Ibrahim Ghafir
Doctoral thesis
Network-based targeted attacks detection
Network-based targeted attacks detection
Abstract:
V posledních letech počítačové útoky způsobily značné finanční ztráty a byly schopny zastavit i některé základní veřejné služby. Mezi těmito útoky se objevily hrozby ATP (Advanced Persistent Threats - Pokročilé trvalé hrozby) jako nové bezpečnostní riziko, které zasáhlo řadu společností a organizací. Útočníci mohou monitorovat a sledovat cílovou organizaci, rušit její funkce a ukrást důvěrné informace …moreAbstract:
Over the past decade, cyber attacks have caused substantial financial losses and been able to stop fundamental public services. Among these attacks, Advanced Persistent Threats (APTs) have emerged as a new security risk hitting selected companies and organisations. The attackers can monitor and spy on the target organisation, disturb its functions and steal confidential information. Furthermore, APTs …more
Language used: English
Date on which the thesis was submitted / produced: 8. 10. 2018
Identifier:
https://is.muni.cz/th/iq0qi/
Thesis defence
- Date of defence: 16. 4. 2019
- Supervisor: prof. Ing. Václav Přenosil, CSc.
- Reader: Assoc. Prof. Nikolai Stoianov, Prof. Robert M. Newman, Prof. Dr. Burkhard Stiller
Citation record
Full text of thesis
Contents of on-line thesis archive
Published in Theses:- světu
Other ways of accessing the text
Institution archiving the thesis and making it accessible: Masarykova univerzita, Fakulta informatikyMasaryk University
Faculty of InformaticsDoctoral programme / field:
Informatics (4-years) / Computer Systems and Technologies (eng.)
Theses on a related topic
-
Advanced Persistent Threat: koncept, případy a kritéria
Alena Leciánová -
Emulation and Detection of Cyber Threat Scenarios
Zargham Ahmad -
Intrusion Detection System with k-means data mining and outlier detection approach
Sandeep Kumar Chandel -
Attacks on censorship circumvention with intrusion detection systems
Vladimír Kravčík -
Network intrusion detection system using Deep learning Approach
Senait Molla Meressa -
Evolutionary optimization of intrusion detection system in wireless sensor networks
Adam Saleh -
Optimization of intrusion detection systems in wireless sensor networks
Martin Stehlík -
Wireless network security for critical infrastructure business: A comparative study of intrusion detection systems
Akbar Adylkhanov