Essays about: "Intrusion Detection System IDS"

Showing result 11 - 15 of 42 essays containing the words Intrusion Detection System IDS.

  1. 11. Blackhole Attack Detection in Low-Power IoT Mesh Networks Using Machine Learning Algorithms

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Hossein Keipour; [2022]
    Keywords : IoT; 6LoWPAN; RPL; Intrusion Detection System; Machine Learning;

    Abstract : Low-Power Lossy Networks (LLNs) are a type of Internet of Things (IoT) meshnetwork that collaboratively interact and perform various tasks autonomously. TheRouting Protocol for Low-power and Lossy Network (RPL) is the most used rout-ing protocol for LLNs. READ MORE

  2. 12. INTRUSION DETECTION USING MACHINE LEARNING FOR INDUSTRIAL CONTROL SYSTEMS

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Roland Plaka; [2021]
    Keywords : intrusion detection; machine learning; security;

    Abstract : An intrusion detection system (IDS) is a software application that monitors a network forunauthorized and malicious activities or security policy violations related to confidentiality,integrity, and availability of a system. In this thesis, we performed detailed literature reviewson the different types of IDS, anomaly detection methods, and machine learning algorithmsthat can be used for detection and classification. READ MORE

  3. 13. A Performance Analysis of Intrusion Detection with Snort and Security Information Management

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Christian Thorarensen; [2021]
    Keywords : Snort; Snort 3; PulledPork; IDS; Open Distro for Elasticsearch; ODFE; SIM; SIEM; ET Open; D-ITG;

    Abstract : Network intrusion detection systems (NIDSs) are a major component in cybersecurity and can be implemented with open-source software. Active communities and researchers continue to improve projects and rulesets used for detecting threats to keep up with the rapid development of the internet. READ MORE

  4. 14. Combining Anomaly- and Signaturebased Algorithms for IntrusionDetection in CAN-bus : A suggested approach for building precise and adaptiveintrusion detection systems to controller area networks

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Robin Andersson; [2021]
    Keywords : CAN; Controller Area Network; IDS; Intrusion detection; personal vehicles; machine learning; hybrid; proof of concept; embeded systems; software architecture; malicious; security;

    Abstract : With the digitalization and the ever more computerization of personal vehicles, new attack surfaces are introduced, challenging the security of the in-vehicle network. There is never such a thing as fully securing any computer system, nor learning all the methods of attack in order to prevent a break-in into a system. READ MORE

  5. 15. Anomaly-based Intrusion Detection Using Convolutional Neural Networks for IoT Devices

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Albin Söderström; [2021]
    Keywords : Internet of Things; Deep learning; Intrusion detection;

    Abstract : Background. The rapid growth of IoT devices in homes put people at risk of cyberattacks and the low power and computing capabilities in IoT devices make it difficultto design a security solution for them. READ MORE