Erinevus lehekülje "Thesis/tl/" redaktsioonide vahel

Allikas: Kursused
Mine navigeerimisribale Mine otsikasti
 
(ei näidata sama kasutaja üht vahepealset redaktsiooni)
18. rida: 18. rida:
 
== Research ideas  2019 ==
 
== Research ideas  2019 ==
  
* Implications of DOH  on  security and availability  
+
* Implications of DOH  on  security and availability + next step from https://www.netmeister.org/blog/doh-dot-dnssec.html
 
* Domain name availability and  how  DNS  registrant and registrar policy changes affect cybercrime  
 
* Domain name availability and  how  DNS  registrant and registrar policy changes affect cybercrime  
 
* Heuristics on ip leasing operations
 
* Heuristics on ip leasing operations
* Defending  organisation that does not have internal network
+
* Defending  organization that does not have internal network
 
* Do applications do what they promise  
 
* Do applications do what they promise  
 
* Identifying specific  applications based network fingerprints  
 
* Identifying specific  applications based network fingerprints  
28. rida: 28. rida:
 
* Information attributes influence beyond CIA  
 
* Information attributes influence beyond CIA  
 
* Frame works for cybersecurity devices / software evaluation  
 
* Frame works for cybersecurity devices / software evaluation  
* Evaluation specific software /hardware
+
* Evaluation specific software /hardware using ATT&CK Framwork
 +
* ATT&CK -Descriptions and false positives

Viimane redaktsioon: 15. oktoober 2019, kell 14:39

Expectation

Some what technical thesis Student reports progress regularity (atleast once in 2 week) Student is ok with remote meetings

Extended general areas

General areas:

  • Network Forensic (related data analysis)
  • Reverse engineering (including malware analysis)
  • SCADA security
  • Incident Handling.
  • Deception in Cyber Security


Research ideas 2019

  • Implications of DOH on security and availability + next step from https://www.netmeister.org/blog/doh-dot-dnssec.html
  • Domain name availability and how DNS registrant and registrar policy changes affect cybercrime
  • Heuristics on ip leasing operations
  • Defending organization that does not have internal network
  • Do applications do what they promise
  • Identifying specific applications based network fingerprints
  • Evaluation log collecting methods for Microsoft networks considering log poisoning attacks
  • Log collecting frameworks for organisations without internal networks
  • Information attributes influence beyond CIA
  • Frame works for cybersecurity devices / software evaluation
  • Evaluation specific software /hardware using ATT&CK Framwork
  • ATT&CK -Descriptions and false positives