Essays about: "Intrusion Detection System"
Showing result 21 - 25 of 91 essays containing the words Intrusion Detection System.
-
21. Endpoint Intrusion Detection and Response Agents in Embedded RAN Products : A suitability and performance evaluation
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Endpoint detection and response is an integral part of the security of large-scale networks. Embedded hardware, such as those found at Ericsson Radio Access Network endpoints, have strict performance requirements that need to be met. READ MORE
-
22. BERT Language Modelling on Network Log Data for Generalized Unsupervised Intrusion Detection
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Intrusion detection is the most prominent topic of modern computer network security. The potential attack surface is growing exponentially every year. To cope with the amounts of data which accrue, automated methods for detecting undesired network activity are the only feasible solution. READ MORE
-
23. Intrusion Detection For The Controller Pilot Data Link Communication : Detecting CPDLC attacks using machine learning
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Controller Pilot Data Link Communications (CPDLC) is a system for text-based communication between air traffic control and flight crew. It currently lacks protection against many common types of attacks, making the system vulnerable to attackers. This can have severe consequences for the safety and reliability of air travel. READ MORE
-
24. Blackhole Attack Detection in Low-Power IoT Mesh Networks Using Machine Learning Algorithms
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Low-Power Lossy Networks (LLNs) are a type of Internet of Things (IoT) meshnetwork that collaboratively interact and perform various tasks autonomously. TheRouting Protocol for Low-power and Lossy Network (RPL) is the most used rout-ing protocol for LLNs. READ MORE
-
25. Masquerader Detection via 2fa Honeytokens
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. READ MORE