Loading...
Search for: threat
0.007 seconds
Total 23 records

    Malicious Network Flow Detection based on Behavioral Characteristics of Users

    , M.Sc. Thesis Sharif University of Technology Zargar, Abolfazl (Author) ; Jalili, Rasoul (Supervisor)
    Abstract
    Insider threat is a significant security risk for organizations and hard to detect. Most of introduced detection methods need contextual data entries about users, or preprocessed user activity logs to detect insider threats while it is costly and time-consuming. In this thesis, we introduce a behavior analysis method that learns its context and detects multiple types of insider threats from raw logs and network traffic in real-time. This method, named XABA, learns user roles and exclusive behaviors, through analyzing raw logs related to each network session of the user. Then it checks for some abnormal patterns, and if so, triggers the appropriate alert. XABA is implemented on the big-stream... 

    The Insider Threat: Analyzing and Modeling

    , M.Sc. Thesis Sharif University of Technology Amin, Assiabi (Author) ; Hendesi, Faramarz (Supervisor)
    Abstract
    Nowadays, most of businesses are becoming computer-based. This trend causes the organizations to become more vulnerable to internal and external threats. Internal threats are done through insiders. Insiders unlike outsiders have capabilities which aid them to easily carry out their illicit activities. Unfortunately, most of research in computer security has focused on the outsider threats, whereas the most damaging is the result of insiders’ illicit activities.This dissertation addresses three primary necessities of the research in the area of insider threat: a consistent definition of insider threat, a classification of types of insider threats, and a classification of vulnerabilities which... 

    Sharif repository-A threatened-based software security evaluation method

    , Article International ISC Conference on Information Security and Cryptology, ISCISC(11th: 2014:) ; Sept , 2014 , p. 120-125 Razian, M. R ; Sangchi, H. M ; Sharif University of Technology
    Abstract
    Nowadays, security evaluation of software is a substantial matter in software world. Security level of software will be determined by wealth of data and operation which it provides for us. The security level is usually evaluated by a third party, named Software Security Certification Issuance Centers. It is important for software security evaluators to perform a sound and complete evaluation, which is a complicated process considering the increasing number of emerging threats. In this paper we propose a Threatened-based Software Security Evaluation method to improve the security evaluation process of software. In this method, we focus on existing threatened entities of software which in turn... 

    A comprehensive survey of proton beam therapy research and development in Iran

    , Article Frontiers in Biomedical Technologies ; Volume 8, Issue 1 , 2021 , Pages 9-19 ; 23455829 (ISSN) Piruzan, E ; Vosoughi, N ; Mahani, H ; Sharif University of Technology
    Tehran University of Medical Sciences  2021
    Abstract
    Purpose: Proton Beam Therapy (PBT) is an emerging radiotherapy technique using beams of proton to treat cancer. As the first report addressing the topic, the principal aim is to highlight the present status of PBT research and development in Iran as a developing country. Materials and Methods: To do so, the demand for PBT in Iran and Iran National Ion Therapy Center (IRNitc) was investigated and introduced. Then, Scopus and PubMed were searched for studies that dealt with PBT research in Iran and subsequently 6 major subfields of interest were identified. Furthermore, international collaborations were extracted from the bibliographic data. To combine both research and development sides, a... 

    An efficient spam mail detection by counter technique

    , Article World Academy of Science, Engineering and Technology ; Volume 50 , May , 2011 , Pages 573-576 ; 2010376X (ISSN) Kholghi, R ; Behnam Roudsari, S ; Nemaney Pour, A ; Sharif University of Technology
    Abstract
    Spam mails are unwanted mails sent to large number of users. Spam mails not only consume the network resources, but cause security threats as well. This paper proposes an efficient technique to detect, and to prevent spam mail in the sender side rather than the receiver side. This technique is based on a counter set on the sender server. When a mail is transmitted to the server, the mail server checks the number of the recipients based on its counter policy. The counter policy performed by the mail server is based on some pre-defined criteria. When the number of recipients exceeds the counter policy, the mail server discontinues the rest of the process, and sends a failure mail to sender of... 

    Analysis of Authentication Protocols in RFID Systems

    , M.Sc. Thesis Sharif University of Technology Aghaee Farouji, Majid (Author) ; Aref, Mohammad Reza (Supervisor) ; Eghlidos, Traneh (Supervisor)
    Abstract
    Radio frequency identification systems (RFID) were used in the past to identify physical objects. Along with the development of RFID systems and its wide range of applications in our daily life, the need for privacy in such systems is becoming more and more significant. Authentication protocols are used as the care of secure communication to preserve the privacy and security in RFID systems. In this thesis the security of authentication protocols against general attacks are investigated, using two typical authentication protocols. As an alternative, we use a privacy model as another tool to analyze two other types of authentication protocols. The results reveal the weakness in the design of... 

    Analysis of Client Side Vulnerabilities in Microservice-based Systems

    , M.Sc. Thesis Sharif University of Technology Basiri Abarghouei, Mohammad (Author) ; Kharrazi, Mehdi (Supervisor)
    Abstract
    Nowadays, software systems face many challenges that relate to their maintenance, scalability, and development. To address these challenges, many large software systems have moved away from monolithic architecture and adopted a microservicesbased architecture. However, microservices-based systems face security challenges due to their distributed nature, complex dependencies, and diverse implementation technologies. This study specifically examines architecture-based threats, which fall under the program logic-based category. Previous research has required access to the server-side architecture to recover the architecture of the system, but this study proposes a method for recovering the... 

    An efficient spam mail detection by counter technique

    , Article World Academy of Science, Engineering and Technology ; Volume 74 , May , 2011 , Pages 579-582 ; 2010376X (ISSN) Kholghi, R ; Roudsari, S. B ; Pour, A. N ; Sharif University of Technology
    2011
    Abstract
    Spam mails are unwanted mails sent to large number of users. Spam mails not only consume the network resources, but cause security threats as well. This paper proposes an efficient technique to detect, and to prevent spam mail in the sender side rather than the receiver side. This technique is based on a counter set on the sender server. When a mail is transmitted to the server, the mail server checks the number of the recipients based on its counter policy. The counter policy performed by the mail server is based on some pre-defined criteria. When the number of recipients exceeds the counter policy, the mail server discontinues the rest of the process, and sends a failure mail to sender of... 

    XABA: A zero-knowledge anomaly-based behavioral analysis method to detect insider threats

    , Article 13th International ISC Conference on Information Security and Cryptology, 7 September 2016 through 8 September 2016 ; 2016 , Pages 26-31 ; 9781509039494 (ISBN) Zargar, A ; Nowroozi, A. R ; Jalili, R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    Insider threat is a significant security risk for organizations and hard to detect. Most introduced detection methods need contextual data entries about users, or preprocessed user activity logs to detect insider threats which it is costly and time-consuming. In this paper, we introduce a behavior analysis method that learns its context and detects multiple types of insider threats from raw logs and network traffic in real-time. This method, named XABA, learns user roles and exclusive behaviors, through analyzing raw logs related to each network session of the user. Then it checks for some abnormal patterns, and if so, triggers the appropriate alert. XABA is implemented on the big-stream... 

    Optimal Maneuver-Based Motion Planning Over Terrain and Threats Using Heuristic Optimization Approaches

    , Ph.D. Dissertation Sharif University of Technology Karimi, Jalal (Author) ; Pourtakdoost, Sayyed Hossein (Supervisor)
    Abstract
    In line with advances in science and technology in the areas of robotics, artificial intelligence, computer and control, unmanned vehicles are being more utilized and focused. On the other hand, development and further advances of these vehicles is highly dependent on the level of their autonomy. Motion planning is one of the most important issues in this regard. Due to high levels of autonomy required for unmanned air vehicles (UAV), the subject of motion planning is of valuable interest in aerospace applications. The goal of the motion planning problem, that is the subject of this research, is to extract an optimal trajectory for the UAV from an initial location toward its target point... 

    Insider Threats Detection in Enterprise Computing Environment through User Behavior Analysis

    , M.Sc. Thesis Sharif University of Technology Homayoni, Iman (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Increasing in insider threats of the organization, made it necessary to use a security solution to investigate anomalies within the organization. Diagnosis of insider anomalies is based on examining the behavior of any entity, whether employees or systems of the organization. Entities are classified into different categories based on reported events. The high consumption of resources, the creation or elimination of entities, and the variability of their behavior over time are among the major challenges in diagnosing insider anomalies. In this research, while defining the process of diagnosing insider anomalies, a possible solution is presented considering the above challenges. In the... 

    On the security of an ECC based RFID authentication protocol

    , Article 2012 9th International ISC Conference on Information Security and Cryptology, ISCISC 2012 ; 2012 , Pages 111-114 ; 9781467323864 (ISBN) Babaheidarian, P ; Delavar, M ; Mohajeri, J ; Sharif University of Technology
    2012
    Abstract
    Following the fact that there are some efficient implementations of ECC-based RFID authentication protocols on RFID tags, a new family of RFID authentication protocols known as EC-RAC family has been introduced. However, it has been shown that all the versions of EC-RAC protocols are exposed to privacy and/or security threats. In this paper we analyzed a version of the EC-RAC RFID authentication protocol as well as a version of Schnorr protocol which were presented in a recent work and are claimed to have the demanding requirements. We demonstrated an impersonation attack on the claimed improved EC-RAC, and consequently showed that it would not satisfy the tag authentication property. Also,... 

    A real-time algorithm for variable-objective motion planning over terrain and threats

    , Article Proceedings of the Institution of Mechanical Engineers, Part G: Journal of Aerospace Engineering ; Volume 229, Issue 6 , 2015 , Pages 1043-1056 ; 09544100 (ISSN) Karimi, J ; Pourtakdoust, S. H ; Sharif University of Technology
    SAGE Publications Ltd  2015
    Abstract
    A major issue required to enhance the autonomy level of unmanned vehicles is real-time motion planning. In this context, optimal trajectories need to be generated online considering the vehicle's dynamic potentials and constraints. However, autonomous air vehicles often need to plan and execute their missions with varying objectives that may even be dictated in flight. Therefore, the current study introduces and focuses on the new concept of variable-objective motion planning. In this regard, a new dynamic multi-objective heuristic optimization algorithm is developed for path and motion planning of autonomous air vehicles in presence of deterministic terrain obstacles as well as random... 

    Passive worm and malware detection in peer-to-peer networks

    , Article Proceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010, 11 December 2010 through 13 December 2010 ; 2010 , Pages 561-565 ; 9780769543222 (ISBN) Fahimian, S ; Movahed, A ; Kharrazi, M ; Sharif University of Technology
    Abstract
    Today P2P networks are responsible for a large amount of traffic on the Internet, as many Internet users employ such networks for content distribution. At the same time, P2P networks are vulnerable to security threats such as Internet worms and facilitate their propagation. Internet worms and more generally malware are a major concern to the network security community. There are many different type of worms in the wild, mostly categorized based on how they find and infect their new victims (i.e. active, passive, etc.). In this paper, we investigate a new approach for detecting passive worms and malware in P2P networks based on the popularity of files in the network. As part of our... 

    A bio-inspired method for hardware Trojan detection

    , Article 2017 19th International Symposium on Computer Architecture and Digital Systems, CADS 2017 ; Volume 2018-January , 8 March , 2018 , Pages 1-2 ; 9781538643792 (ISBN) Farajipour Ghohroud, N ; Hessabi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Outsourcing the ICs for manufacturing introduces potential security threats such as hardware Trojans (HTs). In this paper, we propose hardware-based artificial immune system for solving this problem. This system uses a biologically-inspired technique which makes it attractive for using in computer security systems. Using our proposed method, the probability of HT detection can reach 100 percent, and the system can be made immune against HTs. © 2017 IEEE  

    A semantic-based correlation approach for detecting hybrid and low-level APTs

    , Article Future Generation Computer Systems ; Volume 96 , 2019 , Pages 64-88 ; 0167739X (ISSN) Lajevardi, A. M ; Amini, M ; Sharif University of Technology
    Elsevier B.V  2019
    Abstract
    Sophisticated and targeted malwares, which today are known as Advanced Persistent Threats (APTs), use multi-step, distributed, hybrid and low-level patterns to leak and exfiltrate information, manipulate data, or prevent progression of a program or mission. Since current intrusion detection systems (IDSs) and alert correlation systems do not correlate low-level operating system events with network events and use alert correlation instead of event correlation, the intruders use low and hybrid events in order to distribute the attack vector, hide malwares behaviors, and therefore make detection difficult for such detection systems. In this paper, a new approach for detecting hybrid and... 

    Economic Consequences of SEC Regulation for Iran-related Disclosure

    , M.Sc. Thesis Sharif University of Technology Zare Bidaki, Mohsen (Author) ; Fatemi Ardestani, Farshad (Supervisor) ; Rastad, Mahdi (Supervisor)
    Abstract
    We examine the economic implications of the SEC disclosure rules for companies doing business with Iran on their riskiness of debt. We exploit Section 219 of the Iran Threat Reduction and Syria Human Rights Act (ITRA), which requires companies listed on U.S exchanges to disclose their activities and transactions with Iranian institutions. We analyze the impact of the first ITRA disclosure on the cost of capital for both American and foreign companies listed on the US exchanges. Using a difference-in-difference approach, we document a negative impact of ITRA disclosures on loan spread and credit rating of foreign companies. Further, using textual analysis, we identify the elements in the... 

    FPGA-based protection scheme against hardware trojan horse insertion using dummy logic

    , Article IEEE Embedded Systems Letters ; Volume 7, Issue 2 , 2015 , Pages 46-50 ; 19430663 (ISSN) Khaleghi, B ; Ahari, A ; Asadi, H ; Bayat-Sarmadi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Hardware trojan horses (HTH) have recently emerged as a major security threat for field-programmable gate arrays (FPGAs). Previous studies to protect FPGAs against HTHs may still leave a considerable amount of logic resources to be misused by malicious attacks. This letter presents a low-level HTH protection scheme for FPGAs by filling the unused resources with the proposed dummy logic. In the proposed scheme, we identify the unused resources at the device layout-level and offer dummy logic cells for different resources. The proposed HTH protection scheme has been applied on Xilinx Virtex devices implementing a set of IWLS benchmarks. The results show that by employing the proposed HTH... 

    A methodology for mobile network security risk management

    , Article ITNG 2009 - 6th International Conference on Information Technology: New Generations, 27 April 2009 through 29 April 2009, Las Vegas, NV ; 2009 , Pages 1572-1573 Seify, M ; Bijani, S ; Sharif University of Technology
    Abstract
    Based on the risk analysis done in the GSM network of Iran a methodology for cellular mobile network risk management is established. Primarily we focus on the importance of risk management in the GSM Network and then introduce very briefly the suggested method for managing risk in Iranian GSM security. GSM Security risk evaluation is a method for increasing the efficiency of security policy in the manner that security threats and vulnerabilities against the mobile network is identified and prioritized. © 2009 IEEE  

    Solar energy systems – Potential of nanofluids

    , Article Journal of Molecular Liquids ; Volume 289 , 2019 ; 01677322 (ISSN) Wahab, A ; Hassan, A ; Qasim, M. A ; Ali, H. M ; Babar, H ; Sajid, M. U ; Sharif University of Technology
    Elsevier B.V  2019
    Abstract
    Global warming escalation has extended average temperature of earth beyond its safe limit. To avert this environmental-threat, solar energy has acquired substantial attention of remarkable researchers in this century. To effectively utilize solar energy by transforming into thermal and electrical energy, the involvement of nanofluids having intensified thermal, optical and magnetic properties, has become very popular. The foremost objective of this article is to provide a comprehensive review on the applications of nanofluids in solar energy systems like solar collectors, photovoltaic cells, solar stills, and thermal energy storage, which are thoroughly discussed in this paper. The effect of...