• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 4
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Vulnerability in a cyberattack : How DoS affects Swedish government authorities

Burgos, Peter, Storsten, Julia January 2014 (has links)
With a growing development of technologies and the fact that many companies implements online services, an interruption in such service could cause problems for any kind of user by exploiting the vulnerabilities in these systems. The Swedish Armed Forces (SwAF) indicates that the development of the defensive ability must continue, since the vulnerability of the cyberenvironment becomes a greater interest for adversaries. A denial of service can create panic by e.g. force resources to look into the ongoing attack minimizing the awareness of the protection of other systems. Known attacking tools and statistics are presented in this thesis, but the scope is to generate a framework. The main aim is to look into the Swedish government authorities and give an insight of how a possible path for an increased resilience against a modern distributed denial of service attack could be and at the same time expand the knowledge and give a base for developing more secure systems. This thesis consists of a survey and simulations of network traffic behaviors in order to categorize and give a framework for a small, middle and large sized authority. The result shows that a small sized authority has a risk of 47% in not being able to survive an attack, while a middle sized authority only would have 17% as dangerous risk, since that is the risk of having attacks exceeding 60 Gbit/s. A large sized authority is defined by having a capacity of 100 Gbit/s. Therefore, an increased resilience is by exceeding 60 Gbit/s showing that 60% of the authorities within this thesis are prepared against a modern distributed denial of service attack. If an attack succeeds, the authorities are at greater risk to not be able to communicate externally and reach out to the society as impact. / Med en snabb teknikutveckling och det faktum att många företag genomför online-tjänster, kan ett avbrott i en sådan tjänst orsaka problem för alla typer av användare genom att utnyttja sårbarheter i dessa system. Försvarsmakten antyder att utvecklingen av den defensiva förmågan måste fortsätta, eftersom sårbarheten i cybermiljön blir ett större intresse för motståndare. En överbelastningsattack kan skapa panik genom att t.ex. tvinga resurser att undersöka en pågående attack vilket minimerar medvetenheten för skydd av andra system. Kända attackverktyg och statistik presenteras i denna studie men avgränsningen är att skapa ett ramverk. Det främsta syftet är att undersöka svenska myndigheter och ge en mall för en ökad motståndskraft mot överbelastningsattacker och att även öka kunskapen och ge en bas för att utveckla säkrare system. Studien består av en enkätundersökning och simuleringar om beteendet av nätverkstrafik för att kategorisera och ge en ram för en liten, medel och stor myndighet. Resultatet av denna studie visar att en liten myndighet har en risk på 47% att inte överleva en attack, medan en medelstor myndighet endast skulle ha en risk på 17% att inte överleva, eftersom det är risken för attacker som överstiger 60 Gbit/s. En stor myndighet definieras genom att ha en kapacitet på 100 Gbit/s. Ett ökat motstånd är därmed en kapacitet på över 60 Gbit/s som visar att 60% av myndigheterna inom denna studie är förberedda inför en överbelastningsattack. Om en attack lyckas, löper myndigheterna större risk att inte kunna kommunicera externt och nå ut till samhället som påverkan.
2

Countering network level denial of information attacks using information visualization

Conti, Gregory John 27 March 2006 (has links)
We are besieged with information every day, our inboxes overflow with spam and our search queries return a great deal of irrelevant information. In most cases there is no malicious intent, just simply too much information. However, if we consider active malicious entities, the picture darkens. Denial of information (DoI) attacks assail the human through their computer system and manifest themselves as attacks that target the human's perceptual, cognitive and motor capabilities. By exploiting these capabilities, attackers reduce our ability to acquire and act upon desired information. Even if a traditional denial of service attack against a machine is not possible, the human utilizing the machine may still succumb to DoI attack. When successful, DoI attacks actively alter our decision making, often without our knowledge. In this dissertation, we address the problem of countering DoI attacks. We begin by presenting a taxonomy and framework of DoI attacks and countermeasures to add structure to the problem space. We then closely examine the use of information visualization as a countermeasure. Information visualization is a powerful technique that taps into the high bandwidth visual recognition capability of the human and is well suited to resist DoI attack. Unfortunately, most information visualization systems are designed without a clear emphasis on protecting the human from malicious activity. To address this issue we present a general framework for information visualization system security analysis. We then delve deeply into countering DoI in the network security domain using carefully crafted information visualization techniques to build a DoI attack resistant security visualization system. By creating such a system, we raise the bar on adversaries who now must cope with visualization enhanced humans in addition to traditional automated intrusion detection systems and text-based analysis tools. We conclude with a human-centric evaluation to demonstrate our systems effectiveness.
3

Didelio meistriškumo stalo tenisininkų(-ių) pirmųjų trijų smūgių koncepcijos taikymo rezultatyvumas / Three smashes attacking tactics rezults of high level men and women table tennis players

Rybakas, Artūras 26 May 2006 (has links)
The purpose of this research was to explore the three smashes attacking tactics wich is used by professional table tennis players all over the world. While analysing the game of world‘s elite and top lithuanian men and women players such videotapes of 2005 were used during this work: World Cup (Belgium, October), Lithuania‘s Top 12 competition (Kaunas, December), The Women Euroleague (Kaunas, November). This research incorporates an analyse of 20 players: 6 world men elite players and 6 lithuanian men top players, 4 world class and 4 Lithuanian women players. During the time of research 20 issues were explored: after concluding the results it was estimated how many points are being won by tree smashes attacking conception – completing the service, accepting the service, after completing the serve and winning the point by the third smash, after accepting the service and winning the point by the third smash. Also, it was backhand and forehand smashes explored concerning their effect by using three smashes conception. It emerged that world‘s elite men players win 59,33% points by using three smashes conception while lithuanian men top players win 69,83% points by using the same tactics in the game. World class women players are able to win 75,50% by using an attacking tree points concept, while lithuanian top women players achieve the result of 73,00% by using the same style. World top class players during the first three points win about 33,99% by using their forehand and... [to full text]
4

Fotbollsmålvaktens involvering i lagets offensiva spel / The football goalkeeper's involvement in the teams offensive game

Arnshed, Stefan January 2021 (has links)
Syfte: Syftet är att identifiera målvaktens involvering i spelet för ett elitsatsande U17-lag, samt analysera om ökat deltagande av målvakten i spelet statistiskt leder till fler respektive färre offensiva bollkontroller, målchanser, samt mål. Metod: Arbetet har genomförts utifrån en strukturerad empirianalys av formen icke- deltagande observationsstudie. Till analysen hade ett okomplicerat kodningsschema konstruerats. Datan analyserades utifrån fyra faktorer med utgångspunkt i målvaktens involvering vid uppbyggnadsspel. Efter bearbetning utfördes en tematisk analys på resultat för att identifiera liknande teman kopplat till målvaktens involvering. Empirin analyserades från programmet HUDL där samtliga 26 relevanta matcher från säsongen 2020 fanns tillhanda. Teori: Arbetets teoretiska ramverk är beslutsfattandeteorin. Den härstammar från decision field theory som utvecklats av Busemeyer och Townsend (1993) och är i grunden en spelteori. Resultat och slutsatser: Under säsongen avancerade laget till offensiv planhalva med bollkontroll 1050 gånger, vilket gav ett snittvärde på 40,4 gånger per match. Av dessa var målvakten direkt eller indirekt involverad i 44%. Laget avancerade ytterligare till sista offensiva tredjedel 596 gånger (22,9 i snitt) och samma siffra för målvakten var då 40%. Vidare var målvakten direkt eller indirekt involverade i 42% av lagets 313 (12 i snitt) målchanser och 28% av lagets 36 mål (1,4 i snitt) som utgick från uppbyggnadsspelet. Avslutningsvis fanns det även ett psykologiskt och positionsbaserat övertag som skapas av att involvera målvakten i spelet. Genom att använda målvakten som en extra mittback möjliggjordes minskade bolltapp, ökat bollinnehav, större kontroll av spelet och därigenom möjlighet att styra matchbilden. / Purpose: The purpose of this study is to identify the goalkeeper’s involvement in the game for an elite development U17-team, and to analyze if increased involvement of the goalkeeper in the game, statistically leads to more or fewer offensive ball controls, goal chances, and goals. Method: The study was performed based on a structured data analysis with a non- participation observational study. To the analysis, a simple coding scheme was created. The data analysis was based on four factors connected to the goalkeeper’s involvement during the initial play. After the processing, a thematic analysis was applied to the results with the purpose of identifying similar themes connected to the goalkeeper’s involvement. The data was analyzed from the program HUDL where all 26 relevant games from the 2020 season existed. Theory: The studies theoretical framework was decision-making theory. It is based on decision field theory which was developed by Busemeyer and Townsend (1993) which from the start is a game theory. Results and conclusion: During the season, the team advanced to the offensive half with ball control 1050 times, which indicated 40,4 on average per game. The goalkeeper was directly or indirectly involved in 44%. The team advanced to the last third of the field 596 times (22,9 on average) and the goalkeeper was involved 40%. Furthermore, the goalkeeper was directly or indirectly involved in 42% out of the teams 313 goal chances (12 on average) and 28% out of 36 goals (1,4 on average). There is also a psychological and position-based advantage being created by involving the goalkeeper in the game. By using the goalkeeper as an extra central defender, is enables less ball losses, increased possession, larger control of the game and thereby possibility to control the game structure.

Page generated in 0.0586 seconds