Essays about: "anomaly-based detection"
Showing result 1 - 5 of 13 essays containing the words anomaly-based detection.
-
1. Increasing the Trustworthiness ofAI-based In-Vehicle IDS usingeXplainable AI
University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologiAbstract : An in-vehicle intrusion detection system (IV-IDS) is one of the protection mechanisms used to detect cyber attacks on electric or autonomous vehicles where anomaly-based IDS solution have better potential at detecting the attacks especially zero-day attacks. Generally, the IV-IDS generate false alarms (falsely detecting normal data as attacks) because of the difficulty to differentiate between normal and attack data. READ MORE
-
2. Anomaly Detection in Log Files Using Machine Learning Techniques
University essay from Blekinge Tekniska Högskola/Fakulteten för datavetenskaperAbstract : Context: Log files are produced in most larger computer systems today which contain highly valuable information about the behavior of the system and thus they are consulted fairly often in order to analyze behavioral aspects of the system. Because of the very high number of log entries produced in some systems, it is however extremely difficult to seek out relevant information in these files. READ MORE
-
3. Anomaly detection for automated security log analysis : Comparison of existing techniques and tools
University essay from Linköpings universitet/Databas och informationsteknikAbstract : Logging security-related events is becoming increasingly important for companies. Log messages can be used for surveillance of a system or to make an assessment of the dam- age caused in the event of, for example, an infringement. READ MORE
-
4. What's the Deal with Stegomalware? : The Techniques, Challenges, Defence and Landscape
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Stegomalware is the art of hiding malicious software with steganography. Steganography is the technique of hiding data in a seemingly innocuous carrier. The occurrence of stegomalware is increasing, with attackers using ingenious techniques to avoid detection. READ MORE
-
5. Using Supervised Learning and Data Fusion to Detect Network Attacks
University essay from Mälardalens högskola/Akademin för innovation, design och teknikAbstract : Network attacks remain a constant threat to organizations around the globe. Intrusion detection systems provide a vital piece of the protection needed in order to fend off these attacks. Machine learning has become a popular method for developing new anomaly-based intrusion detection systems, and in recent years, deep learning has followed suit. READ MORE