Essays about: "intrusion detection technology"

Showing result 1 - 5 of 69 essays containing the words intrusion detection technology.

  1. 1. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yashwanth Venkata Sai Kumar Adabala; Lakshmi Venkata Raghava Sudheer Devanaboina; [2024]
    Keywords : Software Defined Networking; SDN; IP Spoofing; Flooding; DDoS Attacks; Mininet; Snort IDS; Network Security;

    Abstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE

  2. 2. Intrusion Detection in IT Infrastructures using Hidden Markov Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Christopher Liu; Sabrina Al-Haddad; [2023]
    Keywords : ;

    Abstract : In the past decades, cloud based services have developed rapidly. And as a result, cybercrimehas increased in sophistication as well as frequency. It therefore becomes vital to have solidprotection against such attacks, especially for infrastructures containing sensitive information. READ MORE

  3. 3. Design and Implementation of an Efficient Intrusion Response System for 5G RAN Baseband Units

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Mirna Ghazzawi; Adil Imran; [2023]
    Keywords : Intrusion Response System; Security; OSSEC; Radio Access Network; Baseband Units;

    Abstract : The 5G Radio Access Network (RAN) is a critical system that must be secured against potential attacks, particularly its Base-Band Unit (BBU), which is a common target for intrusions. Ericsson, which is a big provider of such systems, has placed significant emphasis on implementing Intrusion Detection Systems (IDS) to detect threats. READ MORE

  4. 4. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Venkata Sai Bala Ratan Murali Puvvada; Hemanth Kandala; [2023]
    Keywords : Intrusion Detection Systems; Slow HTTP DoS Attacks; Snort; Suricata; Rule sets.;

    Abstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE

  5. 5. Implementing and evaluating variations of the Blackhole attack on RPL

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Adam Pettersson; [2022]
    Keywords : ;

    Abstract : The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) is the most used routing protocol for resource constrained Internet-of-Things (IoT) networks. With the massive increase in number of Internet-connected IoT devices and the fact that they are becoming more common in safety-critical environments such as in health-care and in the industry, security in these networks are of a big concern. READ MORE