Essays about: "EVALUATION ids"

Showing result 1 - 5 of 11 essays containing the words EVALUATION ids.

  1. 1. Analyzing Radial Basis Function Neural Networks for predicting anomalies in Intrusion Detection Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sai Shyamsunder Kamat; [2019]
    Keywords : anomaly; cyber security; evaluation; machine learning; radial basis function; random forest classifier; supervised learning; anomali; cybersäkerhet; utvärdering; maskininlärning; radialbaserad funktion; slumpmässig skogsklassificering; övervakad inlärning;

    Abstract : In the 21st century, information is the new currency. With the omnipresence of devices connected to the internet, humanity can instantly avail any information. However, there are certain are cybercrime groups which steal the information. READ MORE

  2. 2. Lightweight Portable Intrusion Detection System for Auditing Applications : Implementation and evaluation of a lightweight portable intrusion detection system using Raspberry Pi and Wi-Fi Pineapple

    University essay from Linköpings universitet/Databas och informationsteknik; Linköpings universitet/Databas och informationsteknik

    Author : Carl Nykvist; Martin Larsson; [2019]
    Keywords : IDS; LPIDS; KMP; Raspberry Pi; Aho-Corasick; Wi-Fi Pineapple;

    Abstract : The goal of this thesis was to develop, deploy and evaluate a lightweight portable intrusion detection system (LPIDS) over wireless networks. The LPIDS was developed by adopting two different string matching algorithms: Aho-Corasick algorithm and Knuth–Morris–Pratt algorithm (KMP). READ MORE

  3. 3. Evaluation of Intrusion Detection Systems under Denial of Service Attack in virtual  Environment

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : venkatesh nagadevara; [2017]
    Keywords : snort; suricata; ossec; intrusion detection system;

    Abstract : Context. The intrusion detection systems are being widely used for detecting the malicious traffic in many industries and they use a variety of technologies. Each IDs had different architecture and are deployed for detecting malicious activity. Intrusion detection system has a different set of rules which can defined based on requirement. READ MORE

  4. 4. Near Real-time Detection of Masquerade attacks in Web applications : catching imposters using their browsing behavor

    University essay from KTH/Kommunikationsnät

    Author : Vasileios Panopoulos; [2016]
    Keywords : Naive Bayes; SVM; Support Vector Machines; Machine Learning; IDS; Intrusion Detection System; Web Application; scikit-learn;

    Abstract : This Thesis details the research on Machine Learning techniques that are central in performing Anomaly and Masquerade attack detection. The main focus is put on Web Applications because of their immense popularity and ubiquity. This popularity has led to an increase in attacks, making them the most targeted entry point to violate a system. READ MORE

  5. 5. IDS on Raspberry Pi : A Performance Evaluation

    University essay from Linnéuniversitetet/Institutionen för datavetenskap (DV); Linnéuniversitetet/Institutionen för datavetenskap (DV)

    Author : Andreas Aspernäs; Thommy Simonsson; [2015]
    Keywords : IDS; intrusion detection system; Raspberry Pi model B ; Raspberry Pi 2 model B; Arch Linux ARM; Snort; network; security; throughput; IDS; intrångdetekteringssystem; Raspberry Pi model B ; Raspberry Pi 2 model B; Arch Linux ARM; Snort; nätverk; säkerhet; datagenomströmning;

    Abstract : This is a report on the possibility of using a Raspberry Pi as an intrusion detection system in a home environment to increase network security. The focus of this study was on how well two different generations of Raspberry Pi would be able to  handle network traffic while acting as an intrusion detection system. READ MORE