Essays about: "Host-based Intrusion Detection System"
Showing result 1 - 5 of 7 essays containing the words Host-based Intrusion Detection System.
-
1. Evaluating the efficiency of Host-based Intrusion Detection Systems protecting web applications
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Web applications are a more significant part of our digital experience, and the number of users keeps continuously growing. Social media alone accounts for more than half of the world’s population. Therefore these applications have become a lucrative target for attackers, and we have seen several attacks against them. READ MORE
-
2. A Concept for an Intrusion Detection System over Automotive Ethernet
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : A modern automotive vehicle is a complex technical system, containing many electronic, mechanical, and software parts. Typically, a high-end vehicle contains 70 or more electronic control units (ECUs) on average. READ MORE
-
3. Investigation of Solutions for Intrusion Prevention and Detection
University essay from Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)Abstract : Intrusion prevention and detection system is an effective network security solution from past few years. With this huge interconnected network called internet, nobody can deny the importance of IPS and IDS in a network. Both technologies provide a method of securing computer network from intrusion attacks. READ MORE
-
4. Automatic behavioural analysis of malware
University essay from Institutionen för datavetenskapAbstract : With malware becoming more and more diused and at the same time more sophisticatedin its attack techniques, countermeasures need to be set up so that new kinds ofthreats can be identied and dismantled in the shortest possible time, before they causeharm to the system under attack. With new behaviour patterns like the one shown bypolymorphic and metamorphic viruses, static analysis is not any more a reliable wayto detect those threats, and behaviour analysis seems a good candidate to ght againstthe next-generation families of viruses. READ MORE
-
5. Anomaly based Detection of Attacks on Security Protocols
University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikationAbstract : Abstract. Security and privacy in digital communications is the need of the hour. SSL/TLS has become widely adopted to provide the same. Multiple application layer protocols can be layered on top of it. READ MORE