• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 163
  • 31
  • 17
  • 17
  • 12
  • 11
  • 6
  • 5
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 317
  • 127
  • 54
  • 47
  • 43
  • 38
  • 36
  • 34
  • 34
  • 33
  • 32
  • 31
  • 26
  • 26
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
251

Improved performance high speed network intrusion detection systems (NIDS). A high speed NIDS architectures to address limitations of Packet Loss and Low Detection Rate by adoption of Dynamic Cluster Architecture and Traffic Anomaly Filtration (IADF).

Akhlaq, Monis January 2011 (has links)
Intrusion Detection Systems (IDS) are considered as a vital component in network security architecture. The system allows the administrator to detect unauthorized use of, or attack upon a computer, network or telecommunication infrastructure. There is no second thought on the necessity of these systems however; their performance remains a critical question. This research has focussed on designing a high performance Network Intrusion Detection Systems (NIDS) model. The work begins with the evaluation of Snort, an open source NIDS considered as a de-facto IDS standard. The motive behind the evaluation strategy is to analyze the performance of Snort and ascertain the causes of limited performance. Design and implementation of high performance techniques are considered as the final objective of this research. Snort has been evaluated on highly sophisticated test bench by employing evasive and avoidance strategies to simulate real-life normal and attack-like traffic. The test-methodology is based on the concept of stressing the system and degrading its performance in terms of its packet handling capacity. This has been achieved by normal traffic generation; fussing; traffic saturation; parallel dissimilar attacks; manipulation of background traffic, e.g. fragmentation, packet sequence disturbance and illegal packet insertion. The evaluation phase has lead us to two high performance designs, first distributed hardware architecture using cluster-based adoption and second cascaded phenomena of anomaly-based filtration and signature-based detection. The first high performance mechanism is based on Dynamic Cluster adoption using refined policy routing and Comparator Logic. The design is a two tier mechanism where front end of the cluster is the load-balancer which distributes traffic on pre-defined policy routing ensuring maximum utilization of cluster resources. The traffic load sharing mechanism reduces the packet drop by exchanging state information between load-balancer and cluster nodes and implementing switchovers between nodes in case the traffic exceeds pre-defined threshold limit. Finally, the recovery evaluation concept using Comparator Logic also enhance the overall efficiency by recovering lost data in switchovers, the retrieved data is than analyzed by the recovery NIDS to identify any leftover threats. Intelligent Anomaly Detection Filtration (IADF) using cascaded architecture of anomaly-based filtration and signature-based detection process is the second high performance design. The IADF design is used to preserve resources of NIDS by eliminating large portion of the traffic on well defined logics. In addition, the filtration concept augment the detection process by eliminating the part of malicious traffic which otherwise can go undetected by most of signature-based mechanisms. We have evaluated the mechanism to detect Denial of Service (DoS) and Probe attempts based by analyzing its performance on Defence Advanced Research Projects Agency (DARPA) dataset. The concept has also been supported by time-based normalized sampling mechanisms to incorporate normal traffic variations to reduce false alarms. Finally, we have observed that the IADF has augmented the overall detection process by reducing false alarms, increasing detection rate and incurring lesser data loss. / National University of Sciences & Technology (NUST), Pakistan
252

[en] SILENCED AND DISCREDITED: THE PSYCHOSOCIAL IMPACT ON WOMEN DISCLOSING SEXUAL VIOLENCE IN RELIGIOUS ENVIRONMENT / [pt] SILENCIADAS E DESACREDITADAS: O IMPACTO PSÍQUICO NAS MULHERES QUE REVELAM VIOLÊNCIA SEXUAL EM MEIOS RELIGIOSOS

RENATA BENIGNO RIBEIRO 04 December 2023 (has links)
[pt] Esta pesquisa abordou mulheres vítimas de violência sexual, em meios religiosos, explorando se foram desacreditadas ou não. Baseada no conceito psicanalítico do Desmentido de Sándor Ferenczi, que pode favorecer o silenciamento das vítimas e a manutenção do segredo abafado na instituição, essas reações podem resultar em um trauma patogênico e severos impactos psíquicos. Buscou-se examinar as principais estratégias de controle que esses líderes abusadores podem exercer. Foram selecionadas mulheres brasileiras maiores de 18 anos, entrevistando 20 participantes com idades entre 25 e 58 anos, residentes no Brasil. As entrevistas semiestruturadas, ocorreram via plataforma Zoom. Para análise, utilizou-se o software SPSS na parte quantitativa, medindo médias, frequências e porcentagens. Na parte qualitativa, o software IraMuTeQ foi empregado para analisar as falas das participantes, gerando nuvens de palavras e análise de similitude dos principais afetos e sentimentos emergentes. Esta pesquisa ampliou o estudo acerca dos abusos sexuais contra mulheres em diferentes ambientes religiosos e suas consequências psicológicas, bem como as questões relacionadas à espiritualidade nessas vítimas. A análise dos resultados focou na compreensão dos impactos psíquicos das vítimas de violência sexual e como esses eventos afetaram a fé das participantes. A constatação de que o desmentido das vivências traumáticas, amplificou o sofrimento e influenciou a relação com a fé aponta para a importância de políticas públicas abrangentes e mais estudos na área tornam-se evidentes, buscando proporcionar apoio eficaz às vítimas e fomentar ambientes religiosos seguros e saudáveis. / [en] This research addressed women victims of sexual violence in religious environments, exploring whether they were discredited or not. Based on the psychoanalytic concept of Sándor Ferenczi s Denial, which can favor the silencing of victims and the maintenance of a hushed secret in the institution, these reactions can result in pathogenic trauma and severe psychic impacts. We sought to examine the main control strategies that these abusive leaders can exercise. Brazilian women over 18 years of age were selected after interviewing 20 participants aged between 25 and 58 years, residing in Brazil. The semi-structured interviews took place via the Zoom platform. For analysis, SPSS software was used in the quantitative part, measuring means, frequencies and percentages. In the qualitative part, the IraMuTeQ software was used to analyze the participants statements, generating word clouds and similarity analyses of the main emotions and emerging feelings. This research expanded the study of sexual abuse against women in different religious environments and its psychological consequences, as well as issues related to spirituality among these victims. The analysis of the results focused on understanding the psychological impacts of victims of sexual violence and how these events affected the participants faith. The finding that the denial of traumatic experiences amplified suffering and influenced the relationship with faith points to the importance of comprehensive public policies, and more studies in the area become evident, seeking to provide effective support to victims and foster safe and religious environments.
253

Detection of Denial of Service Attacks on the Open Radio Access Network Intelligent Controller through the E2 Interface

Radhakrishnan, Vikas Krishnan 03 July 2023 (has links)
Open Radio Access Networks (Open RANs) enable flexible cellular network deployments by adopting open-source software and white-box hardware to build reference architectures customizable to innovative target use cases. The Open Radio Access Network (O-RAN) Alliance defines specifications introducing new Radio Access Network (RAN) Intelligent Controller (RIC) functions that leverage open interfaces between disaggregated RAN elements to provide precise RAN control and monitoring capabilities using applications called xApps and rApps. Multiple xApps targeting novel use cases have been developed by the O-RAN Software Community (OSC) and incubated on the Near-Real-Time RIC (Near-RT RIC) platform. However, the Near-RT RIC has, so far, been demonstrated to support only a single xApp capable of controlling the RAN elements. This work studies the scalability of the OSC Near-RT RIC to support simultaneous control signaling by multiple xApps targeting the RAN element. We particularly analyze its internal message routing mechanism and experimentally expose the design limitations of the OSC Near-RT RIC in supporting simultaneous xApp control. To this end, we extend an existing open-source RAN slicing xApp and prototype a slice-aware User Equipment (UE) admission control xApp implementing the RAN Control E2 Service Model (E2SM) to demonstrate a multi-xApp control signaling use case and assess the control routing capability of the Near-RT RIC through an end-to-end O-RAN experiment using the OSC Near-RT RIC platform and an open-source Software Defined Radio (SDR) stack. We also propose and implement a tag-based message routing strategy for disambiguating multiple xApps to enable simultaneous xApp control. Our experimental results prove that our routing strategy ensures 100% delivery of control messages between multiple xApps and E2 Nodes while guaranteeing control scalability and xApp non-repudiation. Using the improved Near-RT RIC platform, we assess the security posture and resiliency of the OSC Near-RT RIC in the event of volumetric application layer Denial of Service (DoS) attacks exploiting the E2 interface and the E2 Application Protocol (E2AP). We design a DoS attack agent capable of orchestrating a signaling storm attack and a high-intensity resource exhaustion DoS attack on the Near-RT RIC platform components. Additionally, we develop a latency monitoring xApp solution to detect application layer signaling storm attacks. The experimental results indicate that signaling storm attacks targeting the E2 Terminator on the Near-RT RIC cause control loop violations over the E2 interface affecting service delivery and optimization for benign E2 Nodes. We also observe that a high-intensity E2 Setup DoS attack results in unbridled memory resource consumption leading to service interruption and application crash. Our results also show that the E2 interface at the Near-RT RIC is vulnerable to volumetric application layer DoS attacks, and robust monitoring, load-balancing, and DoS mitigation strategies must be incorporated to guarantee resiliency and high reliability of the Near-RT RIC. / Master of Science / Telecommunication networks need sophisticated controllers to support novel use cases and applications. Cellular base stations can be managed and optimized for better user experience through an intelligent radio controller called the Near-Real-Time Radio Access Network (RAN) Intelligent Controller (RIC) (Near-RT RIC), defined by the Open Radio Access Network (O-RAN) Alliance. This controller supports simultaneous connections to multiple base stations through the E2 interface and allows simple radio applications called xApps to control the behavior of those base stations. In this research work, we study the performance and behavior of the Near-RT RIC when a malicious or compromised base station tries to overwhelm the controller through a Denial of Service (DoS) attack. We develop a solution to determine the application layer communication delay between the controller and the base station to detect potential attacks trying to compromise the functionality and availability of the controller. To implement this solution, we also upgrade the controller to support multiple radio applications to interact and control one or more base stations simultaneously. Through the developed solution, we prove that the O-RAN Software Community (OSC) Near-RT RIC is highly vulnerable to DoS attacks from malicious base stations targeting the controller over the E2 interface.
254

Collaboratively Detecting HTTP-based Distributed Denial of Service Attack using Software Defined Network

Ikusan, Ademola A. January 2017 (has links)
No description available.
255

HASH STAMP MARKING SCHEME FOR PACKET TRACEBACK

NEIMAN, ADAM M. January 2005 (has links)
No description available.
256

How Secure is Verisure’s Alarm System?

Hamid, Lars-Eric, Möller, Simon January 2020 (has links)
Security is a very important part of today’s society.Verisure is the leader in home alarm systems with 30 years ofexperience. In this project, we aim to evaluate how secure theiralarm system is from a software perspective. The system wasbought in January 2020. After an initial threat modeling, followedby penetration testing it turns out that the alarm system is not assecure as Verisure markets. We could find several security flawsin the system. Some of them let an attacker block the system,and others yield full control without the user’s knowledge. Thereare also a couple of vulnerabilities that could be exploited bypeople without any special knowledge regarding hacking or thesystem in general. / Säkerhet är en mycket viktig del i dagens samhälle. Verisure är ledande inom hemmalarmsystem med 30 års erfarenhet. I det här projektet utvärderar vi hur säkert deras larmsystem är från ett mjukvaruperspektiv. Systemet köptes i januari 2020. Efter en inledande hotmodellering och följande penetrationstester visar det sig att larmsystemet inte är lika säkert som Verisure marknadsför. Vi kunde under projektets gång hitta flera säkerhetsbrister i systemet. Några av dessa gör att en angripare kan blockera systemet och andra ger full kontroll utan användarnas vetskap. Det finns också ett par sårbarheter som kan utnyttjas av människor utan någon speciell kunskap om hacking eller systemet i allmänhet. / Kandidatexjobb i elektroteknik 2020, KTH, Stockholm
257

[pt] ACUSAÇÕES DE ALIENAÇÃO PARENTAL NAS VARAS DE FAMÍLIA: A ATUAÇÃO DO PSICÓLOGO DIANTE DE FILHOS DESMENTIDOS / [en] PARENTAL ALIENATION ALLEGATIONS IN FAMILY COURTS: THE PERFORMANCE OF THE THERAPISTS CONCERNING TRAUMA DENIED CHILDREN

VIVIAN GUERRA DORNELLAS CAMARA 27 May 2024 (has links)
[pt] A finalidade do presente trabalho é problematizar a atuação do psicólogo nas Varas de Família diante das determinações de estudo psicológico para avaliação e detecção de supostos atos de alienação parental (AP), buscando refletir sobre os filhos desmentidos enredados no litígio. Ao longo de toda a dissertação, buscou-se estabelecer uma análise cuidadosa quanto à interseção entre Psicologia e Direito, ponderando sobre desafios para a atuação do psicólogo nas Varas de Família. Ademais, pretendeu-se avaliar, na perspectiva da teoria de Ferenczi acerca do trauma, a possibilidade da reprodução do desmentido na criança, pela instituição judiciária, diante dos pedidos do Judiciário por perícia psicológica. Por meio desse percurso teórico, foi possível suscitar reflexões acerca das potencialidades do trabalho do psicólogo e da necessidade de uma atuação crítica frente às demandas do Judiciário, preservando a garantia dos direitos previstos em lei de proteção da criança e do adolescente. Para alcançar tais objetivos, foram apresentados dois fragmentos de casos atendidos pela pesquisadora no enquadre judiciário que puderam enriquecer a discussão teórica por meio da articulação com a prática profissional. Com este trabalho, foi possível apontar que a lógica patologizante e punitivista contida na Lei da Alienação Parental (LAP) acentua a judicialização da família e, por consequência, perpetua o lugar coadjuvante dos filhos em meio ao litígio parental. Consideramos que esse cenário convoca os psicólogos a atuarem de maneira sensível e crítica quanto às demandas que lhe são endereçadas, a fim de mitigar os riscos de uma nova experiência traumática às crianças e adolescentes, dessa vez, cometida pela instituição judiciária. / [en] The aim of this paper is to debate the performance of therapists in Family Courts through the determination of psychological study to evaluate and detect alleged acts of parental alienation (PA) to ponder about childhood trauma denial of kids enmeshed in litigation. This dissertation attempts to establish an accurate careful over the intersection between Psychology and Law, considering the challenges in therapists practice in Family Courts. Moreover, it intends to evaluate, under Ferenczi s theory on trauma perspective, the possibility of the trauma denial reproduction by the court on the child, with psychological expertise demanded by the Judiciary. Through this theoretical foundation, it was possible to arouse reflections regarding the psychologists practice potentials and the urge to a critical work concerning the requirements from the Judiciary, invariably preserving the rights envisaged by the law for protection of the child and the adolescent. To achieve this aim, the study presents two pieces from cases treated by the researcher in the judicial branch to enhance the theoretical discussion by integrating it with her professional practice. This paperwork enables to identify that the pathologizing punitive approach from the Parental Alienation Act (LAP in local acronym) consolidates the family judicialization process. As a result, there is a children s secondary role perpetuation in the parental litigation process. This scenario convenes psychologists to operate under a sensitive critical method regarding the received demands to mitigate the risks of another traumatic experience for children and adolescents, this time committed by court.
258

Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters

Akbar, Yousef M. A. H. 11 May 2020 (has links)
The power grid has changed a great deal from what has been generally viewed as a traditional power grid. The modernization of the power grid has seen an increase in the integration and incorporation of computing and communication elements, creating an interdependence of both physical and cyber assets of the power grid. The fast-increasing connectivity has transformed the grid from what used to be primarily a physical system into a Cyber- Physical System (CPS). The physical elements within a power grid are well understood by power engineers; however, the newly deployed cyber aspects are new to most researchers and operators in this field. The new computing and communications structure brings new vulnerabilities along with all the benefits it provides. Cyber security of the power grid is critical due to the potential impact it can make on the community or society that relies on the critical infrastructure. These vulnerabilities have already been exploited in the attack on the Ukrainian power grid, a highly sophisticated, multi-layered attack which caused large power outages for numerous customers. There is an urgent need to understand the cyber aspects of the modernized power grid and take the necessary precautions such that the security of the CPS can be better achieved. The power grid is dependent on two main cyber infrastructures, i.e., Supervisory Control And Data Acquisition (SCADA) and Advanced Metering Infrastructure (AMI). This thesis investigates the AMI in power grids by developing a testbed environment that can be created and used to better understand and develop security strategies to remove the vulnerabilities that exist within it. The testbed is to be used to conduct and implement security strategies, i.e., an Intrusion Detections Systems (IDS), creating an emulated environment to best resemble the environment of the AMI system. A DoS flooding attack and an IDS are implemented on the emulated testbed to show the effectiveness and validate the performance of the emulated testbed. / M.S. / The power grid is becoming more digitized and is utilizing information and communication technologies more, hence the smart grid. New systems are developed and utilized in the modernized power grid that directly relies on new communication networks. The power grid is becoming more efficient and more effective due to these developments, however, there are some considerations to be made as for the security of the power grid. An important expectation of the power grid is the reliability of power delivery to its customers. New information and communication technology integration brings rise to new cyber vulnerabilities that can inhibit the functionality of the power grid. A coordinated cyber-attack was conducted against the Ukrainian power grid in 2015 that targeted the cyber vulnerabilities of the system. The attackers made sure that the grid operators were unable to observe their system being attacked via Denial of Service attacks. Smart meters are the digitized equivalent of a traditional energy meter, it wirelessly communicates with the grid operators. An increase in deployment of these smart meters makes it such that we are more dependent on them and hence creating a new vulnerability for an attack. The smart meter integration into the power grid needs to be studied and carefully considered for the prevention of attacks. A testbed is created using devices that emulate the smart meters and a network is established between the devices. The network was attacked with a Denial of Service attack to validate the testbed performance, and an Intrusion detection method was developed and applied onto the testbed to prove that the testbed created can be used to study and develop methods to cover the vulnerabilities present.
259

Från Dayton till hållbar fred? : - En kvalitativ studie om fred, rättvisa och försoning i           skuggan av förnekelsen av folkmordet i Srebrenica

Hallenius Henrysson, Maria January 2022 (has links)
In July 1995, more than 8,000 young boys and men were executed by Bosnian Serb Forces in what was later declared a genocide in Srebrenica. In the following years, Bosnia and Herzegovina has undergone a long and difficult process of restoring peace and achieving justice and reconciliation. The country's main challenges have mainly concerned Dayton peace agreement and its division of entities and political power, tensions between parties and a structural exclusion of minorities. Following the extensive legal process, a national and international denial of the genocide, and denial of the legitimacy of the ICTY has been dominant. Other historical events like “Safe area” and UN action during the war and the occupation of Srebrenica are important factors for the development towards a democracy. The aim of this thesis is to investigate through a qualitative method the consequences of the denial of the Srebrenica genocide and its impact on the country's ability to achieve peace, justice and reconciliation. Other key concepts are sustainable peace, truth and justice in relation to human rights. Hannah Arendt's theories of total domination, tyranny and political revisionism constitutes the theoretical framework of the thesis. These theories are used to gain a deeper understanding of the concepts, their meaning and how they can be related to countries' transitional justice and achieve peace after serious war crimes. The study shows that the country is strongly affected by its history and the serious violations that the Bosnian Muslim population was subjected to during the war. The widespread denial of the genocide is an extension of suffering and human rights violations, which strongly impedes the country's ability to achieve peace, justice and reconciliation. Other results are that more knowledge is needed about the choice of legal methods after serious violations of humanitarian law. The methods discussed in the study are international tribunals and truth commissions and in which countries these are most adequate. The study has identified gaps in research regarding the understanding of the importance interpersonal relationships, dialogue and a smaller distance between political systems and citizens has for Bosnia & Herzegovina and for countries' recovery and reconciliation processes.
260

Security Analysis of OPC UA in Automation Systems for IIoT / Säkerhetsanalys av OPC UA inom automationssystem för IIoT.

Varadarajan, Vaishnavi January 2022 (has links)
Establishing secured communication among the different entities in an industrial environment is a major concern. Especially with the introduction of the Industrial Internet of Things (IIoT), industries have been susceptible to cyber threats, which makes security a critical requirement for the industries. Prevailing industrial communication standards were proven to meet the security needs to some extent, but the major issue which was yet to be addressed was interoperability. To achieve interoperability, Open Platform Communication Unified Architecture (OPC UA) was introduced as a communication protocol. OPC UA helped bridge the gap between Information Technology (IT) and Operational Technology (OT) security needs, but this also gives rise to new attack opportunities for the intruder. In this thesis, we have analysed the security challenges in OPC UA and the impact of two different cyberattacks on the OPC UA. First, we have implemented an OPC UA Network with the help of Raspberry Pis and open62541, an open-source implementation of the OPC UA client and server. Following this, to evaluate the performance of the network, we performed three cybersecurity attacks, Packet Sniffing, Man in the Middle Attack (MITM) and Denial of Service attack. We assessed the impact these attacks have on the OPC UA network. We have also discussed the detection mechanism for the same attacks. This analysis has helped us recognize the threats faced by OPC UA in an IIoT environment with respect to message flooding, packet sniffing and man in the middle attack and the countermeasures to this attack have been discussed / Att etablera en säker kommunikation mellan de olika enheterna i en industriell miljö är en stor utmaning. Speciellt efter introduktionen av Industrial Internet of Things (IIoT) har industrier varit mottagliga för cyberhot vilket gör cybersäkerhet en prioritet. Rådande industriella kommunikationsstandarder har visats att till viss del uppfylla säkerhets- behoven, men en av de största problemen var bristen på interoperabilitet. För att uppnå interoperabiliteten skapades Open Platform Communication Unified Architecture (OPC UA) som kommun- ikationsprotokoll. OPC UA hjälper till att överbrygga gapet mellan säkerhetsbehoven av information- steknologi (IT) och Operational Technology (OT), men detta ger också upphov till nya attackmöjligheter för inkräktare. I detta examensarbete har vi analyserat säkerhetsutmaningarna i OPC UA och effekten av två olika cyberattacker på OPC UA. Först har vi implementerat ett OPC UA Network med hjälp av Raspberry Pis och open62541 som är en öppen källkodsimplementering av OPC UA klient och server. Efter detta utförde vi tre cybersäkerhetsattacker för att utvärdera nätverkets prestanda, packet sniffing, Man in the Middle Attack (MITM) och Denial of Service attack. Vi bedömde vilken effekt dessa attacker har på OPC UA-nätverket. Vi har också diskuterat detektionsmekanismen för samma attacker. Denna analys har hjälpt oss att känna igen de hot som OPC UA står inför i en IIoT-miljö med avseende på dataflöde, packet sniffing och Man in the Middle attack och även försvar mot dessa attacker har diskuterats.

Page generated in 0.0689 seconds