Search results for "malware"
showing 10 items of 32 documents
Review of detection, assessment and mitigation of security risk in smart grid
2017
The integration of Information and Communication Technology (ICT) into the existing power grid has created new problems to the grid. The grid network has become more vulnerable to security threats and risk which is a corollary to the modern data network. Smart Grid has strict latency requirement for data communication and the violation of this latency is very costly. This paper assesses the threats and vulnerabilities associated with the Smart Grid network and reviews the methods to mitigate these security risks.
Verkkohuijausten tyypit sosiaalisessa mediassa
2017
Types of online scams in social media. In this thesis, types of online scams in social media are examined first by defining online scams and then applying the principles of them to social media setting. The thesis is a literature review in which it was found that in social media there are similar types of scams than outside of it. These types of scams were phishing scams, scams related to social engineering malware attacks and 419 -scams. There were a couple of scam scenarios that were not detected outside of social media context due to social networking site required as a platform for the scams. These were scams involving impersonation of celebrities or friends, services offering followers…
First global next-to-leading order determination of diffractive parton distribution functions and their uncertainties within the {\tt xFitter} framew…
2018
We present {\tt GKG18-DPDFs}, a next-to-leading order (NLO) QCD analysis of diffractive parton distribution functions (diffractive PDFs) and their uncertainties. This is the first global set of diffractive PDFs determined within the {\tt xFitter} framework. This analysis is motivated by all available and most up-to-date data on inclusive diffractive deep inelastic scattering (diffractive DIS). Heavy quark contributions are considered within the framework of the Thorne-Roberts (TR) general mass variable flavor number scheme (GM-VFNS). We form a mutually consistent set of diffractive PDFs due to the inclusion of high-precision data from H1/ZEUS combined inclusive diffractive cross sections me…
Detection of algorithmically generated malicious domain names using masked N-grams
2019
Abstract Malware detection is a challenge that has increased in complexity in the last few years. A widely adopted strategy is to detect malware by means of analyzing network traffic, capturing the communications with their command and control (C&C) servers. However, some malware families have shifted to a stealthier communication strategy, since anti-malware companies maintain blacklists of known malicious locations. Instead of using static IP addresses or domain names, they algorithmically generate domain names that may host their C&C servers. Hence, blacklist approaches become ineffective since the number of domain names to block is large and varies from time to time. In this paper, we i…
Técnicas de aprendizaje automático para la detección de dominios maliciosos generados algorítmicamente
2022
Durante los últimos años, el desarrollo de software malicioso (malware) ha pasado de ser un sector donde la principal motivación era el reconocimiento de la comu- nidad a convertirse en un auténtico negocio multimillonario. Entre las diferentes técnicas que los desarrolladores de malware han empleado para dificultar su de- tección, está el uso de algoritmos de generación de dominios (en inglés, Domain Generation Algorithms o DGA). En el trabajo plasmado en esta tesis doctoral se ha analizado la problemática de esta técnica, se han revisado los diferentes tipos de algoritmos que se pueden encontrar y se ha estudiado el estado del arte en la detección de este tipo de algoritmos en cuanto a té…
Security Implications of Using Third-Party Resources in the World Wide Web
2018
Modern web pages have nothing in common with the static connotation coming from the word “page” - it is a dynamic unique experience created by active content and executed within browser, just-in-time assembled from various resources hosted on many different domains. Active content increases attack surface naturally exposing users to many novel threats. A popular security advice has been to deploy active content blocker plugins like NoScript, unfortunately they are not capable to effectively stop the attacks. Content Security Policy (CSP) can be effective against these attacks, but we demonstrate how poor decisions made by website administrators or external resource hosters can render CSP in…
Interneta drošības risinājumi
2015
Interneta drošības risinājumi. Oskars Veiss, darba vadītājs Latvijas Universitātes lektors Valdis Auza. Darba mērķis: Noskaidrot izkliedētā pakalpojuma attāluma(DDOS) un mēstuļu izplatību Latvijā un Pasaulē. Darba uzdevumi: 1.Apspoguļot izkliedētā pakalpojuma attāluma(DDOS) uzbrukumu būtību. 2.Apkopot informācija par tā attīstību (DDOS) 3.Izpētīt uzņēmuma aizsardzību pret šādiem uzbrukumiem 4.Sniegt rininājumus un priekšlikumus to novēršanai Pētījumā secināts, ka uzņēmuma nav izstrādāta efektīva aizsardzība pret šiem uzbrukumiem. Sniegti risinājumi un priekšlikumi tā aizsardzībai. Darbs satur 60lpp, 23 attēlus, 1 pielikums. Darba praktiskajā daļā veikta aptauja uzņēmumā „X”. Respondentu ska…
Virtual USB honeypot
2019
This paper presents the implementation of a malware trap device. We created a virtual usb device through the use of microvisor on the ARM platform.
Image-based and range-based 3D modelling of archaeological cultural heritage: The telamon of the temple of Olympian Zeus in Agrigento (Italy)
2012
Abstract. The Temple of Olympian Zeus in Agrigento (Italy) was one of the largest temple and at the same time one of the most original of all the Greek architecture. We don’t know exactly how it was because the temple is now almost completely destroyed but it is very well-known for the presence of the Telamons. The Telamons were giant statues (about 8 meters high) probably located outside the temple to fill the interval between the columns. In accordance with the theory most accredited by archaeologists the Telamons were a decorative element and also a support for the structure. However, this hypothesis has never been scientifically proven. One Telamon has been reassembled and is shown at t…
Support vector machine integrated with game-theoretic approach and genetic algorithm for the detection and classification of malware
2013
Abstract. —In the modern world, a rapid growth of mali- cious software production has become one of the most signifi- cant threats to the network security. Unfortunately, wides pread signature-based anti-malware strategies can not help to de tect malware unseen previously nor deal with code obfuscation te ch- niques employed by malware designers. In our study, the prob lem of malware detection and classification is solved by applyin g a data-mining-based approach that relies on supervised mach ine- learning. Executable files are presented in the form of byte a nd opcode sequences and n-gram models are employed to extract essential features from these sequences. Feature vectors o btained are…