Essays about: "IDS"

Showing result 1 - 5 of 66 essays containing the word IDS.


    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Roland Plaka; [2021]
    Keywords : intrusion detection; machine learning; security;

    Abstract : An intrusion detection system (IDS) is a software application that monitors a network forunauthorized and malicious activities or security policy violations related to confidentiality,integrity, and availability of a system. In this thesis, we performed detailed literature reviewson the different types of IDS, anomaly detection methods, and machine learning algorithmsthat can be used for detection and classification. READ MORE

  2. 2. A Performance Analysis of Intrusion Detection with Snort and Security Information Management

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Christian Thorarensen; [2021]
    Keywords : Snort; Snort 3; PulledPork; IDS; Open Distro for Elasticsearch; ODFE; SIM; SIEM; ET Open; D-ITG;

    Abstract : Network intrusion detection systems (NIDSs) are a major component in cybersecurity and can be implemented with open-source software. Active communities and researchers continue to improve projects and rulesets used for detecting threats to keep up with the rapid development of the internet. READ MORE

  3. 3. Detection of aberrant events in RNA for clinical diagnostics

    University essay from Uppsala universitet/Institutionen för biologisk grundutbildning

    Author : Mei Wu; [2021]
    Keywords : rare; disease; clinical; bioinformatics; pipeline; analysis; variants; IDS; OPA3; wgs; transcriptome; rna; diagnosis;

    Abstract : Rare diseases are estimated to affect 3.75% of the global population, which roughly translates to 300 million affected individuals. READ MORE

  4. 4. Research of methods and algorithms of insider detection in a computer network using machine learning technologies

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Dmitrii Pelevin; [2021]
    Keywords : IPS; IDS; UBA; NoSQL; Information Security;

    Abstract : Background. Security Information and Event Management (SIEM) systems today are sophisticated sets of software packages combined with hardware platforms, which can perform real-time analysis on security events and can respond to them before potential damage due to the actions of intruders. READ MORE

  5. 5. Living off the Land Binaries with Virtual Machines

    University essay from Högskolan i Halmstad

    Author : Jakob Lingaas Türk; [2021]
    Keywords : LOLbin; Living off the land; virtual machine escape; fileless malware;

    Abstract : As the threat of ransomware increases, the ever-growing demand for more efficient cybersecurityimplementations invite cybercriminals to find new methods of bypassing these counter measures.One method for bypassing potential antivirus software is to use the binaries already present on thevictim device, causing them damage by using trusted binaries which does not trigger windowsdefender (or similar antivirus measures). READ MORE