|
Dissertations |
|
1
|
-
Renato Luiz Alves Tavares
-
Effectiveness Evaluation of nuclear facilities’ security systems under cyber-physical attack scenarios
-
Advisor : WILLIAM FERREIRA GIOZZA
-
COMMITTEE MEMBERS :
-
ANTONIO TEIXEIRA E SILVA
-
FABIO LUCIO LOPES DE MENDONCA
-
JOAO JOSE COSTA GONDIM
-
ROBSON DE OLIVEIRA ALBUQUERQUE
-
Data: Feb 9, 2023
-
-
Show Abstract
-
The present work aims to perform an evaluation on the probabilistic effectiveness of the security system for a nuclear facility model, under attack scenarios involving hybrid threats, i.e. with both cyber and physical capabilities. Amid a global context propitious to the increase in attacks over critical infrastructure, including those involving illicit access and sabotage on nuclear materials, combined with the rapid evolution and diversity of cyber-attacks in various sectors of society, it is a notable challenge to assess the security of critical infrastructure. Considering aspects of confidentiality on security systems designs for real nuclear facilities, a hypothetical one (Instituto de Ciências Nucleares do Cerrado) was modelled, considering the legal and regulatory framework in force in Brazil and similar models in use by the International Agency of Atomic Energy (IAEA) for training purposes. The model describes the characterization of the threat, the security system and the cyber-physical attack scenarios, using probabilistic performance parameters from the literature to calculate the effectiveness (P E) of the security system, comparing scenarios of purely physical attacks to others in which security-critical digital assets are compromised. The results showed a significant decrease in the effectiveness of the system, indicating the need for improvements in the safety measures of nuclear installations, from a regulatory and operational point of view. Furthermore, the methodology used in the work is general and appli
|
|
2
|
-
Luiz Henrique Filadelfo Cardoso
-
Cyber Risk Management for the ADS-B Deployment within the scope of SISCEAB through the Operational Security Risk Management (GRSO) method
-
Advisor : GEORGES DANIEL AMVAME NZE
-
COMMITTEE MEMBERS :
-
GEORGES DANIEL AMVAME NZE
-
RAFAEL RABELO NUNES
-
VINICIUS PEREIRA GONCALVES
-
MCWILLIAN DE OLIVEIRA
-
Data: Feb 15, 2023
-
-
Show Abstract
-
Among the most modern technologies used in air traffic surveillance systems, the ADS-B System is the one that stands out today. Such technology consists of a set of equipments and protocols designed to provide the means to determine the position of aircraft in flight from satellite navigation systems, as well as to periodically broadcast information of interest to other aircrafts en route and sensors on the ground within your range. However, serious security vulnerabilities lie at the heart of the ADS-B protocol, and the literature is unclear about the impact of exploitations in these breaches on the direct action of ATCOs and aircraft pilots. This study aims to take an analytical look at the vulnerabilities present in the ADS-B system, not only when mapping attacks to that protocol, but also when seeking to identify, analyze, evaluate and classify the cyber risks inherent in maintaining operational security and its implementation within the scope of SISCEAB, through specific cyber threats modeling and risk management method, which is the GRSO method, focusing on the impact on the decision-making process of the main users, namely: air traffic controllers and crews on board aircraft.
|
|
3
|
-
ALINE DOS SANTOS PEREIRA
-
Creating a dataset of missing people and automatic progression age using Machine Learning
-
Advisor : DANIEL CHAVES CAFE
-
COMMITTEE MEMBERS :
-
MAURÍCIO DA SILVA SERCHELI
-
DANIEL CHAVES CAFE
-
DEMETRIO ANTONIO DA SILVA FILHO
-
RAFAEL RABELO NUNES
-
Data: Mar 30, 2023
-
-
Show Abstract
-
Within the last five year, in Brazil, an average of 200 people disappeared per day. When someone disappears, the policial authorities make a research about the person’s physical appearance. This research may result in a photography for divulgation purposes about the persons’s missing or a police sketch. Through the pass of time, theses portraits get outdated due to aging, specially in cases of missing children. There is a multitude of techniques for age progressing of all of the missing people. Brazilian’s legislation demands an update of the images of age progressing for all of the missing people. For those who are less than 18 years-old the update must be made every three year, and after 18 years-old every five years. However, there are a lot of factors that make this procedure difficult such as the volume of images and the absence of a database. These problems may be approached by using automation through machine’s learning, more specifically using Generative Adversarial Networks (GANs). For this purpose, a data bank of missing Brazilian citizens would be necessary. Even though there is Brazilian legislation instituting the unification of missing people’s information, including images, the Brazilian government and the authorities involved in this procedure are yet far from getting the final results imposed by law. This paper demonstrates how Brazilian authorities deal with missing people’s data and emphasizes the importance and urgency of a unified database. Furthermore, this paper demonstrates how the usage of new techniques of image’s manipulation may aid policial authorities during a missing investigation of children and teenagers. It was possible to demonstrate how the disappearances information is disseminated across the country. In addition, it was possible to obtain promising results in terms of accuracy between images generated by neural networks and to create an image database of Brazilian victims.
|
|
4
|
-
Juliano Rodrigues Ferreira
-
Application of the General Data Protection Law with Use of Data Anonymization Models in Public Cloud Environment
-
Advisor : EDNA DIAS CANEDO
-
COMMITTEE MEMBERS :
-
EDNA DIAS CANEDO
-
GEORGES DANIEL AMVAME NZE
-
JOAO JOSE COSTA GONDIM
-
LAERTE PEOTTA DE MELO
-
Data: Apr 17, 2023
-
-
Show Abstract
-
This study aims to evaluate and apply data protection technology, considering the guidelines indicated in the General Personal Data Protection Law (LGPD). Through practical procedures and analysis of results seeking adequate protection of this information with encryption techniques and anonymization of data, ensuring, in addition to adherence with legislation, the maintenance of performance and transparency for the end user. It is an additional challenge to apply this data protection model considering the public cloud environment and its specific characteristics of access, storage, cryptographic key management, information manipulation, and performance of that environment.
|
|
5
|
-
Marcio da Mota Ribeiro
-
State intelligence activity Brazilian is in check with the promulgation of the Amendment Constitutional n. 115/2022? One assessment of risks and impacts and proposal for an agenda solutions
-
Advisor : RAFAEL RABELO NUNES
-
COMMITTEE MEMBERS :
-
RAFAEL RABELO NUNES
-
FABIANA FREITAS MENDES
-
GEORGES DANIEL AMVAME NZE
-
JOSÉ DOS SANTOS CARVALHO FILHO
-
Data: Apr 27, 2023
-
-
Show Abstract
-
Although The General Personal Data Protection Law (LGPD) establishes that its provisions are not applicable to the processing of personal data carried out for exclusive purposes of State security, the rules that define fundamental rights and guarantees have immediate application, which is why the fundamental right to the protection of personal data and the LGPD affect the State Intelligence activity and, in particular, the analysis of big data (big data analytics) used by the Brazilian Intelligence service for the production of open source intelligence (Osint). This dissertation aims to identify the possible risk factors for State Intelligence arising from this fundamental right incidence, analyze their consequences and propose measures to mitigate them. The methodological scientific procedure used was applied, explanatory, bibliographical and documental research. The main results of this work consist in the identification of possible risk factors, in their analysis and proposition of measures to mitigate them, and in the demonstration that the fundamental right to the protection of personal data may be limited by the constitutional restriction on access to information, whose secrecy is essential to the security of society and of the State. The main contributions of this dissertation are suggestions for future draft law on the protection of personal data for State security and the proposal on how the Brazilian Intelligence Agency could implement privacy engineering in the development of big data analytics applications for the production of Osint.
|
|
6
|
-
Renato Carvalho Raposo de Melo
-
Cyber Threat Modeling Framework
-
Advisor : FABIO LUCIO LOPES DE MENDONCA
-
COMMITTEE MEMBERS :
-
RAIMUNDO CLAUDIO DA SILVA VASCONCELOS
-
EDNA DIAS CANEDO
-
FABIO LUCIO LOPES DE MENDONCA
-
RAFAEL RABELO NUNES
-
Data: May 26, 2023
-
-
Show Abstract
-
The conflicts involving governments and multinational corporations traditionally carried out on the fields of economics, politics and ideology have been transferred to Cyber Space as a new battlefield. Both public and private organizations are driven to achieve efficiency through digitalization while also having to defend themselves from ever evolving risks presented by different cyber threats. This work proposes a Cyber Threat Assessment Framework focused on highly complex adversarial threats and is dedicated to support the decisionmaking process of governments and high value corporations. The proposed Framework organizes the efforts of collecting and analyzing data concerning adversarial cyber threats in order to provide useful intelligence on risks that affect the system to be defended.
|
|
7
|
-
Virgínia de Melo Dantas Trinks
-
STRATEGIC ASSESSMENT OF CYBER SECURITY CONTENDERS TO THE BRAZILIAN AGRIBUSINESS IN THE BEEF SECTOR
-
Advisor : ROBSON DE OLIVEIRA ALBUQUERQUE
-
COMMITTEE MEMBERS :
-
ROBSON DE OLIVEIRA ALBUQUERQUE
-
CARLOS ANDRE DE MELO ALVES
-
FABIO LUCIO LOPES DE MENDONCA
-
ANA LUCILA SANDOVAL OROZCO
-
Data: Jun 2, 2023
-
-
Show Abstract
-
Current world commercial structure places Brazilian Agribusiness at constant conflict to protect its interests before other nations in the global market. Technological innovations are used in all stages from the simplest production tasks, up to the design of negotiation tactics at highlevel affairs. This paper has the objective of finding Brazilian contenders in the beef market with cyber capabilities and commercial interest to act in favor of their interests. To reach such a list, a review of the literature on Threat and Cyber Threat Intelligence is presented, followed by a background presentation of how embedded technology is in nowadays agriculture and supply chains in general, and the real necessity for those sectors to be seen as critical infrastructure by governments in general. Also as background information recent cyber attack cases and attacker countries are shown. A Step-by-Step multidisciplinary method is presented that involves the extent of international trade, the interest on specific markets, and the intersection of country cyber capacity index. After applying the method and criteria, it generated a list of five contender countries to the Brazilian Beef in the International Market that hold cyber attack capacities. The list includes the USA, Australia, China, Netherlands and Russia. The method may be replicated and/or applied, considering adequate data source assessment and following specifics of each sector.
|
|
8
|
-
Cileno de Magalhães Ribeiro
-
A proposal to optimize secret communication in the Brazilian Intelligence System using private cloud computing.
-
Advisor : RAFAEL RABELO NUNES
-
COMMITTEE MEMBERS :
-
FABIO LUCIO LOPES DE MENDONCA
-
RAFAEL RABELO NUNES
-
SELMA LUCIA DE MOURA GONZALES
-
WILLIAM FERREIRA GIOZZA
-
Data: Jun 15, 2023
-
-
Show Abstract
-
The Brazilian Intelligence System (Sisbin) is considered a fundamental element for advising the head of the executive branch Currently, it is a tool used to exchange knowledge and data that has not been attending the necessary agility to the interests of the State. In this sense, this work aimed to propose procedures and an architecture to optimize the secret communication process between the agencies of the Brazilian Intelligence System (Sisbin) with the proposed use of private cloud computing. To achieve the proposed goal, we first developed a canvas of the intelligence communication process in order to reach the proposed objective, first a canvas of the secret communication process was elaborated as a way to understand the current situation, with the involvement of seventeen servers from six federal agencies that are part of the system. Next, a questionnaire was developed and applied to one hundred and thirtyseven people from thirteen organs of the Sisbin, as a means of evaluating and obtaining technical appraisals about the information in the canvas. The opinions and theoretical foundation were analyzed based on the Intelligence Doctrine, Normative and specific legislation that deal with information security, cybernetics and current protocols, all directly related to the flow of information. The results demonstrate the need to adopt a technological tool to optimize information exchange, which is why a reference architecture was proposed as a solution using a private cloud. As the main contribution of the work, a guideline has been established for the use of a work sharing tool integrated on a private cloud proposal, with the possibility of joint elaboration, secure storage and centralized technological support.
|
|
9
|
-
FELIPE BARRETO DE OLIVEIRA
-
DoS Attack Detection Framework on IoT Devices using Machine Learning Approaches.
-
Advisor : GEORGES DANIEL AMVAME NZE
-
COMMITTEE MEMBERS :
-
FABIO LUCIO LOPES DE MENDONCA
-
GEORGES DANIEL AMVAME NZE
-
LAERTE PEOTTA DE MELO
-
RAFAEL RABELO NUNES
-
Data: Jun 16, 2023
-
-
Show Abstract
-
The Internet of Things is one of the most important paradigms of the last years, because its main characteristic is the possibility of merging the real world with the virtual world, using the concept of “things”. On the one hand, it presents a great convenience in our daily lives, revolutionizing the communication between people and objects. On the other hand, the vulnerabilities presented and the attacks that have occurred indicate that this technology remains an expectation for the future, thus submerging the benefits it could provide us. In this paper, we propose a framework for real time intrusion detection system in IoT devices, where the DoS attacks will be detected, identified, and classified, following the present literature. For this purpose, machine learning is used to identify attacks through anomalies that occurred in monitoring IoT devices on the ELK suite with the Wazuh plugin. The first experimental result with the NSL-KDD dataset show our proposal's efficiency, with 91.90% accuracy, 0.9217 precision, 0.9190 recall, and 0.9168 F1-score. The second experimental result with real time syn flood attack, created by metasploit, show accuracy of 99,89%, precision of 1.0000, recall of 0.9953, F1-Score of 0.9977.
|
|
10
|
-
Marcelo Garcia
-
Key Factors for a Cybersecurity and Cyberintelligence Policy in Brazil
-
Advisor : ROBSON DE OLIVEIRA ALBUQUERQUE
-
COMMITTEE MEMBERS :
-
GEORGES DANIEL AMVAME NZE
-
JOAO JOSE COSTA GONDIM
-
LUIZ OCTAVIO GAVIÃO
-
ROBSON DE OLIVEIRA ALBUQUERQUE
-
Data: Jun 19, 2023
-
-
Show Abstract
-
This work aims to understand of the current state of the Brazilian national cyber capability and identify promising avenues for its improvement through the evaluation of key success factors for a national Cybersecurity and Cyber Intelligence Policy in Brazil. The sector presents great demand from the State; many countries use this demand to mobilize their innovation entrepreneurship, with public support policies and private venture capital investments. This strategy combines the supply of important defense and security needs with the country's technological, economic and social development. In defense, Brazil has a Cyber Defense Center that nevertheless operates in a paradigm of d e p e n d e n c e o n f o r e i g n t o o l s a n d technologies. In the sphere of public security and intelligence, state action in the cyber environment is still not clearly organized and regulated and the current National Cybersecurity Strategy lacks better definitions. Therefore, there is an opportunity to formulate a policy that consolidates and organizes state demand and directs it to be s u p p l i e d b y n a t i o n a l i n n o v a t i o n entrepreneurship. The potential critical aspects of such a policy are evaluated in the light of the literature and the opinion of Brazilian experts belonging to the interest groups in the matter, namely, state agents, development managers, venture capital managers, entrepreneurs, specialists and researchers, through interviews and questionnaire. The results indicate that it is possible for Brazil to parameterize a national policy to promote cyber security and intelligence that circumvents existing obstacles and boosts a cybersecurity and cyberintelligence industry in the country.
|
|
11
|
-
Rogerio Machado da Silva
-
Proposal of a Framework for Quality Improvement in the Production of Cyber Threat Intelligence
-
Advisor : JOAO JOSE COSTA GONDIM
-
COMMITTEE MEMBERS :
-
DINO MACEDO AMARAL
-
GEORGES DANIEL AMVAME NZE
-
JOAO JOSE COSTA GONDIM
-
RAFAEL RABELO NUNES
-
Data: Jun 20, 2023
-
-
Show Abstract
-
In cyberspace, boundaries are constantly being crossed in the name of progress and convenience, invariably paving the way for new vulnerabilities and potential attacks. Traditional security approaches are not able to contain the dynamic nature of new techniques and threats, which are increasingly adaptive and complex. In this scenario, threat intelligence sharing is growing. However, the heterogeneity and the large volume of threat data make it difficult to identify the relevant data, imposing significant limitations on security analysts. Among the factors contributing to the low quality of Cyber Threat Intelligence (CTI), the lack of direction and planning stands out, resulting in the production of inaccurate, incomplete, or outdated information that leads to reactive actions. However, quality threat intelligence has a positive impact on the response time to an incident. The proposed solution to overcome this limitation is the adoption of a knowledge production process based on the intelligence cycle, supported by situational awareness and the 5W3H model for context creation. The direction and planning phase isthe least addressed phase in scientific research, but when executed properly it directly contributes to the relevance, accuracy and timeliness of the intelligence produced, as it defines the purpose and scope of the subsequent steps. The next phases of the process aims at the progressive refinement of data, which starts with a large volume and low relevance and, by means of evaluation, search for correlations, analysis, context formation, and interpretation, ends up with a low volume, but capable of being used for decision making.
|
|
12
|
-
Rodrigo Vilela Fonseca de Souza
-
Collusion identification in Comprasnet auctions with Machine Learning.
-
Advisor : ALEXANDRE SOLON NERY
-
COMMITTEE MEMBERS :
-
FABIANO CAVALCANTI FERNANDES
-
DANIEL ALVES DA SILVA
-
FABIO LUCIO LOPES DE MENDONCA
-
GEORGES DANIEL AMVAME NZE
-
Data: Jun 20, 2023
-
-
Show Abstract
-
The Brazilian Federal Government executes a large volume of public procurements through the Comprasnet Procurement Portal, which is a website for electronic auctions available for bidders nationwide and abroad. In the period from 2018 to 2021, approximately R\$144 billion bids were applied within Comprasnet, with the execution of more than 122 thousand processes of this modality. The audit of these events is one of the duties of the Federal Comptroller General (Controladoria Geral da União - CGU) agency, which has developed tools to support such audit activities, especially involving a large volume of data processing. Thus, it is possible for electronic trading sessions to be audited in time to identify irregularities and rectify them. Between 2019 e 2020, following CGU preventive actions, around R$ 6.7 billion auctions were revoked, suspended or adjusted. Among the irregularities, collusion is difficult to identify, given the set of variables involved in the process. Artificial Intelligence applied to data analysis, through Machine Learning algorithms, presents itself as a promising method towards the detection of collusion between the auction's participants. In this work, a study of machine learning algorithms was carried out, in 4 different scenarios, on two datasets extracted from Comprasnet and other published collusion datasets. In the best scenarios, ensemble methods algorithms achieved an accuracy greater than 87%. Considering all metrics applied, Extra Trees was the algorithm with the best performance, capable of indicating new possible collusion cases.
|
|
13
|
-
Maickel Josué Trinks
-
Multi-agent Architecture for Passive Rootkit Detection with Data Enrichment
-
Advisor : JOAO JOSE COSTA GONDIM
-
COMMITTEE MEMBERS :
-
DINO MACEDO AMARAL
-
GEORGES DANIEL AMVAME NZE
-
JOAO JOSE COSTA GONDIM
-
RAFAEL RABELO NUNES
-
Data: Jun 22, 2023
-
-
Show Abstract
-
The added value of the information transmitted in a cybernetic environment has resulted in a sophisticated malicious actions scenario aimed at data exfiltration, and, in today’s advanced and dynamic cyber threat environment, organizations need yeld new methods to address their cyber defenses. In situations with unconventional malicious actors, like APTs, obfuscating harmful activity techniques are used to ensure maintenance on strategic targets, avoiding detection by known defense systems and forwarding data of interest to external elements with as little noise as possible.The MADEX and NERD architectures proposed flow analysis solutions to detect rootkits that hide network traffic; however, it presents some operational cost, either in traffic volume or due to lack of aggregated information. In that regard, this work changes and improves user flow analysis techniques to eliminate impacts on network traffic, with data enrichment on local and remote bases, detection of domains consulted by rootkits and aggregation of information to generate threat intelligence, while maintaining high performance and allowing concomitant use with previously existing cyber defense systems. The results show the possibility of aggregating information to data flows used by rootkits in order to have effective cyber defense actions against cybernetic threats without major impacts on the existing network infrastructure.
|
|
14
|
-
Alcides Francinaldo Souza Macêdo
-
CYBER INTELLIGENCE FRAMEWORK FOR HUMAN INTERACTION USING THE OPEN SOURCE BEST PRACTICES
-
Advisor : FLAVIO ELIAS GOMES DE DEUS
-
COMMITTEE MEMBERS :
-
FABIO LUCIO LOPES DE MENDONCA
-
FELIPE LOPES DA CRUZ
-
FLAVIO ELIAS GOMES DE DEUS
-
GEORGES DANIEL AMVAME NZE
-
Data: Jun 23, 2023
-
-
Show Abstract
-
The traditional and doctrinal concepts of cybersecurity, in a simplified form, the physical, logical and social federations. This research aims to address a third aspect for the use of collecting information about users in the virtual world in order to obtain collaboration to provide higher quality information to increase cybersecurity measures, including applying methods used by the so-called social engineering to gather the best practices of collection of information captured in a framework involving human source intelligence (HUMINT) and open source intelligence (OSINT) techniques to increase the capacity of organizational cybersecurity structures, private or public, in identifying and preventing threats based on user collaboration previously identified. In achieving this objective, this research sought to investigate the applicability of management techniques for human sources and open sources by proposing a framework of good practices for collection actions in open sources, based on the following objectives: 1) review the recent literature about attacks based on social engineering; 2) review the concepts used in HUMINT; 3) review the concepts used in OSINT; 4) propose a framework of best practices to guide cybersecurity professionals in interacting with adverse attack aggressors; 5) validate the framework based on interviews with cybersecurity professionals. Based on the methodology of a case study, 26 good practices were selected, grouped in procedural and psychological analytical categories, which were debugged by 15 specialists, waiting agents, who work in the collection of information from open sources.
|
|
15
|
-
Luiz Guilherme Schiefler de Arruda
-
Proposal of a Control Prioritization Method for Zero Trust Architecture Implementation Using Multicriteria Method
-
Advisor : RAFAEL RABELO NUNES
-
COMMITTEE MEMBERS :
-
CLOVIS NEUMANN
-
DINO MACEDO AMARAL
-
RAFAEL RABELO NUNES
-
VINICIUS PEREIRA GONCALVES
-
Data: Jun 27, 2023
-
-
Show Abstract
-
The evolution of computer networks has made them increasingly complex and expanded their attack surface, rendering traditional perimeter protection less secure. In this context, a new trust model called Zero Trust (ZT) emerged. This concept, encompassing various controls for its implementation, makes risk management a challenging task, as managers face the challenge of prioritizing these controls. ISO 31000 describes how the multicriteria decision-making methodology can assist decision-makers in problem modeling and action prioritization. The multicriteria concept is based on two schools of thought: the American approach, which focuses on precise calculations to prioritize controls, and the European approach, which views decision-making as a human activity. MCDA-C, originating from the European school, has the capability to incorporate multiple levels within an organization to facilitate knowledge construction and decisionmaking for decision-makers. This study proposes the utilization of controls described in the CISA's Zero Trust Architecture (ZTA) Maturity Model in conjunction with MCDA-C. This approach provides clarity in visualizing the ideal performance from decision-makers' perspectives and facilitates prioritization for ZTA control implementation. Finally, considering the proposed controls, this study demonstrates the capability of MCDA-C in aiding the understanding of the problem within the organization and constructing knowledge through the analysis of collected data. Consequently, it becomes possible to present decision-makers with the controls that should be prioritized at the outset of a ZTA implementation.
|
|
16
|
-
Paulo Magno de Melo Rodrigues Alves
-
FRAMEWORK FOR TTP CLASSIFICATION BASED ON BERT TRANSFORMERS
-
Advisor : VINICIUS PEREIRA GONCALVES
-
COMMITTEE MEMBERS :
-
VINICIUS PEREIRA GONCALVES
-
FABIO LUCIO LOPES DE MENDONCA
-
JOAO JOSE COSTA GONDIM
-
JOSE RODRIGUES TORRES NETO
-
Data: Jun 27, 2023
-
-
Show Abstract
-
Information upon Tactics, Techniques and Procedures (TTP) observed in an attack are important to cybersecurity defenders. However, they are mostly disseminated through unstructured text, hindering access and the job of ciberanalysts. This work presents a framework for tackling this problem by using BERT (Bidirectional Encoder Representations from Transformers), a model derived from the Transformers Architecture. We use 11 variants of BERT, a state-of-theart approach in Natural Language Processing, to classify sentences according to MITRE ATT\&CK framework for TTP. The dataset used is MITRE's database of sentences (examples) and part of it is used in training and part in the models evaluation. Validation is also done against a set of manually annotated sentences extracted from public CTI reports. The effect of some chosen hyperparameters on the fine-tuning of the models are also investigated. The purpose is to identify the best model and the finest combination of hyperparameters for the proposed classification task. As a result, we observed that the best models presented an accuracy of 82.64\% and 78.75\% on the two datasets tested, demonstrating the feasibility and potential of the application of BERT models in the complex task of TTP classification. At last, we analyze some of the sentences misclassified by the framework to better understand why the models are missing and thus gather insights about possibilites to further improve performance.
|
|
17
|
-
Renata Colares Policarpo
-
FPGA implementation of a postquantum key encapsulation mechanism using HLS
-
Advisor : ALEXANDRE SOLON NERY
-
COMMITTEE MEMBERS :
-
EVANDER PEREIRA DE REZENDE
-
ALEXANDRE SOLON NERY
-
GEORGES DANIEL AMVAME NZE
-
JOAO JOSE COSTA GONDIM
-
Data: Jun 27, 2023
-
-
Show Abstract
-
This dissertation presents the specification of an accelerator for CRYSTALS-Kyber, the first Key Encapsulation Mechanism (KEM) standardized by the National Institute of Standards and Technology (NIST) as Post-Quantum Cryptography (PQC). The accelerator was developed with high-level synthesis (HLS) and it is composed of the encryption and decryption operations present in the KEM Kyber encapsulation and decapsulation algorithms. The developed architecture makes use of 33733 LUTs, 22810 FFs and 151 DSPs, being implemented in a low cost FPGA PYNQ-Z1 (XC7Z020-1 CLG400C). In a key exchange simulation performed with the Vitis HLS tool, the accelerator spent a total time of approximately 3.81 milliseconds, operating at 100MHz. In this simulation, the architecture developed had an estimated consumption of 2.243W of power. With the implementation of the accelerator in the FPGA, the observed time to perform the encryption and decryption operations was 5.01 and 2.24 milliseconds, respectively. The energy consumption in this process was approximately 6.2 Joules
|
|
18
|
-
MARCUS AURÉLIO CARVALHO GEORG
-
Proposed Cyber Risk Appetite Measurement Model: Using the AHP Method and the Basic Cybersecurity Framework.
-
Advisor : DEMETRIO ANTONIO DA SILVA FILHO
-
COMMITTEE MEMBERS :
-
GEORGES DANIEL AMVAME NZE
-
JOAO SOUZA NETO
-
RAFAEL RABELO NUNES
-
ROBSON DE OLIVEIRA ALBUQUERQUE
-
Data: Jun 29, 2023
-
-
Show Abstract
-
Making choices regarding the challenges that the cyber world has presented has been one of the most arduous tasks for managers, whether in the private or public sector. The losses related to legal noncompliance, discontinuity of services provided, loss of strategic information challenges related to the cyber supply chain, and costs related to controls focused on risk minimization, among others, have brought about the need, by managers, for more appropriate choices, with criteria and alternatives that speak more to the contexts in which they find themselves. This study aims to measure the cyber risk appetite proposed by top management, in a first moment, as well as to point out a strategy to reach this goal through the implementation of a series of controls that represent decisions based on the weights of criteria and alternatives defended by their managers. The model was applied to the reality of a Brazilian public agency, the Superior Court of Justice (STJ), where it is possible to observe the risk appetite through the choice of controls that are understood to be desired, as well as the identification of those that are not yet being implemented. The research demonstrated that it is possible to quantitatively measure an organization's risk appetite and that the appropriate choice of criteria, alternatives, and controls can make the proposed model a very promising decision support tool, allowing for an alignment between top management and the operational area of a company.
|
|
19
|
-
RICARDO CINCINATO FREITAS DE OLIVEIRA
-
USE OF 5G IN NATIONAL DEFENSE AND SECURITY: POSSIBILITIES, LIMITATIONS AND A CONCEPTUAL ARCHITECTURE PROPOSAL FOR BRAZILIAM ARMY
-
Advisor : UGO SILVA DIAS
-
COMMITTEE MEMBERS :
-
UGO SILVA DIAS
-
FABIO LUCIO LOPES DE MENDONCA
-
ROBSON DE OLIVEIRA ALBUQUERQUE
-
DAVID FERNANDES CRUZ MOURA
-
Data: Jun 29, 2023
-
-
Show Abstract
-
Brazil is an important global player due to several characteristics: physical, economic, political and military. It occupies 43.7% of the South American continent with 8,510,417.771 Km² of territory and has approximately 15,719 Km of land borders and another 7,400 Km of maritime borders. It holds several strategic natural resources in its subsoil and soil and on its extensive coastline in the South Atlantic Ocean. In addition, it has about 207,750,291 inhabitants, according to the census of 12/25/2022, and all this human and territorial heritage and strategic resources must be safeguarded from external and internal threats. Nowadays, in the Information Age, and with the advent of 5G Ecosystem in the world, the threats have become more comprehensive because of the Cyber Power of other foreign nations. Therefore, this work addressed some national and international doctrinal concepts on Information and Communications Security, Cybernetic Security, and on the 5G Global and 5G Brazilian Ecosystems. A wide bibliographical and documentary research was carried out between the years 2012 to 2023, of an applied nature with a qualitative approach, with an exploratory objective in the various international and national academic sources. An online questionnaire was also applied to groups of Brazilian Army soldiers about the dual use – civil and military – of the 5G Brazil Ecosystem in National Defense and Security. An electronic simulation was also carried out in HTZ Warfare software for the 5G coverage of the strategic areas of the Urban Military Sector, in the Federal District, which served as the basis for my proposal for a conceptual architecture of 5G for the Brazilian Army.
|
|
20
|
-
Alexandre Cabral Godinho
-
STALLA: A FRAMEWORK FOR OPEN SOURCE ANALYSIS DURING THE COVID-19 PANDEMIC
-
Advisor : GERALDO PEREIRA ROCHA FILHO
-
COMMITTEE MEMBERS :
-
EDNA DIAS CANEDO
-
FABIO LUCIO LOPES DE MENDONCA
-
GERALDO PEREIRA ROCHA FILHO
-
JOSE RODRIGUES TORRES NETO
-
Data: Jun 29, 2023
-
-
Show Abstract
-
The spread of social networks has resulted in an increase in the distribution of disinformation campaigns, which put national democratic stability at risk, becoming an unfavorable element for the intelligence knowledge production. In order to mitigate this bottleneck, the STALLA framework was proposed for the collection, treatment, automated labeling and analysis of information, providing greater efficiency in knowledge production. Thus, the study has as scope the Covid-19 pandemic, from data collected from short texts (tweets), in the Portuguese language, from the social network Twitter. Considering the related works, Recurrent Neural Networks (RNN) present themselves as the most suitable for textual analysis. Based on this premise, the performance of STALLA was analyzed by comparing the implementations of LSTM and BiLSTM networks, resulting in an accuracy of approximately 70\%, a value considered significant for the definition of information relevance.
|
|
21
|
-
Ricardo Ramos Sampaio
-
The Possibility of Performing Surveillance by Geolocation in Real time by the Brazilian Intelligence Agency
-
Advisor : UGO SILVA DIAS
-
COMMITTEE MEMBERS :
-
LUIZ HENRIQUE DINIZ ARAUJO
-
EDNA DIAS CANEDO
-
ROBSON DE OLIVEIRA ALBUQUERQUE
-
UGO SILVA DIAS
-
Data: Jun 30, 2023
-
-
Show Abstract
-
Technological advances have produced a process of change in the operational techniques used by intelligence services around the world. Obtaining information through photographs, communications, signals, images, waves, radiation and electromagnetic signatures developed rapidly and became a routine practice for intelligence services. The collection of information from open sources itself, together with the ability to analyze big data, has reached a unique stage. Old operational techniques have been converted into means of search and collection using technological mechanisms, giving an unprecedented range and breadth of data. Geolocation or determination in real time of an individual’s location, the electronic correspondent of surveillance, has been used, without further questioning, in several countries. This finding drives the development of this research, which once again verifies whether real-time geolocation can be used by ABIN, without this infringing national legislation and the privacy of individuals. It is in this context that it is essential to scrutinize the characteristics of intelligence services and the evolution of the right to privacy and data protection, also drawing a comparison between the instrumentality of data collection by the State with technology companies. Another important point to reach robust conclusions on the subject is to verify if the legislation, the chain and competence of authorization to act and the control mechanisms of the foreign intelligence services approach or distance themselves from the Brazilian one. Finally, an indepth examination of judicial decisions of the Federal Supreme Court and the Superior Court of Justice regarding privacy, data sharing, balancing of interests and static geolocation aims to reinforce the reasoning regarding the possibility of using geolocation in real time.
|
|
22
|
-
Alexandre Henrique Radis
-
Secure protocol for code injection into CubeCats
-
Advisor : DANIEL CHAVES CAFE
-
COMMITTEE MEMBERS :
-
JOAO JOSE COSTA GONDIM
-
DANIEL ALVES DA SILVA
-
GEORGES DANIEL AMVAME NZE
-
JANAINA GONCALVES GUIMARAES
-
Data: Jun 30, 2023
-
-
Show Abstract
-
A CubeSat-type satellite project starts with identifying your needs and continues with its development, assembly, launch, operation and obsolescence. However, needs can change over the lifecycle of the satellite, as with any project. In CubeSat-type satellites, the inclusion of new services becomes a major access challenge, due to the physical impossibility of the equipment. Code injection is a solution that allows the inclusion of new services in a satellite after its launch. The inclusion of new services in microcontrolled equipment presents several security challenges, mainly in CubeSat-type satellites, which have restrictions on energy, communication, processing, memory, among others. It is necessary to protect the microcontrolled system against denial of service attacks, data breach, equipment deactivation and hijacking. It is not possible to use techniques such as firewall, antivirus or artificial intelligence. As the inclusion of new services in the microcontrollers means the inclusion of new codes, and this means opening up a great opportunity for attacks. It is necessary to mitigate these attacks. Thus, the work presents a proposal for the inclusion of new codes mitigating
the possibility of effective attacks. This proposal comprises security measures, communication protocols, the use of HMAC to ensure compliance and integrity of the new codes, and a real-time operating system prepared for this challenge. The work presents a study of the state of the art and a bibliographic reference on the subject. The conceptual proposal follows, the methodology for implementing and testing the concepts, results and conclusions obtained. Among the results obtained, it was possible to observe the viability of the proposed measures, the defense of attempted injection attacks of malformed or non-authentic codes and improvement in the execution of SHA3 for the MSP430FR5994. Where it was possible to conclude the effectiveness of the adopted measures.
|
|
23
|
-
Liomar de Miranda Leite
-
IOT PLATFORM FOR SUPERVISION OF PHOTOVOLTAIC PLANT AND BUILDING AUTOMATION IN THE MINISTRY OF DEFENSE.
-
Advisor : FABIO LUCIO LOPES DE MENDONCA
-
COMMITTEE MEMBERS :
-
FABIO LUCIO LOPES DE MENDONCA
-
DANIEL ALVES DA SILVA
-
EDNA DIAS CANEDO
-
Gilmar dos Santos Marques
-
Data: Jun 30, 2023
-
-
Show Abstract
-
In recent years, large organizations have made major investments in alternative energy sources, with thecentral objective of medium-term financial tax and predictability in energy consumption planning. However, the commonly used solutions do not provide for broad monitoring and do not integrate the most diverseinformation on consumption and operability. The present work has as a general objective, the implementation of a IoT supervision platform with supervisory based on SCADA type systems (Supervisory Control And Data Acquisition), for the integration of the photovoltaic power plant installed in the Ministry of Defense (MD) located on the Esplanade of Ministries, Brasília-DF, establishing indicators and data of building operability, with the use of resourcesof the HTTP/Web Protocol, cloud computing and the guidelines of the RESTful Software Architecture Model. The platform integrates the intelligent components of the photovoltaic plant installed in the MD, such as inverters, power optimizers, microcontrollers, temperature and humidity sensors, for example, remotely monitoring the generation plant and the available building integration devices. In addition to the development of a monitoring system via WEB Services (WS) and mobile devices, the present work also presents performance analysis of the photovoltaic plant, allowing continuous and real-time monitoring of devices, fault detection, financial analysis of energy production and saving factors
|
|
24
|
-
Flávio Garcia Praciano
-
Data integrity analysis and performance in online courses using machine learning methods
-
Advisor : DANIEL ALVES DA SILVA
-
COMMITTEE MEMBERS :
-
DANIEL ALVES DA SILVA
-
EDNA DIAS CANEDO
-
Gilmar dos Santos Marques
-
ROBSON DE OLIVEIRA ALBUQUERQUE
-
Data: Jul 28, 2023
-
-
Show Abstract
-
This work aims a research that focuses on analyzing data integrity and performance in online courses, using machine learning methods. My proposal is to develop a tool capable of predicting the number of students who complete the course and identify possible cases of dropout or withdrawal. For this, it uses supervised machine learning algorithms, such as support vector machines (SVM) and artificial neural networks (ANNs), which enable a detailed and predictive analysis of the data. The approach I adopted for my research was qualitative bibliographic, exploring data from online courses and using data analysis techniques. Through these machine learning methods, i was able to identify patterns and trends in the data, allowing for a deeper understanding of the integrity of the records and student performance. This provides a solid basis for strategic decision-making by managers for staff training. The main goal of this analysis is to improve the efficiency and quality of online courses. With the tool I am proposing, it is possible to anticipate course completion results, identify factors that influence student dropout and implement strategies to increase the completion rate. By having a more accurate view of the students’ profile and the challenges they face, we can take proactive measures to improve course delivery and provide a more satisfying learning experience
|
|
25
|
-
Bruno Soares Rabelo
-
IOT PLATFORM FOR PREDICTING FAILURES IN VACCINE FREEZERS THROUGH CONTINUOUS MONITORING OF INTERNAL TEMPERATURE.
-
Advisor : FABIO LUCIO LOPES DE MENDONCA
-
COMMITTEE MEMBERS :
-
DANIEL ALVES DA SILVA
-
EDNA DIAS CANEDO
-
FABIO LUCIO LOPES DE MENDONCA
-
NILMAR DE SOUZA
-
Data: Aug 30, 2023
-
-
Show Abstract
-
The general structure of Internet of Things (IoT) networks is still an interesting subject for research and innovation. The general monitoring of devices in networks becomes a big challenge in these networks. This article proposes a study of an IoT platform for continuous monitoring of the internal temperature in ultra-low freezers used in vaccine storage to predict failures and unexpected stops. The proposal is to create an IoT system architecture model composed of a physical unit (Hardware) for local data collection and sending, temperature sensors and a cloud server that performs continuous (24/7) temperature monitoring in distributed freezers. in several health institutions in Brazil, in order to identify signs of failure through the use of a statistical method using predictive models for time series.
|
|
26
|
-
MOISES SILVA DE SOUSA
-
The use of Feature Engineering to optimize the performance of supervised machine learning models applied to Intrusion Detection Systems.
-
Advisor : WILLIAM FERREIRA GIOZZA
-
COMMITTEE MEMBERS :
-
FABIO LUCIO LOPES DE MENDONCA
-
GEORGES DANIEL AMVAME NZE
-
LEANDRO ALVES NEVES
-
WILLIAM FERREIRA GIOZZA
-
Data: Dec 20, 2023
-
-
Show Abstract
-
The use of machine learning (ML) techniques for building intrusion detection systems (IDS) has been growing every year. Numerous ML technologies have been emerged allowing to build predictive learning models in order to identify and detect network traffic anomalies using IDS. A part of the ML techniques is a nonparameterized approach, extracting data from large datasets in an undiscriminated way which includes irrelevant and redundant data, affecting adversely the performance of the ML classification algorithms. However, it is possible to provide to a ML technique the ability to properly extract data from the dataset by selecting an appropriate subset of attributes, i.e., by means of feature engineering (FE), that allows to improve the performance of the data extraction, training and classification ML processes. This work discusses how feature engineering can be used to improve the ML processes in IDS systems. In particular, it demonstrates that with an appropriate selection of attributes, the training process can be disrupted, improving the processing speed while maintaining the desired classification accuracy. The performance evaluation experiments are based on the WEKA software platform using the dataset NSL-KDD and the Support-Vector Machine (SVM) as machine learning classification algorithm. By using different data testtraining division ratios (60- 40, 70- 30 and 80-20) and attribute selection techniques (Information Gain, Correlation Gain and Correlation-based Feature Selection – CFS) this work achieves results that allow to understand how feature engineering may impact positively the performance of an ML-IDS system.
|
|