Essays about: "Intrångsdetekteringssystem IDS"

Found 5 essays containing the words Intrångsdetekteringssystem IDS.

  1. 1. Analyzing Radial Basis Function Neural Networks for predicting anomalies in Intrusion Detection Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sai Shyamsunder Kamat; [2019]
    Keywords : anomaly; cyber security; evaluation; machine learning; radial basis function; random forest classifier; supervised learning; anomali; cybersäkerhet; utvärdering; maskininlärning; radialbaserad funktion; slumpmässig skogsklassificering; övervakad inlärning;

    Abstract : In the 21st century, information is the new currency. With the omnipresence of devices connected to the internet, humanity can instantly avail any information. However, there are certain are cybercrime groups which steal the information. READ MORE

  2. 2. Machine Learning for a Network-based Intrusion Detection System : An application using Zeek and the CICIDS2017 dataset

    University essay from KTH/Hälsoinformatik och logistik

    Author : Vilhelm Gustavsson; [2019]
    Keywords : Machine Learning; Flow-based traffic characterization; Intrusion Detection System IDS ; Zeek; Bro; CICIDS2017; Scikit-Learn; Maskininlärning; Flödesbaserad trafik-karaktärisering; Intrångsdetekteringssystem IDS ; Zeek; Bro; CICIDS2017; Scikit-Learn;

    Abstract : Cyber security is an emerging field in the IT-sector. As more devices are connected to the internet, the attack surface for hackers is steadily increasing. Network-based Intrusion Detection Systems (NIDS) can be used to detect malicious traffic in networks and Machine Learning is an up and coming approach for improving the detection rate. READ MORE

  3. 3. Performance evaluation of security mechanisms in Cloud Networks

    University essay from KTH/Kommunikationssystem, CoS

    Author : Anand Kannan; [2012]
    Keywords : Cloud Networks; Key management; mobile agent; telco cloud; open flow; Intrusion Detection System IDS ; Genetic Algorithm GA ; Fuzzy Support Vector Machine FSVM ; tenfold cross validation;

    Abstract : Infrastructure as a Service (IaaS) is a cloud service provisioning model which largely focuses on data centre provisioning of computing and storage facilities. The networking aspects of IaaS beyond the data centre are a limiting factor preventing communication services that are sensitive to network characteristics from adopting this approach. READ MORE

  4. 4. Intrusion Detection Systems : utvärdering av Snort

    University essay from Högskolan i Skövde/Institutionen för kommunikation och information

    Author : Markus Ringström Saltin; [2009]
    Keywords : Intrångsdetekteringssystem; IDS; Snort; säkerhet; nätverk;

    Abstract : Det här examensarbetet undersöker effektiviteten hos ett Intrusion Detection System(IDS). Ett IDS är ett system som skall upptäcka om klienter på ett nätverk attackerasav en ”hacker” eller om någon obehörig försöker inkräkta, ungefär som en vakthund.Det IDS som testats är Snort, ett mycket populärt IDS skrivet med öppen källkod. READ MORE

  5. 5. Intrusion Detection Systems : Technologies, Weaknesses and Trends

    University essay from Linköpings universitet/Institutionen för systemteknik; Linköpings universitet/Institutionen för systemteknik

    Author : Martin Arvidson; Markus Carlbark; [2003]
    Keywords : Informationsteknik; computer security; IDS; intrusion detection; taxonomy; weaknesses; Informationsteknik;

    Abstract : Traditionally, firewalls and access control have been the most important components used in order to secure servers, hosts and computer networks. Today, intrusion detection systems (IDSs) are gaining attention and the usage of these systems is increasing. This thesis covers commercial IDSs and the future direction of these systems. READ MORE