Advanced search
Found 3 essays matching the above criteria.
-
1. Information-Theoretic Framework for Network Anomaly Detection: Enabling online application of statistical learning models to high-speed traffic
University essay from KTH/Matematisk statistikAbstract : With the current proliferation of cyber attacks, safeguarding internet facing assets from network intrusions, is becoming a vital task in our increasingly digitalised economies. Although recent successes of machine learning (ML) models bode the dawn of a new generation of intrusion detection systems (IDS); current solutions struggle to implement these in an efficient manner, leaving many IDSs to rely on rule-based techniques. READ MORE
-
2. Content Management Systems and MD5: Investigating Alternative Methods of Version Identification for Open Source Projects
University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknikAbstract : WordPress is a very widely used content management system that enables users to easier create websites. The popularity of WordPress has made it a prime target for attacks by hackers since a potential vulnerability would affect many targets. Vulnerabilities that can be utilised in an attack are referred to as exploits. READ MORE
-
3. Evaluation of Intrusion Detection Systems under Denial of Service Attack in virtual Environment
University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknikAbstract : Context. The intrusion detection systems are being widely used for detecting the malicious traffic in many industries and they use a variety of technologies. Each IDs had different architecture and are deployed for detecting malicious activity. Intrusion detection system has a different set of rules which can defined based on requirement. READ MORE