Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tittel
Viser treff 704-723 av 2543
-
Detecting network anomalies in Ethernet/MPLS/IP networks using Ethernet OAM performance data
(Master thesis, 2021)The effective monitoring of big data and telecom networks is becoming more and more crucial nowadays. Network anomalies can cause a decrease in performance , prevent the normal functioning of a network or put the network ... -
Detecting packed and encrypted malware samples using STAtic Malware-as-Image Network Analysis (STAMINA)
(Master thesis, 2021)Vi ser daglig over 350,000 [1] skadevarer eller såkalte potensielt uønskede applikasjoner. Omfanget er så stort at det ikke er mulig for analytikere å prosessere og analysere alle disse filene. I tillegg så har vi flere ... -
Detecting PowerShell obfuscation using machine learning
(Master thesis, 2021)PowerShell har blitt veldig populært blant angripere. Grunnen er at PowerShell gir muligheten til å "leve av landet" i et kompromittert system, og enkelheten ved å utføre såkalte filløse angrep, ved å holde skadelige ... -
Detecting Remote Administration Trojans through Dynamic Analysis using Finite-State Machines
(Master thesis, 2014)ENGLISH: In this master’s thesis we show how we can use the Application Programming Interface (API) calls a program makes to detect if it is a Remote Administration Trojan (RAT) or not. We have looked at which API calls ... -
Detecting Sexual Predatory Chats by Perturbed Data and Balanced Ensembles
(Chapter, 2021)Securing the safety of the children on online platforms is critical to avoid the mishaps of them being abused for sexual favors, which usually happens through predatory conversations. A number of approaches have been ... -
Detecting Windows Based Exploit Chains by Means of Event Correlation and Process Monitoring
(Journal article; Peer reviewed, 2019)This article presents a novel algorithm for the detection of exploit chains in a Windows based environment. An exploit chain is a group of exploits that executes synchronously, in order to achieve the system exploitation. ... -
Detecting Wireless Identity Spoofs in Urban Settings, Based on Received Signal Strength Measurements
(Master thesis, 2010)The most common gateway for executing attacks in 802.11 networks are the MACspoofing attack. Current Todays Wireless IDS implements different methods todetect MAC spoofing, but are particularly interested in using methods ... -
Detection of cyber grooming during an online conversation
(Master thesis, 2019)Internett fasilitert grooming er et fremtredende samfunnsproblem, og få løsninger for å mitigere problemet eksisterer. Én av fem midreårige har vært utsatt for uønsket seksuelt innhold, og en av ni har opplevd uønskede ... -
Detection of Glasses in Near-Infrared Ocular Images
(Chapter, 2018)Eyeglasses change the appearance and visual perception of facial images. Moreover, under objective metrics, glasses generally deteriorate the sample quality of near-infrared ocular images and as a consequence can worsen ... -
Detection of Hidden Software Functionality
(Master thesis, 2007)Downloading software from unknown sources constitutes a great risk. Studies have described file-sharing networks where the probability of downloading infected files is as high as 70% [1] under certain circumstances. This ... -
Detection of intermediary hosts through TCP latency propagation
(Master thesis, 2009)Today people from all lifestyles, government officials, researchers and executives use internet. The people start to depend on internet for their daily life. However, the increased dependence comes with a great risk. The ... -
Detection of Masqueraded Wireless Access Using 802.11 MAC Layer Fingerprints
(Journal article; Peer reviewed, 2013)Many wireless Internet access operators prefer open local area network (WLAN) access because this reduces the need for user assistance for a variety of smaller devices. A 802.11 MAC spoofer masquerades as an authorized ... -
Detection of Previously Unseen Malware using Memory Access Patterns Recorded Before the Entry Point
(Chapter, 2021)Recently it has been shown, that it is possible to detect malware based on the memory access patterns produced before executions reaches its Entry Point. In this paper, we investigate the usefulness of memory access patterns ... -
Detection of Running Malware Before it Becomes Malicious
(Peer reviewed; Journal article, 2020)As more vulnerabilities are being discovered every year [17], malware constantly evolves forcing improvements and updates of security and malware detection mechanisms. Malware is used directly on the attacked systems, thus ... -
Detection of Synthetic Videos using Temporal Convolutional Networks
(Master thesis, 2021)Å generere ansiktssyntetiserte videoer er ikke en ny teknologi. Dette er noe som er gjort i flere år ved bruk av visuelle effekter og dataanimasjon. Hittil har dette krevd avansert kunnskap innen videoredigering for å oppnå ... -
Detection of worms in error diffusion halftoning
(Proceedings of SPIE;7242, Journal article; Peer reviewed, 2009)Digital halftoning is used to reproduce a continuous tone image with a printer. One of these halftoning algorithms, error diffusion, suffers from certain artifacts. One of these artifacts is commonly denoted as worms. We ... -
Determining the age and gender of an individual based on text classification - Comparing two binary classifications with one 4-class classification
(Master thesis, 2021)Alder og kjønndeteksjon er en av verktøyene som kan brukes for å sørge for en form for sikkerhet i chatterom. Ved å finne riktig aldersgruppe på en bruker ved hjelp av teksten den har skrevet, kan denne studien beskytte ... -
Developing a Cyber Template to improve communication during Cyber Threat Situations
(Master thesis, 2023)En cybertrusselsituasjon oppstår når en organisasjon blir angrepet av et cyberangrep. For å begrense mulig skade og gjenopprette normal drift er kommunikasjon avgjørende. Informasjon om cybertrusselsituasjonen må kommuniseres ... -
Developing a Framework for Cybersecurity Evaluation in the Consumer Internet of Things
(Bachelor thesis, 2022)Fagfeltet IoT består av en mengde verktøy, teknologier og metoder som er under utvikling. Gjennom sensorer og bruk av applikasjoner, samler, prosesserer, genererer og forflytter enheten informasjon som kan være sensitiv ... -
Developing a testbed for Intelligent Transportation Systems
(Master thesis, 2018)It is estimated that the average UK commuter spent on average 32 hours stuck in traffic jams in 2017 and that our car park is growing from 1.2 billion cars to 2 billion cars within 2035. In recent years there has been ...