un modelo mejorado para la interconexión basada en regiones considerando un límite para el número de enlaces de interconexión entre las redes interconectadas
Advisors/Committee Members: [email protected] (authoremail), false (authoremailshow), Calle Ortega, Eusebi (director).
Subjects/Keywords: Sistemes de telecomunicació; Sistemas de telecomunicación; Telecommunication systems; Robustesa; Robustez; Robustness; Xarxes interdependents; Redes interdependientes; Interdependent networks; Propagació de fallades; Propagación de fallos; Failure propagation; Atacs dirigits; Ataques dirigidos; Targeted attacks; 68
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Rueda Pepinosa, D. F. (2018). Geographical interdependent robustness measures in transportation networks. (Thesis). Universitat de Girona. Retrieved from http://hdl.handle.net/10803/665989
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Rueda Pepinosa, Diego Fernando. “Geographical interdependent robustness measures in transportation networks.” 2018. Thesis, Universitat de Girona. Accessed January 15, 2021.
http://hdl.handle.net/10803/665989.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Rueda Pepinosa, Diego Fernando. “Geographical interdependent robustness measures in transportation networks.” 2018. Web. 15 Jan 2021.
Vancouver:
Rueda Pepinosa DF. Geographical interdependent robustness measures in transportation networks. [Internet] [Thesis]. Universitat de Girona; 2018. [cited 2021 Jan 15].
Available from: http://hdl.handle.net/10803/665989.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Rueda Pepinosa DF. Geographical interdependent robustness measures in transportation networks. [Thesis]. Universitat de Girona; 2018. Available from: http://hdl.handle.net/10803/665989
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Delft University of Technology
4.
Cetinay-Iyicil, H.
Analysis and planning of power grids: A network perspective.
Degree: 2018, Delft University of Technology
URL: http://resolver.tudelft.nl/uuid:97657389-0ee5-4de7-82b6-6647470160a5
;
urn:NBN:nl:ui:24-uuid:97657389-0ee5-4de7-82b6-6647470160a5
;
97657389-0ee5-4de7-82b6-6647470160a5
;
10.4233/uuid:97657389-0ee5-4de7-82b6-6647470160a5
;
urn:isbn:978-94-6186-969-2
;
urn:NBN:nl:ui:24-uuid:97657389-0ee5-4de7-82b6-6647470160a5
;
http://resolver.tudelft.nl/uuid:97657389-0ee5-4de7-82b6-6647470160a5
► Electric power has become an essential part of daily life: we plug our electronic devices in, switch our lights on, and expect to have power.…
(more)
▼ Electric power has become an essential part of daily life: we plug our electronic devices in, switch our lights on, and expect to have power. As the availability of power is usually taken for granted in modern societies, we mostly feel annoyed at its absence and perceive the importance of power during outages which have severe effects on the public order. Blackouts have had disastrous consequences for many countries and they continue to occur frequently. Such examples demonstrate the necessity for careful analysis and planning of power grids, to ultimately increase the reliability of power grids. The power grids have evolved due to economic, environmental and human-caused factors. In addition to the contingency analysis, nowadays, the operation and planning of power grids are facing many other challenges (such as demand growth,
targeted attacks, cascading failures, and renewable energy integration). Thus, many questions arise, including: which buses (nodes) to connect with a new line (link)? What are the impacts of malicious
attacks on power grids? How may an initial failure result in a cascade of failures? How to prepare for the integration of renewable energy? Answering such questions requires developing new concepts and tools for analysing and planning of power grids. Power grids are one of the largest and the most complex man-made systems on earth. The complex nature of power grids and its underlying structure make it possible to analyse power grids relying on network science. The applications of network science on power grids have shown the promising potential to capture the interdependencies between components and to understand the collective emergent behaviour of complex power grids. This thesis is motivated by the increasing need of reliable power grids and the merits of network science on the investigation of power grids. In this context, relying on network science, we model and analyse the power grid and its near-future challenges in terms of line removals/additions, malicious
attacks, cascading failures, and renewable integration.
Advisors/Committee Members: Van Mieghem, P.F.A., Kuipers, F.A., Delft University of Technology.
Subjects/Keywords: network science; power grids; cascading failures; wind power; sensitivity analyses; targeted attacks; centrality metrics
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Cetinay-Iyicil, H. (2018). Analysis and planning of power grids: A network perspective. (Doctoral Dissertation). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:97657389-0ee5-4de7-82b6-6647470160a5 ; urn:NBN:nl:ui:24-uuid:97657389-0ee5-4de7-82b6-6647470160a5 ; 97657389-0ee5-4de7-82b6-6647470160a5 ; 10.4233/uuid:97657389-0ee5-4de7-82b6-6647470160a5 ; urn:isbn:978-94-6186-969-2 ; urn:NBN:nl:ui:24-uuid:97657389-0ee5-4de7-82b6-6647470160a5 ; http://resolver.tudelft.nl/uuid:97657389-0ee5-4de7-82b6-6647470160a5
Chicago Manual of Style (16th Edition):
Cetinay-Iyicil, H. “Analysis and planning of power grids: A network perspective.” 2018. Doctoral Dissertation, Delft University of Technology. Accessed January 15, 2021.
http://resolver.tudelft.nl/uuid:97657389-0ee5-4de7-82b6-6647470160a5 ; urn:NBN:nl:ui:24-uuid:97657389-0ee5-4de7-82b6-6647470160a5 ; 97657389-0ee5-4de7-82b6-6647470160a5 ; 10.4233/uuid:97657389-0ee5-4de7-82b6-6647470160a5 ; urn:isbn:978-94-6186-969-2 ; urn:NBN:nl:ui:24-uuid:97657389-0ee5-4de7-82b6-6647470160a5 ; http://resolver.tudelft.nl/uuid:97657389-0ee5-4de7-82b6-6647470160a5.
MLA Handbook (7th Edition):
Cetinay-Iyicil, H. “Analysis and planning of power grids: A network perspective.” 2018. Web. 15 Jan 2021.
Vancouver:
Cetinay-Iyicil H. Analysis and planning of power grids: A network perspective. [Internet] [Doctoral dissertation]. Delft University of Technology; 2018. [cited 2021 Jan 15].
Available from: http://resolver.tudelft.nl/uuid:97657389-0ee5-4de7-82b6-6647470160a5 ; urn:NBN:nl:ui:24-uuid:97657389-0ee5-4de7-82b6-6647470160a5 ; 97657389-0ee5-4de7-82b6-6647470160a5 ; 10.4233/uuid:97657389-0ee5-4de7-82b6-6647470160a5 ; urn:isbn:978-94-6186-969-2 ; urn:NBN:nl:ui:24-uuid:97657389-0ee5-4de7-82b6-6647470160a5 ; http://resolver.tudelft.nl/uuid:97657389-0ee5-4de7-82b6-6647470160a5.
Council of Science Editors:
Cetinay-Iyicil H. Analysis and planning of power grids: A network perspective. [Doctoral Dissertation]. Delft University of Technology; 2018. Available from: http://resolver.tudelft.nl/uuid:97657389-0ee5-4de7-82b6-6647470160a5 ; urn:NBN:nl:ui:24-uuid:97657389-0ee5-4de7-82b6-6647470160a5 ; 97657389-0ee5-4de7-82b6-6647470160a5 ; 10.4233/uuid:97657389-0ee5-4de7-82b6-6647470160a5 ; urn:isbn:978-94-6186-969-2 ; urn:NBN:nl:ui:24-uuid:97657389-0ee5-4de7-82b6-6647470160a5 ; http://resolver.tudelft.nl/uuid:97657389-0ee5-4de7-82b6-6647470160a5
5.
Mansoori, Masood.
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks.
Degree: 2017, Victoria University of Wellington
URL: http://hdl.handle.net/10063/6567
► Accessing and retrieving users’ browser and network information is a common practice used by advertisers and many online services to deliver targeted ads and explicit…
(more)
▼ Accessing and retrieving users’ browser and network information is a common practice used by advertisers and many online services to deliver
targeted ads and explicit improved services to users belonging to a particular group. They provide a great deal of information about a user’s geographical location, ethnicity, language, culture and general interests. However, in the same way these techniques have proven effective in advertising services, they can be used by attackers to launch
targeted attacks against specific user groups.
Targeted attacks have been proven more effective against user groups than their blind untargeted counterparts (e.g.spam, phishing). Their detection is more challenging as the detection tools need to be located within the
targeted user group. This is one of the challenges faced by security researchers and organisations involved in the detection of new malware and exploits, using client honeypots. Client honeypots are detection systems used in the identification of malicious web sites. The client honeypot needs to mimic users in a pre-defined location, system, network and personality for which the malware is intended. The case is amplified by the use of Browser Exploit Packs/kits (BEPs), supporting these features. BEPs provide simplicity in deployment of
targeted malicious web sites. They allow attackers to utilise specific geographical locations, network information, visit patterns or browser header information obtained from a visiting user to determine if a user should be subjected to an attack.
Malicious web sites that operate based on
targeted techniques can disguise themselves as legitimate web sites and bypass detection. Benign content is delivered to attacker-specified users while avoiding delivery to suspicious systems such as well-known or possible subnets that may host client honeypots. A client honeypot deployed in a single location with a single IP address will fail to detect an attack
targeted at users in different demographic and network subnets. Failure in detection of such
attacks results in high rates of false negatives which affect all honeypots regardless of detection technique or interaction level. BEPs are hugely popular and most include tracking features. The number of malicious web sites that utilise these features is currently unknown. There are very few studies that have addressed identifying the rate and number of malicious web sites utilising these techniques and no available client honeypot system is currently able to detect them. Any failure to detect these web sites will result in unknown numbers of users being exploited and infected with malware. The false negatives resulting from failing to detect these web sites can incorrectly be interpreted as a decline in the number of
attacks.
In this work, a study of information that can potentially expose users to
targeted attack through a browser is examined through experimental analysis. Concrete approaches by attackers to obtain user-specific information in the deployment of
targeted attacks through browsers are…
Advisors/Committee Members: Welch, Ian.
Subjects/Keywords: Geolocation Attacks; HAZOP; Client Honeypots; Browser Based Attacks; IP Tracking; Browser Exploit Kits; YALIH; Localized Attacks; Targeted attacks; Honeypots; Honey clients; Hazard and Operability
…8
Part I – Why are Attacks Targeted and How Do They Do It?
10
2
Targeted Attacks: The… …algorithm to detect geolocation and targeted attacks .
xv
173
179
185
187
199
200
209
211
214… …Targeted attacks can be deployed against users from a particular demographic, using current… …being targeted to be able to detect the attacks. The availability of such techniques for an… …Localisation and targeted attacks are not only limited to spam campaigns, but seen across other types…
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Mansoori, M. (2017). Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks. (Doctoral Dissertation). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/6567
Chicago Manual of Style (16th Edition):
Mansoori, Masood. “Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks.” 2017. Doctoral Dissertation, Victoria University of Wellington. Accessed January 15, 2021.
http://hdl.handle.net/10063/6567.
MLA Handbook (7th Edition):
Mansoori, Masood. “Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks.” 2017. Web. 15 Jan 2021.
Vancouver:
Mansoori M. Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks. [Internet] [Doctoral dissertation]. Victoria University of Wellington; 2017. [cited 2021 Jan 15].
Available from: http://hdl.handle.net/10063/6567.
Council of Science Editors:
Mansoori M. Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks. [Doctoral Dissertation]. Victoria University of Wellington; 2017. Available from: http://hdl.handle.net/10063/6567
.