Essays about: "Malicious Activity Detection"

Showing result 1 - 5 of 8 essays containing the words Malicious Activity Detection.

  1. 1. Intrusion Detection in IT Infrastructures using Hidden Markov Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Christopher Liu; Sabrina Al-Haddad; [2023]
    Keywords : ;

    Abstract : In the past decades, cloud based services have developed rapidly. And as a result, cybercrimehas increased in sophistication as well as frequency. It therefore becomes vital to have solidprotection against such attacks, especially for infrastructures containing sensitive information. READ MORE

  2. 2. Hidden Markov Models for Intrusion Detection Under Background Activity

    University essay from KTH/Matematisk statistik

    Author : Robert Siridol-Kjellberg; [2023]
    Keywords : Hidden Markov models; Cyber security; Intrusion detection; Clustering; Background subtraction; Dolda Markovmodeller; Cybersäkerhet; Dataintrång; Klustring; Bakgrundssubtraktion;

    Abstract : Detecting a malicious hacker intruding on a network system can be difficult. This challenge is made even more complex by the network activity generated by normal users and by the fact that it is impossible to know the hacker’s exact actions. READ MORE

  3. 3. Malicious Activity Detection in Encrypted Network Traffic using A Fully Homomorphic Encryption Method

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Resmi Adiyodi Madhavan; Ann Zenna Sajan; [2022]
    Keywords : Malicious Activity Detection; Cloud Computing; Network Traffic; Fully Homomorphic Encryption FHE ; Machine Learning; Random Forest RF ; Logistic Regession LR ;

    Abstract : Everyone is in need for their own privacy and data protection, since encryption transmission was becoming common. Fully Homomorphic Encryption (FHE) has received increased attention because of its capability to execute calculations over the encoded domain. Through using FHE approach, model training can be properly outsourced. READ MORE

  4. 4. Detection Of Malicious Activity in Network Traffic on a Binary Representation using Image Analysis

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Joar Hjerpe; Oliver Karlsson; [2022]
    Keywords : Binary representation; Image Analysis; Spatial-Filling Curves; IIoT; Artificial intelligence;

    Abstract : In this thesis, we explore the idea of using binary visualization and image analysis to detect anomalous activity on an Industrial Internet of Things (IIoT) based network. The data is gathered into a pcap file and then fed into our encoder, which uses a space-filling curve to convert the 1-dimensional stream of data into pixels with a specific red, blue, and green gradient value. READ MORE

  5. 5. Combining Anomaly- and Signaturebased Algorithms for IntrusionDetection in CAN-bus : A suggested approach for building precise and adaptiveintrusion detection systems to controller area networks

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Robin Andersson; [2021]
    Keywords : CAN; Controller Area Network; IDS; Intrusion detection; personal vehicles; machine learning; hybrid; proof of concept; embeded systems; software architecture; malicious; security;

    Abstract : With the digitalization and the ever more computerization of personal vehicles, new attack surfaces are introduced, challenging the security of the in-vehicle network. There is never such a thing as fully securing any computer system, nor learning all the methods of attack in order to prevent a break-in into a system. READ MORE