Essays about: "OSSEC"

Found 3 essays containing the word OSSEC.

  1. 1. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Peter Stegeby; [2023]
    Keywords : Intrusion detection; HIDS; NIDS; Signature-based; Linux; Windows; Sniffing packets; Upptäcka intrång; HIDS; NIDS; Signatur-baserad; Linux; Windows; Paketsniffing.;

    Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE

  2. 2. Design and Implementation of an Efficient Intrusion Response System for 5G RAN Baseband Units

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Mirna Ghazzawi; Adil Imran; [2023]
    Keywords : Intrusion Response System; Security; OSSEC; Radio Access Network; Baseband Units;

    Abstract : The 5G Radio Access Network (RAN) is a critical system that must be secured against potential attacks, particularly its Base-Band Unit (BBU), which is a common target for intrusions. Ericsson, which is a big provider of such systems, has placed significant emphasis on implementing Intrusion Detection Systems (IDS) to detect threats. READ MORE

  3. 3. Evaluation of Intrusion Detection Systems under Denial of Service Attack in virtual  Environment

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : venkatesh nagadevara; [2017]
    Keywords : snort; suricata; ossec; intrusion detection system;

    Abstract : Context. The intrusion detection systems are being widely used for detecting the malicious traffic in many industries and they use a variety of technologies. Each IDs had different architecture and are deployed for detecting malicious activity. Intrusion detection system has a different set of rules which can defined based on requirement. READ MORE