Essays about: "IDS"

Showing result 16 - 20 of 95 essays containing the word IDS.

  1. 16. Implementing and evaluating variations of the Blackhole attack on RPL

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Adam Pettersson; [2022]
    Keywords : ;

    Abstract : The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) is the most used routing protocol for resource constrained Internet-of-Things (IoT) networks. With the massive increase in number of Internet-connected IoT devices and the fact that they are becoming more common in safety-critical environments such as in health-care and in the industry, security in these networks are of a big concern. READ MORE

  2. 17. Anomalous Behavior Detection in Aircraft based Automatic Dependent Surveillance–Broadcast (ADS-B) system using Deep Graph Convolution and Generative model (GA-GAN)

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Jayesh Kenaudekar; [2022]
    Keywords : Intrusion detection aircraft aviation security adsb protocol AI deep learning machine learning graph generative model surveillance broadcast;

    Abstract : The Automatic Dependent Surveillance-Broadcast (ADS-B) is a key component of the Next Generation Air Transportation System (Next Gen) that manages the increasingly congested airspace and operation. From Jan 2020, the U.S. Federal Aviation Administration (FAA) mandated the use of (ADS-B) as a key component of Next Gen project. READ MORE

  3. 18. Smart Attack Detection for IoT Networks

    University essay from KTH/Kommunikationssystem, CoS

    Author : Yang Yang; [2022]
    Keywords : Internet of Things; Security; Machine learning; Intrusion detection; Sakernas Internet; Säkerhet; Maskininlärning; Intrångsdetektering;

    Abstract : The Internet of Things (IoT) is becoming related to more and more people's daily life. It is a network that consists of resource-constrained devices. Nowadays, the application of IoT like smart wearable devices is very common. Due to the wide and important application of IoT, its security also attracts research attention without any doubt. READ MORE

  4. 19. Increasing the Trustworthiness ofAI-based In-Vehicle IDS usingeXplainable AI

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Hampus Lundberg; [2022]
    Keywords : Intrusion Detection System; In-Vehicle Intrusion Detection System; Machine Learning; Deep Learning; Explainable Artificial Intelligence; Trustworthiness.;

    Abstract : An in-vehicle intrusion detection system (IV-IDS) is one of the protection mechanisms used to detect cyber attacks on electric or autonomous vehicles where anomaly-based IDS solution have better potential at detecting the attacks especially zero-day attacks. Generally, the IV-IDS generate false alarms (falsely detecting normal data as attacks) because of the difficulty to differentiate between normal and attack data. READ MORE

  5. 20. Network Traffic Analysis and Anomaly Detection : A Comparative Case Study

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Rona Babu; [2022]
    Keywords : Computer security; Network Traffic Analysis NTA ; Anomaly or Intrusion Detection System IDS ; SIEM; Splunk; Security Onion;

    Abstract : Computer security is to protect the data inside the computer, relay the information, expose the information, or reduce the level of security to some extent. The communication contents are the main target of any malicious intent to interrupt one or more of the three aspects of the information security triad (confidentiality, integrity, and availability). READ MORE