Erinevus lehekülje "Thesis/tl/" redaktsioonide vahel
Mine navigeerimisribale
Mine otsikasti
(ei näidata sama kasutaja üht vahepealset redaktsiooni) | |||
18. rida: | 18. rida: | ||
== Research ideas 2019 == | == Research ideas 2019 == | ||
− | * Implications of DOH on security and availability | + | * Implications of DOH on security and availability + next step from https://www.netmeister.org/blog/doh-dot-dnssec.html |
* Domain name availability and how DNS registrant and registrar policy changes affect cybercrime | * Domain name availability and how DNS registrant and registrar policy changes affect cybercrime | ||
* Heuristics on ip leasing operations | * Heuristics on ip leasing operations | ||
− | * Defending | + | * Defending organization that does not have internal network |
* Do applications do what they promise | * Do applications do what they promise | ||
* Identifying specific applications based network fingerprints | * Identifying specific applications based network fingerprints | ||
28. rida: | 28. rida: | ||
* Information attributes influence beyond CIA | * Information attributes influence beyond CIA | ||
* Frame works for cybersecurity devices / software evaluation | * Frame works for cybersecurity devices / software evaluation | ||
− | * Evaluation specific software /hardware | + | * Evaluation specific software /hardware using ATT&CK Framwork |
+ | * ATT&CK -Descriptions and false positives |
Viimane redaktsioon: 15. oktoober 2019, kell 14:39
Expectation
Some what technical thesis Student reports progress regularity (atleast once in 2 week) Student is ok with remote meetings
Extended general areas
General areas:
- Network Forensic (related data analysis)
- Reverse engineering (including malware analysis)
- SCADA security
- Incident Handling.
- Deception in Cyber Security
Research ideas 2019
- Implications of DOH on security and availability + next step from https://www.netmeister.org/blog/doh-dot-dnssec.html
- Domain name availability and how DNS registrant and registrar policy changes affect cybercrime
- Heuristics on ip leasing operations
- Defending organization that does not have internal network
- Do applications do what they promise
- Identifying specific applications based network fingerprints
- Evaluation log collecting methods for Microsoft networks considering log poisoning attacks
- Log collecting frameworks for organisations without internal networks
- Information attributes influence beyond CIA
- Frame works for cybersecurity devices / software evaluation
- Evaluation specific software /hardware using ATT&CK Framwork
- ATT&CK -Descriptions and false positives