Essays about: "EVALUATION ids"

Showing result 1 - 5 of 15 essays containing the words EVALUATION ids.

  1. 1. HL-DRIP: A Blockchain-based Remote Drone ID Protocol registry management : Evaluation of a Hyperledger Fabric-based solution to manage DRIP registries

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Juan Basaez Serey; [2023]
    Keywords : DRIP; Drone Remote ID; Hyperledger-Fabric; IPFS;

    Abstract : On January 15, 2021, the Federal Aviation Administration published the Unmanned Aircraft System Remote Identification rule with the intention of improving airspace security regarding the use of Unmanned Aircraft. According to the rule, UAs in flight must provide the public with information such as their identification, location, and altitude. READ MORE

  2. 2. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Venkata Sai Bala Ratan Murali Puvvada; Hemanth Kandala; [2023]
    Keywords : Intrusion Detection Systems; Slow HTTP DoS Attacks; Snort; Suricata; Rule sets.;

    Abstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE

  3. 3. Evaluating the efficiency of Host-based Intrusion Detection Systems protecting web applications

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Adam Willerton; Rasmus Gustafsson; [2022]
    Keywords : Intrusion Detection System; IDS; Host-based Intrusion Detection System; HIDS; Web applications; Efficiency;

    Abstract : Background. Web applications are a more significant part of our digital experience, and the number of users keeps continuously growing. Social media alone accounts for more than half of the world’s population. Therefore these applications have become a lucrative target for attackers, and we have seen several attacks against them. READ MORE

  4. 4. A Concept for an Intrusion Detection System over Automotive Ethernet

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Hanna Lindwall; Pontus Ovhagen; [2020]
    Keywords : Intrusion Detection System; Deep Packet Inspection; Specification-based Detection; Anomaly-based Detection; V2G; Automotive Ethernet.; Technology and Engineering;

    Abstract : A modern automotive vehicle is a complex technical system, containing many electronic, mechanical, and software parts. Typically, a high-end vehicle contains 70 or more electronic control units (ECUs) on average. READ MORE

  5. 5. Analyzing Radial Basis Function Neural Networks for predicting anomalies in Intrusion Detection Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sai Shyamsunder Kamat; [2019]
    Keywords : anomaly; cyber security; evaluation; machine learning; radial basis function; random forest classifier; supervised learning; anomali; cybersäkerhet; utvärdering; maskininlärning; radialbaserad funktion; slumpmässig skogsklassificering; övervakad inlärning;

    Abstract : In the 21st century, information is the new currency. With the omnipresence of devices connected to the internet, humanity can instantly avail any information. However, there are certain are cybercrime groups which steal the information. READ MORE