Essays about: "Threat Detection"

Showing result 1 - 5 of 106 essays containing the words Threat Detection.

  1. 1. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yashwanth Venkata Sai Kumar Adabala; Lakshmi Venkata Raghava Sudheer Devanaboina; [2024]
    Keywords : Software Defined Networking; SDN; IP Spoofing; Flooding; DDoS Attacks; Mininet; Snort IDS; Network Security;

    Abstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE

  2. 2. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Josephine Spångberg; Vainius Mikelinskas; [2023]
    Keywords : Cyber threats; Malware; Cyber attacks; Signature Based Detection; Anomaly Detection; Cyber defense; Sophisticated attacks; Modern cyberattacks; malware detection in wireless network; IoT;

    Abstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE

  3. 3. Comparing machine learning algorithms for detecting behavioural anomalies

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Fredrik Jansson; [2023]
    Keywords : Anomaly Detection; Machine Learning; Behavioural Anomalies;

    Abstract : Background. Attempted intrusions at companies, either from an insider threat orotherwise, is increasing in frequency. Most commonly used is static analysis and filters to stop specific attacks. READ MORE

  4. 4. Active learning for text classification in cyber security

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Amanda Carp; [2023]
    Keywords : Interactive machine learning; Active learning; Cost-effective active learning; Cyber environment; Interaktiv maskininlärning; Aktiv inlärning; Kostnadseffektiv aktiv inlärning; Cyberdomänen;

    Abstract : In the domain of cyber security, machine learning promises advanced threat detection. However, the volume of available unlabeled data poses challenges for efficient data management. This study investigates the potential for active learning, a subset of interactive machine learning, to reduce the effort required for manual data labelling. READ MORE

  5. 5. Solutions for presence detection in an intercom door station

    University essay from Lunds universitet/Industriell elektroteknik och automation

    Author : Anton Bengtsson; Måns Andreasson; [2023]
    Keywords : presence detection; sensor technology; PIR; ultrasonic; radar; intercom; Technology and Engineering;

    Abstract : In this work, different solutions for human presence detection in a door intercom device are examined. The study was conducted at a company in Lund, Sweden. READ MORE