Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Entire DC Network

Man-In-The-Middle Attacks On Mqtt Based Iot Networks, Henry C. Wong Jan 2022

Man-In-The-Middle Attacks On Mqtt Based Iot Networks, Henry C. Wong

Masters Theses

“The use of Internet-of-Things (IoT) devices has increased a considerable amount in recent years due to decreasing cost and increasing availability of transistors, semiconductor, and other components. Examples can be found in daily life through smart cities, consumer security cameras, agriculture sensors, and more. However, Cyber Security in these IoT devices are often an afterthought making these devices susceptible to easy attacks. This can be due to multiple factors. An IoT device is often in a smaller form factor and must be affordable to buy in large quantities; as a result, IoT devices have less resources than a typical computer. …


Bond Graph Modeling Of Critical Infrastructures For Cyber-Physical Security Implementation, Michele Jane White Jan 2021

Bond Graph Modeling Of Critical Infrastructures For Cyber-Physical Security Implementation, Michele Jane White

Masters Theses

“In developed societies, there exists infrastructure vital to everyday life. This includes water and power systems. Technology is quickly evolving and being implemented on these utilities. This technology can range from smart metering in neighborhoods to volume sensors in local waste water treatment facilities. When networking, sensing, monitoring, or control devices are integrated with infrastructure it is considered a cyber physical system, or CPS. When information about an important physical system is connected to the virtual world, it is opened up to security risks. Cyber security can be provided to the CPS by monitoring the physical state of the system …


Card: Concealed And Remote Discovery Of Iot Devices In Victims' Home Networks, Sammie Lee Bush Jan 2018

Card: Concealed And Remote Discovery Of Iot Devices In Victims' Home Networks, Sammie Lee Bush

Masters Theses

"Smart devices are becoming more common in the standard households. They range from lights to refrigerators and their functionality and applications continues to grow with consumer demand. This increase in networked, complex devices has also brought an increase in vulnerabilities in the average consumer's home. There now exists an Internet of Things (IoT) ecosystem that creates new attack vectors for adversaries to spread malware, build botnets, and participate in other malicious activities. We will overview some of these new attack vectors as well as go over a framework that would allow an adversary to target a user's home network and …


Cyber Security Research Frameworks For Coevolutionary Network Defense, George Daniel Rush Jan 2015

Cyber Security Research Frameworks For Coevolutionary Network Defense, George Daniel Rush

Masters Theses

"Cyber security is increasingly a challenge for organizations everywhere. Defense systems that require less expert knowledge and can adapt quickly to threats are strongly needed to combat the rise of cyber attacks. Computational intelligence techniques can be used to rapidly explore potential solutions while searching in a way that is unaffected by human bias.

Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation …