Essays about: "Intrusion detection and prevention system"

Showing result 1 - 5 of 10 essays containing the words Intrusion detection and prevention system.

  1. 1. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yashwanth Venkata Sai Kumar Adabala; Lakshmi Venkata Raghava Sudheer Devanaboina; [2024]
    Keywords : Software Defined Networking; SDN; IP Spoofing; Flooding; DDoS Attacks; Mininet; Snort IDS; Network Security;

    Abstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE

  2. 2. A Quantitative Microbial Risk Assessment Associated with Cross-Connections in the Drinking Water Network in Combination with Hydraulic Modeling

    University essay from Uppsala universitet/Institutionen för geovetenskaper

    Author : Fatin Alzuhairi; [2022]
    Keywords : EPANET; QMRA; Water distribution network; Health risk analysis; Cross-connections and backflow; Low pressure; Water quality; Simulation; Pathogen; EPANET; QMRA; vattendistributionsnät; hälsoriskanalys; korskoppling; lågtryck; vattenkvalitet; simulering; patogen;

    Abstract : Drinking water companies have the technology and responsibility to deliver safe and high-quality drinking water to the water distribution systems network (WDN). However, many events within the WDN, such as cross-connections and backflow, might degrade water quality and pose public health risks to consumers. READ MORE

  3. 3. Firewall and Intrusion Detection and Prevention Concept for Automotive Ethernet

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Eren Yilmaz; [2020]
    Keywords : ;

    Abstract : Vehicles continue to evolve with different technologies introduced into the automotive domain. The amount of data to be processed grows accordingly, resulting in the increase of the number of bugs in software. As the domain becomes more complex with millions of lines of code, new attack vectors appear. READ MORE

  4. 4. Security of Big Data: Focus on Data Leakage Prevention (DLP)

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Richard Nyarko; [2018]
    Keywords : Big data; big data security; data leakage prevention; data leakage prevention system;

    Abstract : Data has become an indispensable part of our daily lives in this era of information age. The amount of data which is generated is growing exponentially due to technological advances. This voluminous of data which is generated daily has brought about new term which is referred to as big data. READ MORE

  5. 5. Assessment of Snort Intrusion Prevention System in Virtual Environment Against DoS and DDoS Attacks : An empirical evaluation between source mode and destination mode

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Avinash Kiran Ivvala; [2017]
    Keywords : Intrusion Prevention Systems; cloud computing; snort; source mode; destination mode.;

    Abstract : Context. Cloud computing (CC) is developed as a Human-centered computing model to facilitate its users to access resources anywhere on the globe. The resources can be shared among any cloud user which mainly questions the security in cloud computing. READ MORE