Erinevus lehekülje "Aleksandr Lenin MSc Thesis topics" redaktsioonide vahel

Allikas: Kursused
Mine navigeerimisribale Mine otsikasti
11. rida: 11. rida:
 
* [TREsPASS] A structure for representing attack scenarios in the form of attack graphs in xml file.
 
* [TREsPASS] A structure for representing attack scenarios in the form of attack graphs in xml file.
 
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #0f0;">Low</span> Status: <span style="color: #0f0;">Pending</span> Due: June 2015]'''
 
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #0f0;">Low</span> Status: <span style="color: #0f0;">Pending</span> Due: June 2015]'''
 
+
* [TREsPASS] Attack Process Graphs -- a new look into security modelling and analysis. (joint work with Dr. Alexander norta)
 +
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #0f0;">Low</span> Status: <span style="color: #0f0;">Pending</span> Due: TBA]'''
  
 
'''Fuzzy Metrics for Security:'''
 
'''Fuzzy Metrics for Security:'''
27. rida: 28. rida:
  
 
'''Security modelling patterns:'''
 
'''Security modelling patterns:'''
* [TREsPASS] APL (Attack Pattern Library) and MPL (Model Pattern Library) design and implementation.
+
* [TREsPASS] ''APL (Attack Pattern Library)'' and ''MPL (Model Pattern Library)'' design and implementation.
 
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #f00;">High</span> Status: <span style="color: #0f0;">Pending</span> Due: April 2015]'''
 
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #f00;">High</span> Status: <span style="color: #0f0;">Pending</span> Due: April 2015]'''
  
* [TREsPASS] A library of attacker behavioral patterns.
+
* [TREsPASS] A library of attacker behavioral patterns (under co-supervision of Dr. Alexander Norta).
 
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #0f0;">Low</span> Status: <span style="color: #0f0;">Pending</span> Due: TBA]'''
 
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #0f0;">Low</span> Status: <span style="color: #0f0;">Pending</span> Due: TBA]'''
  
36. rida: 37. rida:
 
'''Quantitative Security Risk Analysis:'''
 
'''Quantitative Security Risk Analysis:'''
 
* [TREsPASS] Approximation of fully-adaptive strategies by the most optimal non-adaptive strategy. Assessment of precision and viability of the approach.
 
* [TREsPASS] Approximation of fully-adaptive strategies by the most optimal non-adaptive strategy. Assessment of precision and viability of the approach.
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #ff0;">Medium</span> Status: <span style="color: #0f0;">Pending</span> Due: June 2015]'''
+
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;'''[Priority: <span style="color: #ff0;">Medium</span> Status: <span style="color: #f00;">In Progress</span> Due: June 2015]'''
 
 
  
 
'''ISKE:'''
 
'''ISKE:'''

Redaktsioon: 15. veebruar 2015, kell 14:04

Algorithms for Security Analysis:

  • [TREsPASS] A genetic (evolutionary) algorithm for the Failure-Free risk assessment model.

      [Priority: High Status: In progress Due: April 2015]

  • [TREsPASS] Attack scenario transformation component. Design and implementation.

      [Priority: High Status: In progress Due: April 2015]

  • [TREsPASS] Comparison of the genetic algorihm for the Failure-Free model with the Failure-Free model upper bounds estimation. Assessment of performance. Benchmarking and analysis.

      [Priority: Medium Status: Pending Due: June 2015]


Security Modelling:

  • [TREsPASS] A structure for representing attack scenarios in the form of attack graphs in xml file.

      [Priority: Low Status: Pending Due: June 2015]

  • [TREsPASS] Attack Process Graphs -- a new look into security modelling and analysis. (joint work with Dr. Alexander norta)

      [Priority: Low Status: Pending Due: TBA]

Fuzzy Metrics for Security:

  • [TREsPASS] Fuzziness as a measure of uncertainty in quantitative security metrics.

      [Priority: High Status: In progress Due: April 2015]


Fuzzy decision making and control:

  • [TREsPASS] Fuzzy attacker profiling

      [Priority: Medium Status: Pending Due: June 2015]

  • [TREsPASS] Fuzzy reasoning and computations for the Failure-Free risk assessment model.

      [Priority: Medium Status: Pending Due: June 2015]


Security modelling patterns:

  • [TREsPASS] APL (Attack Pattern Library) and MPL (Model Pattern Library) design and implementation.

      [Priority: High Status: Pending Due: April 2015]

  • [TREsPASS] A library of attacker behavioral patterns (under co-supervision of Dr. Alexander Norta).

      [Priority: Low Status: Pending Due: TBA]


Quantitative Security Risk Analysis:

  • [TREsPASS] Approximation of fully-adaptive strategies by the most optimal non-adaptive strategy. Assessment of precision and viability of the approach.

      [Priority: Medium Status: In Progress Due: June 2015]

ISKE:

  • [TREsPASS] ISKE-TREsPASS integration. Case study.

      [Priority: High Status: In progress Due: April 2015]


Security Games:

  • Defender game for the quantitative security analysis models.

      [Priority: Low Status: Pending Due: TBA]

  • Attacker-defender strategic interaction. Stackleberg equilibrium and security analysis.

      [Priority: Low Status: Pending Due: TBA]