Essays about: "Intrusion Detection System IDS"
Showing result 11 - 15 of 42 essays containing the words Intrusion Detection System IDS.
-
11. Blackhole Attack Detection in Low-Power IoT Mesh Networks Using Machine Learning Algorithms
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Low-Power Lossy Networks (LLNs) are a type of Internet of Things (IoT) meshnetwork that collaboratively interact and perform various tasks autonomously. TheRouting Protocol for Low-power and Lossy Network (RPL) is the most used rout-ing protocol for LLNs. READ MORE
-
12. INTRUSION DETECTION USING MACHINE LEARNING FOR INDUSTRIAL CONTROL SYSTEMS
University essay from Mälardalens högskola/Akademin för innovation, design och teknikAbstract : An intrusion detection system (IDS) is a software application that monitors a network forunauthorized and malicious activities or security policy violations related to confidentiality,integrity, and availability of a system. In this thesis, we performed detailed literature reviewson the different types of IDS, anomaly detection methods, and machine learning algorithmsthat can be used for detection and classification. READ MORE
-
13. A Performance Analysis of Intrusion Detection with Snort and Security Information Management
University essay from Linköpings universitet/Databas och informationsteknikAbstract : Network intrusion detection systems (NIDSs) are a major component in cybersecurity and can be implemented with open-source software. Active communities and researchers continue to improve projects and rulesets used for detecting threats to keep up with the rapid development of the internet. READ MORE
-
14. Combining Anomaly- and Signaturebased Algorithms for IntrusionDetection in CAN-bus : A suggested approach for building precise and adaptiveintrusion detection systems to controller area networks
University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)Abstract : With the digitalization and the ever more computerization of personal vehicles, new attack surfaces are introduced, challenging the security of the in-vehicle network. There is never such a thing as fully securing any computer system, nor learning all the methods of attack in order to prevent a break-in into a system. READ MORE
-
15. Anomaly-based Intrusion Detection Using Convolutional Neural Networks for IoT Devices
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. The rapid growth of IoT devices in homes put people at risk of cyberattacks and the low power and computing capabilities in IoT devices make it difficultto design a security solution for them. READ MORE