Essays about: "Intrusion detection and prevention system"
Showing result 1 - 5 of 10 essays containing the words Intrusion detection and prevention system.
-
1. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE
-
2. A Quantitative Microbial Risk Assessment Associated with Cross-Connections in the Drinking Water Network in Combination with Hydraulic Modeling
University essay from Uppsala universitet/Institutionen för geovetenskaperAbstract : Drinking water companies have the technology and responsibility to deliver safe and high-quality drinking water to the water distribution systems network (WDN). However, many events within the WDN, such as cross-connections and backflow, might degrade water quality and pose public health risks to consumers. READ MORE
-
3. Firewall and Intrusion Detection and Prevention Concept for Automotive Ethernet
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Vehicles continue to evolve with different technologies introduced into the automotive domain. The amount of data to be processed grows accordingly, resulting in the increase of the number of bugs in software. As the domain becomes more complex with millions of lines of code, new attack vectors appear. READ MORE
-
4. Security of Big Data: Focus on Data Leakage Prevention (DLP)
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Data has become an indispensable part of our daily lives in this era of information age. The amount of data which is generated is growing exponentially due to technological advances. This voluminous of data which is generated daily has brought about new term which is referred to as big data. READ MORE
-
5. Assessment of Snort Intrusion Prevention System in Virtual Environment Against DoS and DDoS Attacks : An empirical evaluation between source mode and destination mode
University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknikAbstract : Context. Cloud computing (CC) is developed as a Human-centered computing model to facilitate its users to access resources anywhere on the globe. The resources can be shared among any cloud user which mainly questions the security in cloud computing. READ MORE