Essays about: "Anomaly-based Detection"

Showing result 1 - 5 of 13 essays containing the words Anomaly-based Detection.

  1. 1. Increasing the Trustworthiness ofAI-based In-Vehicle IDS usingeXplainable AI

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Hampus Lundberg; [2022]
    Keywords : Intrusion Detection System; In-Vehicle Intrusion Detection System; Machine Learning; Deep Learning; Explainable Artificial Intelligence; Trustworthiness.;

    Abstract : An in-vehicle intrusion detection system (IV-IDS) is one of the protection mechanisms used to detect cyber attacks on electric or autonomous vehicles where anomaly-based IDS solution have better potential at detecting the attacks especially zero-day attacks. Generally, the IV-IDS generate false alarms (falsely detecting normal data as attacks) because of the difficulty to differentiate between normal and attack data. READ MORE

  2. 2. Anomaly Detection in Log Files Using Machine Learning Techniques

    University essay from Blekinge Tekniska Högskola/Fakulteten för datavetenskaper

    Author : Lakshmi Geethanjali Mandagondi; [2021]
    Keywords : Anomaly Detection; Log Files; Machine Learning; Clustering; Outlier Detection;

    Abstract : Context: Log files are produced in most larger computer systems today which contain highly valuable information about the behavior of the system and thus they are consulted fairly often in order to analyze behavioral aspects of the system. Because of the very high number of log entries produced in some systems, it is however extremely difficult to seek out relevant information in these files. READ MORE

  3. 3. Anomaly detection for automated security log analysis : Comparison of existing techniques and tools

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Måns Fredriksson Franzén; Nils Tyrén; [2021]
    Keywords : Security; Log analysis; Anomaly detection; Machine learning; Clustering;

    Abstract : Logging security-related events is becoming increasingly important for companies. Log messages can be used for surveillance of a system or to make an assessment of the dam- age caused in the event of, for example, an infringement. READ MORE

  4. 4. What's the Deal with Stegomalware? : The Techniques, Challenges, Defence and Landscape

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Kristoffer Björklund; [2021]
    Keywords : Stegomalware; steganography; information hiding; covert channel;

    Abstract : Stegomalware is the art of hiding malicious software with steganography. Steganography is the technique of hiding data in a seemingly innocuous carrier. The occurrence of stegomalware is increasing, with attackers using ingenious techniques to avoid detection. READ MORE

  5. 5. Using Supervised Learning and Data Fusion to Detect Network Attacks

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Jesper Hautsalo; [2021]
    Keywords : Network intrusion detection; IDS; network attacks; supervised learning;

    Abstract : Network attacks remain a constant threat to organizations around the globe. Intrusion detection systems provide a vital piece of the protection needed in order to fend off these attacks. Machine learning has become a popular method for developing new anomaly-based intrusion detection systems, and in recent years, deep learning has followed suit. READ MORE