Essays about: "IDS in computer network"
Showing result 1 - 5 of 9 essays containing the words IDS in computer network.
-
1. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort
University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE
-
2. Network Traffic Analysis and Anomaly Detection : A Comparative Case Study
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Computer security is to protect the data inside the computer, relay the information, expose the information, or reduce the level of security to some extent. The communication contents are the main target of any malicious intent to interrupt one or more of the three aspects of the information security triad (confidentiality, integrity, and availability). READ MORE
-
3. Research of methods and algorithms of insider detection in a computer network using machine learning technologies
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Security Information and Event Management (SIEM) systems today are sophisticated sets of software packages combined with hardware platforms, which can perform real-time analysis on security events and can respond to them before potential damage due to the actions of intruders. READ MORE
-
4. Combining Anomaly- and Signaturebased Algorithms for IntrusionDetection in CAN-bus : A suggested approach for building precise and adaptiveintrusion detection systems to controller area networks
University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)Abstract : With the digitalization and the ever more computerization of personal vehicles, new attack surfaces are introduced, challenging the security of the in-vehicle network. There is never such a thing as fully securing any computer system, nor learning all the methods of attack in order to prevent a break-in into a system. READ MORE
-
5. A study of Centralized Network Intrusion Detection System using low end single board computers
University essay from Högskolan Dalarna/DatateknikAbstract : The use of Intrusion Detection Systems is a normal thing today in bigger companies, butthe solutions that are to be found in market is often too expensive for the smallercompany. Therefore, we saw the need in investigating if there is a more affordablesolution. READ MORE