Essays about: "Network Intrusion Detection System"

Showing result 11 - 15 of 58 essays containing the words Network Intrusion Detection System.

  1. 11. Network Traffic Analysis and Anomaly Detection : A Comparative Case Study

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Rona Babu; [2022]
    Keywords : Computer security; Network Traffic Analysis NTA ; Anomaly or Intrusion Detection System IDS ; SIEM; Splunk; Security Onion;

    Abstract : Computer security is to protect the data inside the computer, relay the information, expose the information, or reduce the level of security to some extent. The communication contents are the main target of any malicious intent to interrupt one or more of the three aspects of the information security triad (confidentiality, integrity, and availability). READ MORE

  2. 12. Comparison of Machine Learning Algorithms for Anomaly Detection in Train’s Real-Time Ethernet using an Intrusion Detection System

    University essay from

    Author : Trayi Chaganti; Tadi Rohith; [2022]
    Keywords : Anomaly detection; Computing methodologies; Machine learning; Real-time Ethernet; Supervised learning;

    Abstract : Background: The train communication network is vulnerable to intrusion assaultsbecause of the openness of the ethernet communication protocol. Therefore, an intru-sion detection system must be incorporated into the train communication network. READ MORE

  3. 13. A Quantitative Microbial Risk Assessment Associated with Cross-Connections in the Drinking Water Network in Combination with Hydraulic Modeling

    University essay from Uppsala universitet/Institutionen för geovetenskaper

    Author : Fatin Alzuhairi; [2022]
    Keywords : EPANET; QMRA; Water distribution network; Health risk analysis; Cross-connections and backflow; Low pressure; Water quality; Simulation; Pathogen; EPANET; QMRA; vattendistributionsnät; hälsoriskanalys; korskoppling; lågtryck; vattenkvalitet; simulering; patogen;

    Abstract : Drinking water companies have the technology and responsibility to deliver safe and high-quality drinking water to the water distribution systems network (WDN). However, many events within the WDN, such as cross-connections and backflow, might degrade water quality and pose public health risks to consumers. READ MORE

  4. 14. Endpoint Intrusion Detection and Response Agents in Embedded RAN Products : A suitability and performance evaluation

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Yousef Hashem; Elmedin Zildzic; [2022]
    Keywords : intrusion detection; wazuh; security; edr; intrusion response;

    Abstract : Endpoint detection and response is an integral part of the security of large-scale networks. Embedded hardware, such as those found at Ericsson Radio Access Network endpoints, have strict performance requirements that need to be met. READ MORE

  5. 15. BERT Language Modelling on Network Log Data for Generalized Unsupervised Intrusion Detection

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fynn van Westen; [2022]
    Keywords : BERT; Language-Modelling; Cyber-Security; Intrusion-Detection; NLP; Anomaly-Detection; One-Class-Classification; BERT; språkmodellering; cybersäkerhet; intrångsdetektering; NLP; anomalidetektering; en-klass-klassificering;

    Abstract : Intrusion detection is the most prominent topic of modern computer network security. The potential attack surface is growing exponentially every year. To cope with the amounts of data which accrue, automated methods for detecting undesired network activity are the only feasible solution. READ MORE