Essays about: "Malicious Activity Detection"
Showing result 1 - 5 of 8 essays containing the words Malicious Activity Detection.
-
1. Intrusion Detection in IT Infrastructures using Hidden Markov Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the past decades, cloud based services have developed rapidly. And as a result, cybercrimehas increased in sophistication as well as frequency. It therefore becomes vital to have solidprotection against such attacks, especially for infrastructures containing sensitive information. READ MORE
-
2. Hidden Markov Models for Intrusion Detection Under Background Activity
University essay from KTH/Matematisk statistikAbstract : Detecting a malicious hacker intruding on a network system can be difficult. This challenge is made even more complex by the network activity generated by normal users and by the fact that it is impossible to know the hacker’s exact actions. READ MORE
-
3. Malicious Activity Detection in Encrypted Network Traffic using A Fully Homomorphic Encryption Method
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Everyone is in need for their own privacy and data protection, since encryption transmission was becoming common. Fully Homomorphic Encryption (FHE) has received increased attention because of its capability to execute calculations over the encoded domain. Through using FHE approach, model training can be properly outsourced. READ MORE
-
4. Detection Of Malicious Activity in Network Traffic on a Binary Representation using Image Analysis
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : In this thesis, we explore the idea of using binary visualization and image analysis to detect anomalous activity on an Industrial Internet of Things (IIoT) based network. The data is gathered into a pcap file and then fed into our encoder, which uses a space-filling curve to convert the 1-dimensional stream of data into pixels with a specific red, blue, and green gradient value. READ MORE
-
5. Combining Anomaly- and Signaturebased Algorithms for IntrusionDetection in CAN-bus : A suggested approach for building precise and adaptiveintrusion detection systems to controller area networks
University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)Abstract : With the digitalization and the ever more computerization of personal vehicles, new attack surfaces are introduced, challenging the security of the in-vehicle network. There is never such a thing as fully securing any computer system, nor learning all the methods of attack in order to prevent a break-in into a system. READ MORE