Advanced search

Showing result 1 - 5 of 18 essays matching the above criteria.

  1. 1. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yashwanth Venkata Sai Kumar Adabala; Lakshmi Venkata Raghava Sudheer Devanaboina; [2024]
    Keywords : Software Defined Networking; SDN; IP Spoofing; Flooding; DDoS Attacks; Mininet; Snort IDS; Network Security;

    Abstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE

  2. 2. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Peter Stegeby; [2023]
    Keywords : Intrusion detection; HIDS; NIDS; Signature-based; Linux; Windows; Sniffing packets; Upptäcka intrång; HIDS; NIDS; Signatur-baserad; Linux; Windows; Paketsniffing.;

    Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE

  3. 3. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Venkata Sai Bala Ratan Murali Puvvada; Hemanth Kandala; [2023]
    Keywords : Intrusion Detection Systems; Slow HTTP DoS Attacks; Snort; Suricata; Rule sets.;

    Abstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE

  4. 4. Evaluating the effectiveness of free rule sets for Snort

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Niklas Granberg; [2022]
    Keywords : Snort; rule sets; Snort rule sets; information security; network security;

    Abstract : As more of the modern world is connected to the Internet, threats can reach further than ever before. Attacks happen all the time and many have serious consequences that disrupts the daily processes of people and companies, possibly causing lasting damage. To fight back, defensive tools are used to find and counter attacks. READ MORE

  5. 5. Methods for network intrusion detection : Evaluating rule-based methods and machine learning models on the CIC-IDS2017 dataset

    University essay from Uppsala universitet/Institutionen för informatik och media

    Author : Henrik Lindstedt; [2022]
    Keywords : MLP; random forest; CIC-IDS2017; Snort; Intrusion Detection System;

    Abstract : Network intrusion detection is a task aimed to identify malicious network traffic. Malicious networktraffic is generated when a perpetrator attacks a network or internet-connected device with the intent todisrupt, steal or destroy a service or information. READ MORE