Essays about: "Intrusion Detection System"

Showing result 21 - 25 of 91 essays containing the words Intrusion Detection System.

  1. 21. Endpoint Intrusion Detection and Response Agents in Embedded RAN Products : A suitability and performance evaluation

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Yousef Hashem; Elmedin Zildzic; [2022]
    Keywords : intrusion detection; wazuh; security; edr; intrusion response;

    Abstract : Endpoint detection and response is an integral part of the security of large-scale networks. Embedded hardware, such as those found at Ericsson Radio Access Network endpoints, have strict performance requirements that need to be met. READ MORE

  2. 22. BERT Language Modelling on Network Log Data for Generalized Unsupervised Intrusion Detection

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fynn van Westen; [2022]
    Keywords : BERT; Language-Modelling; Cyber-Security; Intrusion-Detection; NLP; Anomaly-Detection; One-Class-Classification; BERT; språkmodellering; cybersäkerhet; intrångsdetektering; NLP; anomalidetektering; en-klass-klassificering;

    Abstract : Intrusion detection is the most prominent topic of modern computer network security. The potential attack surface is growing exponentially every year. To cope with the amounts of data which accrue, automated methods for detecting undesired network activity are the only feasible solution. READ MORE

  3. 23. Intrusion Detection For The Controller Pilot Data Link Communication : Detecting CPDLC attacks using machine learning

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Adam Westergren; Alexander Skoglund; [2022]
    Keywords : CPDLC; Air Communication; Security; Alteration Attacks; Machine Learning;

    Abstract : Controller Pilot Data Link Communications (CPDLC) is a system for text-based communication between air traffic control and flight crew. It currently lacks protection against many common types of attacks, making the system vulnerable to attackers. This can have severe consequences for the safety and reliability of air travel. READ MORE

  4. 24. Blackhole Attack Detection in Low-Power IoT Mesh Networks Using Machine Learning Algorithms

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Hossein Keipour; [2022]
    Keywords : IoT; 6LoWPAN; RPL; Intrusion Detection System; Machine Learning;

    Abstract : Low-Power Lossy Networks (LLNs) are a type of Internet of Things (IoT) meshnetwork that collaboratively interact and perform various tasks autonomously. TheRouting Protocol for Low-power and Lossy Network (RPL) is the most used rout-ing protocol for LLNs. READ MORE

  5. 25. Masquerader Detection via 2fa Honeytokens

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Anton Wiklund; [2021]
    Keywords : Cyber security deception; two-factor authentication 2fa ; honeytoken; misinformation; intrusion detection;

    Abstract : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. READ MORE