Security Attack
-
In this paper, we will consider 02 problems with traditional digital signature schemes. The first problem will be related to multi-target attacks, which are often considered on the family of hash-based digital signature schemes such as XMSS, HORST, and FORST that are proposed as candidates for post-quantum cryptography.
10p viyoko 01-10-2024 2 1 Download
-
In this study, we propose a method for generating mutated Windows malware against malware detection based on ensemble learning by combining GANs and RL to overcome the limitations of the MalGAN model.
15p viyoko 01-10-2024 2 1 Download
-
In this paper, we research and propose a network attack detection framework using a 2-stage classification algorithm with an Autoencoder model, integrating online stream processing technology based on Apache Kafka and Spark technology.
17p viyoko 01-10-2024 3 1 Download
-
In this article, we have researched, compared and evaluated current methods for solving problems such as data augmentation, data generation via generative networks and classing importance control. Additionally, we will also provide a brief overview of existing datasets for intrusion detection in wireless networks.
12p viyoko 01-10-2024 5 1 Download
-
In this paper, we propose a novel DL-based solution for web attack detection, named DL-WAD, leveraging deep learning and natural language processing techniques. Moreover, DL-WAD is designed with a data preprocessing mechanism aimed at differentiating between regular web requests and malicious ones that carry attack payloads encompassing multiple types of web attacks.
11p viyoko 01-10-2024 6 1 Download
-
This paper proposes and implements a model combining Zalo and end-toend encryption to apply in digital transformation. The main idea is to promote the strengths of the Zalo social network to exchange information and manage work but ensure information confidentiality for both the server and man-in-the-middle attacks based on the end-to-end encryption model.
14p viyoko 01-10-2024 3 1 Download
-
Regular expressions, or regexes, have become an integral part of modern software development, seamlessly woven into the fabric of countless applications. This paper explores the inherent ambiguity of regular expressions, fuzzing with static analysis and proposes a novel fuzzing technique to generate effective attack patterns.
11p viyoko 01-10-2024 4 1 Download
-
Lecture "On safety and security of information systems: Malicious attacks" provide students with knowledge about: Malicious attack; The common types of malicious attacks; Attack tools; Malicious software;... Please refer to the detailed content of the lecture!
39p hoabingan205 12-12-2022 22 6 Download
-
Research Aims: The thesis aims to develop deep neural networks for analyzing security data. These techniques improve the accuracy of machine learning-based models applied in NAD. Therefore, the thesis attempts to address the above challenging problems in NAD using models and techniques in deep neural networks. Specifically, the following problems are studied.
128p armyofthedead 23-06-2021 13 3 Download
-
These formal definitions often seem far stronger than necessary for practical security — many cryptosystems used in practice do not satisfy the formal definitions. This includes typical ElGamal implementations. The attacks discussed in this paper suggest that it is worth striving to meet formal definitions of security in actual implementations.
35p haphuonglan2021 25-04-2021 39 6 Download
-
This paper will focus on the elements of cyber security specially concentrating on the element DISASTER RECOVERY/ BUSINESS CONTINUING PLAN. This paper will also explain other elements briefly.
9p guineverehuynh 21-06-2020 26 3 Download
-
Bài giảng "An toàn mạng máy tính nâng cao - Chương 6: Web application security" cung cấp cho người học các kiến thức về bảo mật ứng dụng Web, web application attack and defense. Đây là một tài liệu hữu ích dành cho các bạn sinh viên và những ai quan tâm dùng làm tài liệu học tập và nghiên cứu.
51p tieu_vu12 03-07-2018 99 15 Download
-
Chapter 3 - Attacks and malicious code (part 1). After reading the material in this chapter, you should be able to: Explain denial-of-service (DoS) attacks, explain and discuss ping-of-death attacks, identify major components used in a DDoS attack and how they are installed, understand major types of spoofing attacks.
43p nhanmotchut_3 20-10-2016 63 4 Download
-
Chapter 3 - Attacks and malicious code (part 2). After studying this chapter you will be able to: Discuss man-in-the-middle attacks, replay attacks, and TCP session hijacking; detail three types of social-engineering attacks and explain why they can be incredibly damaging; list major types of attacks used against encrypted data; list major types of malicious software and identify a countermeasure for each one.
43p nhanmotchut_3 20-10-2016 64 6 Download
-
The following will be discussed in this chapter: Describle endpoint security with IronPort; describle endpoint security with Network Admission Control; describle endpoint Security with Cisco Security Agent; describle MAC address spoofing attacks, STP manipulation attacks, MAC address overflow attacks, LAN storm attacks, and VLAN attacks;...
143p youcanletgo_01 04-01-2016 74 5 Download
-
In this chapter: Explain the basic concepts of a switched environment, configure initial settings on a Cisco switch, configure switch ports to meet network requirements, configure the management switch virtual interface, describe basic security attacks in a switched environment, describe security best practices in a switched environment, configure the port security feature to restrict network access.
52p youcanletgo_01 29-12-2015 89 6 Download
-
Bài 4 trình bày về bảo mật Layer 2. Nội dung chính của chương này gồm: Giới thiệu bảo mật ở lớp 2, tấn công giả mạo MAC Address, tấn công đánh tràn bảng MAC, thay đổi cây STP, LAN storm Attack, cấu hình Layer 2 Security. Mời các bạn cùng tham khảo.
27p kiepnaybinhyen_02 25-12-2015 107 14 Download
-
Objectives of Chapter 1: To define three security goals; to define security attacks that threaten security goals; to define security services and how they are related to the three security goals; to define security mechanisms to provide security services; to introduce two techniques, cryptography and steganography, to implement security mechanisms
4p levuphongqn 18-08-2015 74 2 Download
-
Lecture Operating System: Chapter 09 - Security presented The security environment, Basics of cryptography, User authentication, Attacks from inside the system, Attacks from outside the system, Protection mechanisms, Trusted systems.
56p talata_1 22-09-2014 90 7 Download
-
Q: Are pings forwarded by routers? A: Yes! This is why you can ping devices all over the Internet. Q: Do all devices forward or respond to pings? A: No, this is up to the network administrator of the device. Devices, including routers, can be configured not to reply to pings (ICMP echo requests). This is why you may not always be able to ping a device. Also, routers can be configured not to forward pings destined for other devices.
27p vanmanh1008 21-05-2013 45 4 Download