Essays about: "Rule-Based IDS"
Found 5 essays containing the words Rule-Based IDS.
-
1. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE
-
2. Increasing the Trustworthiness ofAI-based In-Vehicle IDS usingeXplainable AI
University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologiAbstract : An in-vehicle intrusion detection system (IV-IDS) is one of the protection mechanisms used to detect cyber attacks on electric or autonomous vehicles where anomaly-based IDS solution have better potential at detecting the attacks especially zero-day attacks. Generally, the IV-IDS generate false alarms (falsely detecting normal data as attacks) because of the difficulty to differentiate between normal and attack data. READ MORE
-
3. Secure Self-Reconfiguring Services to Mitigate DoS Attacks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Protecting web services from cyber attacks is a complex problem requiring many layers of defense and mitigation strategies. Out of the diverse range of attacks, denial of service (DoS) attacks on the business logic – or the domain – are poorly studied and no widely accepted general-purpose software product to prevent these attacks exists today. READ MORE
-
4. Information-Theoretic Framework for Network Anomaly Detection: Enabling online application of statistical learning models to high-speed traffic
University essay from KTH/Matematisk statistikAbstract : With the current proliferation of cyber attacks, safeguarding internet facing assets from network intrusions, is becoming a vital task in our increasingly digitalised economies. Although recent successes of machine learning (ML) models bode the dawn of a new generation of intrusion detection systems (IDS); current solutions struggle to implement these in an efficient manner, leaving many IDSs to rely on rule-based techniques. READ MORE
-
5. Security and Performance Analysis of Topology-Based Intrusion Detection System in Ad Hoc Networks
University essay from Blekinge Tekniska Högskola/Avdelningen för telekommunikationssystemAbstract : As Wireless ad-hoc Networks are becoming an increasingly emerging technology taking a centre stage in exciting research areas which has attracted many research attentions in communication systems, the need for efficient intrusion detection techniques to enhance network security and privacy has gained significant prominence. Intrusion detection systems(IDS) in ad- hoc networks provides an effective method to improve the security, energy efficiency of transmission nodes allowing better spatial reuse of the wireless channel and control over network resources in order to optimize node security and the transmit power thereby maintaining network connectivity. READ MORE