Essays about: "Intrusion Detection Prevention"
Showing result 1 - 5 of 12 essays containing the words Intrusion Detection Prevention.
-
1. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE
-
2. Detection of Vulnerability Scanning Attacks using Machine Learning : Application Layer Intrusion Detection and Prevention by Combining Machine Learning and AppSensor Concepts
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : It is well-established that machine learning techniques have been used with great success in other domains and has been leveraged to deal with sources of evolving abuse, such as spam. This study aims to determine whether machine learning techniques can be used to create a model that detects vulnerability scanning attacks using proprietary real-world data collected from tCell, a web application firewall. READ MORE
-
3. A Quantitative Microbial Risk Assessment Associated with Cross-Connections in the Drinking Water Network in Combination with Hydraulic Modeling
University essay from Uppsala universitet/Institutionen för geovetenskaperAbstract : Drinking water companies have the technology and responsibility to deliver safe and high-quality drinking water to the water distribution systems network (WDN). However, many events within the WDN, such as cross-connections and backflow, might degrade water quality and pose public health risks to consumers. READ MORE
-
4. Firewall and Intrusion Detection and Prevention Concept for Automotive Ethernet
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Vehicles continue to evolve with different technologies introduced into the automotive domain. The amount of data to be processed grows accordingly, resulting in the increase of the number of bugs in software. As the domain becomes more complex with millions of lines of code, new attack vectors appear. READ MORE
-
5. Smart Home Security Using Intrusion Detection and Prevention Systems
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : As the connectivity of home devices elevates so does the volume and sophistication of cyber attacks consistently grow. Therefore, the need for network security and availability becomes more significant. READ MORE