Cloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systems
dc.contributor.author | Kholidy, Hisham A. | |
dc.date.accessioned | 2020-12-23T16:24:50Z | |
dc.date.available | 2020-12-23T16:24:50Z | |
dc.date.issued | 2020 | |
dc.identifier.citation | Kholidy, H. A. (2020). Cloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systems. Department of Computer and Network Security, College of Engineering, SUNY Polytechnic Institute. | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.12648/1605 | |
dc.description.abstract | In this report, we discuss some of our hacking and security solutions that we developed at our Advanced Cybersecurity Research Lab (ACRL). This report consists of the following five main experimental packages: 1) Exploiting the cloud computing system using a DDoS attack and developing a distributed deployment of a cloud based Intrusion Detection System (IDS) solution. 2) Hacking SCADA systems components. 3) Hacking Metasploitable machines. 4) Hacking Windows 7 system. 5) Windows Post Exploitation. | en_US |
dc.publisher | SUNY Polytechnic Institute | en_US |
dc.subject | cybersecurity | en_US |
dc.subject | computer hacking | en_US |
dc.subject | DDoS attack | en_US |
dc.subject | cloud computing | en_US |
dc.title | Cloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systems | en_US |
dc.type | Other | en_US |
dc.description.version | NA | en_US |
refterms.dateFOA | 2020-12-23T16:24:51Z | |
dc.description.institution | SUNY Polytechnic Institute | en_US |
dc.description.department | College of Engineering, Department of Network and Computer Security | en_US |
dc.description.degreelevel | N/A | en_US |
Files in this item
This item appears in the following Collection(s)
-
SUNY Polytechnic Institute College of Engineering
This collection contains master's theses, capstone projects, and other student and faculty work from programs within the Department of Engineering, including computer science and network security.