Essays about: "preventing network attacks"

Showing result 1 - 5 of 10 essays containing the words preventing network attacks.

  1. 1. Combining Anomaly- and Signaturebased Algorithms for IntrusionDetection in CAN-bus : A suggested approach for building precise and adaptiveintrusion detection systems to controller area networks

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Robin Andersson; [2021]
    Keywords : CAN; Controller Area Network; IDS; Intrusion detection; personal vehicles; machine learning; hybrid; proof of concept; embeded systems; software architecture; malicious; security;

    Abstract : With the digitalization and the ever more computerization of personal vehicles, new attack surfaces are introduced, challenging the security of the in-vehicle network. There is never such a thing as fully securing any computer system, nor learning all the methods of attack in order to prevent a break-in into a system. READ MORE

  2. 2. Anomaly-based Intrusion Detection Using Convolutional Neural Networks for IoT Devices

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Albin Söderström; [2021]
    Keywords : Internet of Things; Deep learning; Intrusion detection;

    Abstract : Background. The rapid growth of IoT devices in homes put people at risk of cyberattacks and the low power and computing capabilities in IoT devices make it difficultto design a security solution for them. READ MORE

  3. 3. A Cloud-native Vehicular Public Key Infrastructure : Towards a Highly-available and Dynamically- scalable VPKIaaS

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hamid Noroozi; [2021]
    Keywords : Security; Privacy; Vehicular PKI; VPKI; Identity and Credential Management; Vehicular Communications; VANETs; Availability; Scalability; Resilient; Efficiency; Microservice; Container Orchestration; Cloud; Pseudonym Transition; Pseudonym Unlinkability.; Säkerhet; personlig integritet; identitet- och behörighetsuppgifter; tillgänglighet; skalbarhet; motståndskraftig; effektivitet; moln; pseudonymitet; anonymitet; ospårbarhet.;

    Abstract : Efforts towards standardization of Vehicular Communication Systems (VCSs) have been conclusive on the use of Vehicular Public-Key Infrastructure (VPKI) for the establishment of trust among network participants. Employing VPKI in Vehicular Communication (VC) guarantees the integrity and authenticity of Cooperative Awareness Messages (CAMs) and Decentralized Environmental Notification Messages (DENMs). READ MORE

  4. 4. Machine Learning in Defensive IT Security: Early Detection of Novel Threats

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ren Duan; [2019]
    Keywords : ;

    Abstract : The rapid development of technology leads to a rise in cybercrime, hence cybersecurityis of unprecedented significance, especially for businesses. Defensiveand forensic IT security is a rather niche field in IT security but it issurely going to grow. It focuses on preventing attacks by good design standardsand the education of persons. READ MORE

  5. 5. A Hardware-based Secure Communication Module to Protect Internet Connected Vehicles

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Andreas Schmoll; [2018]
    Keywords : ;

    Abstract : Information technology has not only been a driving force of the car industries within the last couple of years but it even seems to be of growing importance for the unforeseeable future. The inclusion of information technology is accompanied with the promise of increased comfort and the prospect that future autonomous and connected cars will become a place to spend our time while being on the road. READ MORE