Essays about: "Intrusion detection system in"

Showing result 6 - 10 of 85 essays containing the words Intrusion detection system in.

  1. 6. Design and Implementation of an Efficient Intrusion Response System for 5G RAN Baseband Units

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Mirna Ghazzawi; Adil Imran; [2023]
    Keywords : Intrusion Response System; Security; OSSEC; Radio Access Network; Baseband Units;

    Abstract : The 5G Radio Access Network (RAN) is a critical system that must be secured against potential attacks, particularly its Base-Band Unit (BBU), which is a common target for intrusions. Ericsson, which is a big provider of such systems, has placed significant emphasis on implementing Intrusion Detection Systems (IDS) to detect threats. READ MORE

  2. 7. Differentially Private Random Forests for Network Intrusion Detection in a Federated Learning Setting

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Alexander Frid; [2023]
    Keywords : Machine Learning; Random Forest; Federated Learning; Differential Privacy; Maskininlärning; Random Forest; Federated Learning; Differential Privacy;

    Abstract : För varje dag som går möter stora industrier en ökad mängd intrång i sina IT-system. De flesta befintliga verktyg som använder sig utav maskininlärning är starkt beroende av stora mängder data, vilket innebär risker under dataöverföringen. READ MORE

  3. 8. Anomalous Behavior Detection in Aircraft based Automatic Dependent Surveillance–Broadcast (ADS-B) system using Deep Graph Convolution and Generative model (GA-GAN)

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Jayesh Kenaudekar; [2022]
    Keywords : Intrusion detection aircraft aviation security adsb protocol AI deep learning machine learning graph generative model surveillance broadcast;

    Abstract : The Automatic Dependent Surveillance-Broadcast (ADS-B) is a key component of the Next Generation Air Transportation System (Next Gen) that manages the increasingly congested airspace and operation. From Jan 2020, the U.S. Federal Aviation Administration (FAA) mandated the use of (ADS-B) as a key component of Next Gen project. READ MORE

  4. 9. Howthe difficulty of obtaining intrusion artifacts can influence threat modeling : An experiment that shows how IT forensics can be used preventingly

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oscar Meyer; [2022]
    Keywords : Threat modeling; IT Forensics; Linux; IT Defense; Risk assessment; Opensource; Volatility; Hotmodellering; IT Forensik; Linux; IT Försvar; Risk-bedömning; Opensource; Volatility;

    Abstract : IT system intrusions are a problem today and the belief that all you need is a strong outer defense has faded. Today continuous monitoring of the IT infrastructure is widespread and alerts are continuously investigated. READ MORE

  5. 10. Smart Attack Detection for IoT Networks

    University essay from KTH/Kommunikationssystem, CoS

    Author : Yang Yang; [2022]
    Keywords : Internet of Things; Security; Machine learning; Intrusion detection; Sakernas Internet; Säkerhet; Maskininlärning; Intrångsdetektering;

    Abstract : The Internet of Things (IoT) is becoming related to more and more people's daily life. It is a network that consists of resource-constrained devices. Nowadays, the application of IoT like smart wearable devices is very common. Due to the wide and important application of IoT, its security also attracts research attention without any doubt. READ MORE