Essays about: "Signature Based Detection"

Showing result 1 - 5 of 22 essays containing the words Signature Based Detection.

  1. 1. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Josephine Spångberg; Vainius Mikelinskas; [2023]
    Keywords : Cyber threats; Malware; Cyber attacks; Signature Based Detection; Anomaly Detection; Cyber defense; Sophisticated attacks; Modern cyberattacks; malware detection in wireless network; IoT;

    Abstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE

  2. 2. On The Evaluation of District Heating Load Predictions

    University essay from Lunds universitet/Institutionen för energivetenskaper

    Author : Herman Hansson; [2023]
    Keywords : Technology and Engineering;

    Abstract : District Heating is a technology with the potential to enable a fossil-free society. However, to realize this potential, some improvements need to be made in order to improve District Heating operation at large, decrease losses in the systems, and thus increase the competitiveness of District Heating as a technology. READ MORE

  3. 3. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Peter Stegeby; [2023]
    Keywords : Intrusion detection; HIDS; NIDS; Signature-based; Linux; Windows; Sniffing packets; Upptäcka intrång; HIDS; NIDS; Signatur-baserad; Linux; Windows; Paketsniffing.;

    Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE

  4. 4. Comparison and optimization of extracellular vesicle (EV) capturing on functional thin films for their molecular profiling

    University essay from KTH/Tillämpad fysik

    Author : Prattakorn Metem; [2023]
    Keywords : extracellular vesicle; plasmonic nanohole array; atomic force microscopy; fluorescence analysis; extracellulära vesiklar; nanohålsuppsättning; atomkraftsmikroskopi; fluorescensanalys;

    Abstract : Extracellular vesicles (EVs) are lipid bilayer encapsulated nanoparticles which have emerged as an excellent source of biomarkers for multiple diseases, including cancer. However, they are highly heterogeneous in their molecular compositions which remains a major challenge hindering the utilization of their biomarker potential. READ MORE

  5. 5. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Venkata Sai Bala Ratan Murali Puvvada; Hemanth Kandala; [2023]
    Keywords : Intrusion Detection Systems; Slow HTTP DoS Attacks; Snort; Suricata; Rule sets.;

    Abstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE