Essays about: "EVALUATION ids"

Showing result 1 - 5 of 12 essays containing the words EVALUATION ids.

  1. 1. A Concept for an Intrusion Detection System over Automotive Ethernet

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Hanna Lindwall; Pontus Ovhagen; [2020]
    Keywords : Intrusion Detection System; Deep Packet Inspection; Specification-based Detection; Anomaly-based Detection; V2G; Automotive Ethernet.; Technology and Engineering;

    Abstract : A modern automotive vehicle is a complex technical system, containing many electronic, mechanical, and software parts. Typically, a high-end vehicle contains 70 or more electronic control units (ECUs) on average. READ MORE

  2. 2. Analyzing Radial Basis Function Neural Networks for predicting anomalies in Intrusion Detection Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sai Shyamsunder Kamat; [2019]
    Keywords : anomaly; cyber security; evaluation; machine learning; radial basis function; random forest classifier; supervised learning; anomali; cybersäkerhet; utvärdering; maskininlärning; radialbaserad funktion; slumpmässig skogsklassificering; övervakad inlärning;

    Abstract : In the 21st century, information is the new currency. With the omnipresence of devices connected to the internet, humanity can instantly avail any information. However, there are certain are cybercrime groups which steal the information. READ MORE

  3. 3. Lightweight Portable Intrusion Detection System for Auditing Applications : Implementation and evaluation of a lightweight portable intrusion detection system using Raspberry Pi and Wi-Fi Pineapple

    University essay from Linköpings universitet/Databas och informationsteknik; Linköpings universitet/Databas och informationsteknik

    Author : Carl Nykvist; Martin Larsson; [2019]
    Keywords : IDS; LPIDS; KMP; Raspberry Pi; Aho-Corasick; Wi-Fi Pineapple;

    Abstract : The goal of this thesis was to develop, deploy and evaluate a lightweight portable intrusion detection system (LPIDS) over wireless networks. The LPIDS was developed by adopting two different string matching algorithms: Aho-Corasick algorithm and Knuth–Morris–Pratt algorithm (KMP). READ MORE

  4. 4. Evaluation of Intrusion Detection Systems under Denial of Service Attack in virtual  Environment

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : venkatesh nagadevara; [2017]
    Keywords : snort; suricata; ossec; intrusion detection system;

    Abstract : Context. The intrusion detection systems are being widely used for detecting the malicious traffic in many industries and they use a variety of technologies. Each IDs had different architecture and are deployed for detecting malicious activity. Intrusion detection system has a different set of rules which can defined based on requirement. READ MORE

  5. 5. Near Real-time Detection of Masquerade attacks in Web applications : catching imposters using their browsing behavor

    University essay from KTH/Kommunikationsnät

    Author : Vasileios Panopoulos; [2016]
    Keywords : Naive Bayes; SVM; Support Vector Machines; Machine Learning; IDS; Intrusion Detection System; Web Application; scikit-learn;

    Abstract : This Thesis details the research on Machine Learning techniques that are central in performing Anomaly and Masquerade attack detection. The main focus is put on Web Applications because of their immense popularity and ubiquity. This popularity has led to an increase in attacks, making them the most targeted entry point to violate a system. READ MORE