Buscar
Mostrando ítems 1-10 de 1396
An Intrusion Detection System for Web-Based Attacks Using IBM Watson
(2022-02-01)
The internet and web applications have been growing steadily and together with the increasing number of cyber attacks. These attacks are carried out through requests that are considered normal or abnormal (attack requests). ...
IoT Honeynet com Emulação da Internet
(Universidade Federal de São CarlosUFSCarPrograma de Pós-Graduação em Ciência da Computação - PPGCCCâmpus São Carlos, 2019-02-25)
This work argues that the growth in numbers of IoT (Internet of Things) in our lives (eg Amazon Echo, cameras, etc.), as well as their increasing computing power, arouses the interest of hackers and consequently, their ...
#Attack on Titan: engajamento transmidiático em comunidades de fãs no Tumblr
(Universidade Federal de Minas GeraisUFMG, 2018-06-29)
The Japanese production Attack on Titan was among the most talked about subjects on Tumblr network in the year of 2017, according to Fandometrics page. Encouraged by the release of the second season, between April and June ...
Um sistema para gestão do conhecimento em ameaças, vulnerabilidades e seus efeitos
(Universidade Federal do Rio Grande do NorteBRUFRNPrograma de Pós-Graduação em Engenharia ElétricaAutomação e Sistemas; Engenharia de Computação; Telecomunicações, 2005-12-20)
Attacks to devices connected to networks are one of the main problems related to the confidentiality of sensitive data and the correct functioning of computer systems. In spite of the availability of tools and procedures ...
A new multi-label dataset for Web attacks CAPEC classification using machine learning techniques
Context: There are many datasets for training and evaluating models to detect web attacks, labeling each request as normal or attack. Web attack protection tools must provide additional information on the type of attack ...
3D Network Traffic Monitoring Based on an Automatic Attack Classifier
(Springer, 2014-01-01)
In the last years, the exponential growth of computer networks has created an incredibly increase of network data traffic. The management becomes a challenging task, requesting a continuous monitoring of the network to ...
3D network traffic monitoring based on an automatic attack classifier
(2014-01-01)
In the last years, the exponential growth of computer networks has created an incredibly increase of network data traffic. The management becomes a challenging task, requesting a continuous monitoring of the network to ...
Effective filter for common injection attacks in online web applications
Injection attacks against web applications are still frequent, and organizations like OWASP places them within the Top Ten of security risks to web applications. The main goal of this work is to contribute to the community ...
Análisis de vulnerabilidades de suplantación en el protocolo tcp/ip e implementación de controles de mitigación.
(Machala : Universidad Técnica de Machala, 2018)
The spoofing attacks in the TCP / IP protocol are those in which the attacker conceals his identity, making the other members of a network believe that it is a known or authorized device. These attacks can occur at various ...