Essays about: "Intrusion Detection System IDS"
Showing result 21 - 25 of 42 essays containing the words Intrusion Detection System IDS.
-
21. Machine Learning for a Network-based Intrusion Detection System : An application using Zeek and the CICIDS2017 dataset
University essay from KTH/Hälsoinformatik och logistikAbstract : Cyber security is an emerging field in the IT-sector. As more devices are connected to the internet, the attack surface for hackers is steadily increasing. Network-based Intrusion Detection Systems (NIDS) can be used to detect malicious traffic in networks and Machine Learning is an up and coming approach for improving the detection rate. READ MORE
-
22. Secure Self-Reconfiguring Services to Mitigate DoS Attacks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Protecting web services from cyber attacks is a complex problem requiring many layers of defense and mitigation strategies. Out of the diverse range of attacks, denial of service (DoS) attacks on the business logic – or the domain – are poorly studied and no widely accepted general-purpose software product to prevent these attacks exists today. READ MORE
-
23. Security Threats and Countermeasures for Connected Vehicles
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rapid development of connected vehicles, automotive security has become one of the most important topics. To study how to protect the security of vehicle communication, we analyze potential threats for connected vehicles and discuss countermeasures to mitigate these threats. READ MORE
-
24. Lightweight Portable Intrusion Detection System for Auditing Applications : Implementation and evaluation of a lightweight portable intrusion detection system using Raspberry Pi and Wi-Fi Pineapple
University essay from Linköpings universitet/Databas och informationsteknikAbstract : The goal of this thesis was to develop, deploy and evaluate a lightweight portable intrusion detection system (LPIDS) over wireless networks. The LPIDS was developed by adopting two different string matching algorithms: Aho-Corasick algorithm and Knuth–Morris–Pratt algorithm (KMP). READ MORE
-
25. COUNTERMEASURES AGAINST COORDINATED CYBER-ATTACKS TOWARDS POWER GRID SYSTEMS : A systematic literature study
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : A study on countermeasures against coordinated cyber-attacks (CCA) towards power grid systems has been carried out. A coordinated cyber-attack is a cyber-based attack where multiple attackers use multiple attack-mechanisms towards multiple targets in a coordinated fashion. READ MORE