Essays about: "IDS features"

Showing result 1 - 5 of 12 essays containing the words IDS features.

  1. 1. Anomalous Behavior Detection in Aircraft based Automatic Dependent Surveillance–Broadcast (ADS-B) system using Deep Graph Convolution and Generative model (GA-GAN)

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Jayesh Kenaudekar; [2022]
    Keywords : Intrusion detection aircraft aviation security adsb protocol AI deep learning machine learning graph generative model surveillance broadcast;

    Abstract : The Automatic Dependent Surveillance-Broadcast (ADS-B) is a key component of the Next Generation Air Transportation System (Next Gen) that manages the increasingly congested airspace and operation. From Jan 2020, the U.S. Federal Aviation Administration (FAA) mandated the use of (ADS-B) as a key component of Next Gen project. READ MORE

  2. 2. Comparison of Machine Learning Algorithms for Anomaly Detection in Train’s Real-Time Ethernet using an Intrusion Detection System

    University essay from

    Author : Trayi Chaganti; Tadi Rohith; [2022]
    Keywords : Anomaly detection; Computing methodologies; Machine learning; Real-time Ethernet; Supervised learning;

    Abstract : Background: The train communication network is vulnerable to intrusion assaultsbecause of the openness of the ethernet communication protocol. Therefore, an intru-sion detection system must be incorporated into the train communication network. READ MORE

  3. 3. Hacking commercial IP cameras : Home Surveillance

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hristo Georgiev; Azad Mustafa; [2021]
    Keywords : Ethical Hacking; Penetration Testing; IP cameras; IoT; Home Surveillance; Etisk Hackning; Penetrationstestning; IP kameror; IoT; Hemövervakning.;

    Abstract : IP cameras have been around for a while and have been a growing part of the IoT scene. There is a variety of IP cameras being used in enterprises and homes with the main reason being for surveillance. This naturally attracts attackers to potentially take control of the camera feeds and or disable them completely. READ MORE

  4. 4. Machine Learning for a Network-based Intrusion Detection System : An application using Zeek and the CICIDS2017 dataset

    University essay from KTH/Hälsoinformatik och logistik

    Author : Vilhelm Gustavsson; [2019]
    Keywords : Machine Learning; Flow-based traffic characterization; Intrusion Detection System IDS ; Zeek; Bro; CICIDS2017; Scikit-Learn; Maskininlärning; Flödesbaserad trafik-karaktärisering; Intrångsdetekteringssystem IDS ; Zeek; Bro; CICIDS2017; Scikit-Learn;

    Abstract : Cyber security is an emerging field in the IT-sector. As more devices are connected to the internet, the attack surface for hackers is steadily increasing. Network-based Intrusion Detection Systems (NIDS) can be used to detect malicious traffic in networks and Machine Learning is an up and coming approach for improving the detection rate. READ MORE

  5. 5. Improving the precision of an Intrusion Detection System using Indicators of Compromise : - a proof of concept -

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Gisela Lejonqvist; Oskar Larsson; [2018]
    Keywords : Intrusion Detection System; Indicator Of Compromise; False Positives; Snort;

    Abstract : The goal of this research is to improve an IDS so that the percentage of true positives is high, an organisation can cut time and cost and use its resources in a more optimal way. This research goal was to prove that the precision of an intrusion detection system (IDS), in terms of producing lower rate of false positives or higher rate of true alerts, can be achieved by parsing indicators of compromise (IOC) to gather information, that combined with system-specific knowledge will be a solid base for manual fine-tuning of IDS-rules. READ MORE