Blar i NTNU Open på forfatter "Katt, Basel"
-
Detecting Windows Based Exploit Chains by Means of Event Correlation and Process Monitoring
Yamin, Muhammad Mudassar; Katt, Basel; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)This article presents a novel algorithm for the detection of exploit chains in a Windows based environment. An exploit chain is a group of exploits that executes synchronously, in order to achieve the system exploitation. ... -
Developing Security Assurance Metrics to Support Quantitative Security Assurance Evaluation
Wen, Shao-Fang; Shukla, Ankur; Katt, Basel (Journal article; Peer reviewed, 2022)Security assurance (SA) is a technique that helps organizations to appraise the trust and confidence that a system can be operated correctly and securely. To foster effective SA, there must be systematic techniques to ... -
Development of Ontology-Based Software Security Learning System with Contextualized Learning Approach
Wen, Shao-Fang; Katt, Basel (Journal article; Peer reviewed, 2019)Learning software security is one of the most challenging tasks in the information technology sector due to the vast amount of security knowledge and the difficulties in understanding the practical applications. The ... -
Difficult SQLi Code Patterns for Static Code Analysis Tools
Schuckert, Felix; Katt, Basel; Langweg, Hanno (Peer reviewed; Journal article, 2020)We compared vulnerable and xed versions of the source code of 50 dierent PHP open source projects based on CVE reports for SQL injection vulnerabilities. We scanned the source code with commercial and open source tools for ... -
Digital transformation of public security - developing tripleloop- learning artifacts to meet emerged information security incident response resilience and readiness challenges in public emergency organizations
Østby, Grethe (Doctoral theses at NTNU;2023:112, Doctoral thesis, 2023)Studies have found that resilience and response capabilities in a cyber-attack are unfamiliar to organizations, and it is also found that not only the IT-personnel, but also the crisis management group and teams need ... -
Digital-communication and -security in volunteer organizations
Johnsen, Cathinka G. (Master thesis, 2022)I dagens samfunn hvor mange systemer settes sammen i større systemer, og folk blir bare mer vant til den tekonolgien som til stadighet er tilstede i hverdagen. Vil det fortsette å være the samme utfordringene med personvern ... -
Ethical Problems and Legal Issues in Development and Usage Autonomous Adversaries in Cyber Domain
Yamin, Muhammad Mudassar; Katt, Basel (Journal article; Peer reviewed, 2019)An autonomous adversaries in cyber domain are new type of adversaries present in a cyber security exercise. Traditionally, adversaries in cyber security exercises are human who perform the roles of attackers and defenders. ... -
Expanding the Capabilities of Cyber Range Attack Agents
Færøy, Fartein Lemjan (Master thesis, 2022)Enheter knyttet til Tingenes Internett (IoT)-domenet er i ferd med å bli en del av vårt daglige liv; fra kroppsmonitorer til kritisk infrastruktur brukes de overalt. Dette gjør dem til ideelle mål for aktører som ønsker å ... -
Exploring the role of assurance context in system security assurance evaluation: a conceptual model
Wen, Shao-Fang; Katt, Basel (Peer reviewed; Journal article, 2023)Purpose Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in these evaluations is the assurance ... -
GDPR, personvern, IT-sikkerhet i fagsystemer med GPS-sporing
Aasheim, Schulze Simon; Berntzen, Erik; Berntzen, Sondre; Lindaas, Morten (Bachelor thesis, 2021)GDPR og personvernreglementet i Norge stille store krav til alle bedrifter som nytter seg av GPS verktøy i yrkessammenheng, være det bruker eller utvikler. Det er en rekke vurderinger som må bli gjort i henhold til hvorvidt ... -
Generating historical network logs for cyber range exercises
Isnes, Christian Simoes (Master thesis, 2023)Cyberangrep blir stadig mer vanlige, og studier viser at trusler fra Advanced Persistance Threats (APT'er), øker eksponentielt. Trening av cybersikkerhetsprofesjonelle i realistiske miljøer er avgjørende for å være forberedt ... -
Hybrid IoT Cyber Range
Balto, Karl Edvard (Master thesis, 2022)Bruken av IoT enheter har økt kraftig de siste årene, utviklingen av nye enheter går fort, prisene presses og dermed må også kostnadene reduseres. IoT enheter får flere og flere oppgaver der det blir mer kritisk at enhetene ... -
Hybrid IoT Cyber Range
Edvard Balto, Karl; Yamin, Muhammad Mudassar; Shalaginov, Andrii; Katt, Basel (Peer reviewed; Journal article, 2023)The use of IoT devices has increased rapidly in recent times. While the development of new devices is moving quickly, and as prices are being forced down, the costs of developing such devices also needs to be reduced. IoT ... -
Implementation of Insider Threat Detection System Using Honeypot Based Sensors and Threat Analytics
Yamin, Muhammad Mudassar; Katt, Basel; Sattar, Kashif; Bin Ahmed, Maaz (Journal article; Peer reviewed, 2019)An organization is a combination of vision, technology and employees. The well being of organization is directly associated with the honesty of its workers. However, an organization is also threatened by misuse of information ... -
Learning Software Security in Context: An Evaluation in Open Source Software Development Environment
Wen, Shao-Fang; Katt, Basel (Chapter, 2019)Learning software security has become a complex and difficult task today than it was even a decade ago. With the increased complexity of computer systems and a variety of applications, it is hard for software developers ... -
Managing Software Security Knowledge in Context: An Ontology Based Approach
Wen, Shao-Fang; Katt, Basel (Journal article; Peer reviewed, 2019)Knowledge of software security is highly complex since it is quite context-specific and can be applied in diverse ways. To secure software development, software developers require not only knowledge about general security ... -
Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security
Yamin, Muhammad Mudassar; Ullah, Mohib; Ullah, Habib; Katt, Basel; Hijji, Mohammad; Muhammad, Khan (Peer reviewed; Journal article, 2022)Open-source intelligence (OSINT) tools are used for gathering information using different publicly available sources. With the rapid advancement in information technology and excessive use of social media in our daily ... -
A Metamodel for Web Application Security Evaluation
Wen, Shao-Fang; Katt, Basel (Chapter, 2023)In the digital era, web applications have become a prevalent tool for businesses. As the number of web applications continues to grow, they become enticing targets for malicious actors seeking to exploit potential security ... -
Modeling and Executing Cyber Security Exercise Scenarios in Cyber Ranges
Yamin, Muhammad Mudassar; Katt, Basel (Peer reviewed; Journal article, 2022)The skill shortage in global cybersecurity is a well-known problem; to overcome this issue, cyber ranges have been developed. These ranges provide a platform for conducting cybersecurity exercises; however, conducting such ... -
Modelling and Analyzing Attack- Defense Scenarios for Cyber- Ranges
Yamin, Muhammad Mudassar (Doctoral theses at NTNU;2022:134, Doctoral thesis, 2022)Rome was not built in a day, but it was burnt to the ground in only six. Wood naturally catches fire, and without adequate engineering, fireproof houses and training for firefighters, destruction caused by fire is inevitable. ...