Essays about: "Intrusion Detection System IDS"

Showing result 21 - 25 of 42 essays containing the words Intrusion Detection System IDS.

  1. 21. Machine Learning for a Network-based Intrusion Detection System : An application using Zeek and the CICIDS2017 dataset

    University essay from KTH/Hälsoinformatik och logistik

    Author : Vilhelm Gustavsson; [2019]
    Keywords : Machine Learning; Flow-based traffic characterization; Intrusion Detection System IDS ; Zeek; Bro; CICIDS2017; Scikit-Learn; Maskininlärning; Flödesbaserad trafik-karaktärisering; Intrångsdetekteringssystem IDS ; Zeek; Bro; CICIDS2017; Scikit-Learn;

    Abstract : Cyber security is an emerging field in the IT-sector. As more devices are connected to the internet, the attack surface for hackers is steadily increasing. Network-based Intrusion Detection Systems (NIDS) can be used to detect malicious traffic in networks and Machine Learning is an up and coming approach for improving the detection rate. READ MORE

  2. 22. Secure Self-Reconfiguring Services to Mitigate DoS Attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Silvan Zeller; [2019]
    Keywords : Rule-Based IDS; Runtime Verification; Domain Attacks; Self-Reconfiguring Systems;

    Abstract : Protecting web services from cyber attacks is a complex problem requiring many layers of defense and mitigation strategies. Out of the diverse range of attacks, denial of service (DoS) attacks on the business logic – or the domain – are poorly studied and no widely accepted general-purpose software product to prevent these attacks exists today. READ MORE

  3. 23. Security Threats and Countermeasures for Connected Vehicles

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xuwei Gong; [2019]
    Keywords : Connected vehicle; Use case; Threat analysis; Countermeasures; anslutna fordon; användningsfall; hotanalys; motåtgärd;

    Abstract : With the rapid development of connected vehicles, automotive security has become one of the most important topics. To study how to protect the security of vehicle communication, we analyze potential threats for connected vehicles and discuss countermeasures to mitigate these threats. READ MORE

  4. 24. Lightweight Portable Intrusion Detection System for Auditing Applications : Implementation and evaluation of a lightweight portable intrusion detection system using Raspberry Pi and Wi-Fi Pineapple

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Carl Nykvist; Martin Larsson; [2019]
    Keywords : IDS; LPIDS; KMP; Raspberry Pi; Aho-Corasick; Wi-Fi Pineapple;

    Abstract : The goal of this thesis was to develop, deploy and evaluate a lightweight portable intrusion detection system (LPIDS) over wireless networks. The LPIDS was developed by adopting two different string matching algorithms: Aho-Corasick algorithm and Knuth–Morris–Pratt algorithm (KMP). READ MORE

  5. 25. COUNTERMEASURES AGAINST COORDINATED CYBER-ATTACKS TOWARDS POWER GRID SYSTEMS : A systematic literature study

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Jonatan Johansson; [2019]
    Keywords : ;

    Abstract : A study on countermeasures against coordinated cyber-attacks (CCA) towards power grid systems has been carried out. A coordinated cyber-attack is a cyber-based attack where multiple attackers use multiple attack-mechanisms towards multiple targets in a coordinated fashion. READ MORE