Essays about: "anomaly-based detection"
Showing result 6 - 10 of 13 essays containing the words anomaly-based detection.
-
6. Anomaly-based Intrusion Detection Using Convolutional Neural Networks for IoT Devices
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. The rapid growth of IoT devices in homes put people at risk of cyberattacks and the low power and computing capabilities in IoT devices make it difficultto design a security solution for them. READ MORE
-
7. Anomaly-based intrusion detection using Tree Augmented Naive Bayes Classifier
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rise of information technology and the dependence on these systems, it becomes increasingly more important to keep the systems secure. The possibility to detect an intrusion with intrusion detection systems (IDS) is one of multiple fundamental technologies that may increase the security of a system. READ MORE
-
8. A Concept for an Intrusion Detection System over Automotive Ethernet
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : A modern automotive vehicle is a complex technical system, containing many electronic, mechanical, and software parts. Typically, a high-end vehicle contains 70 or more electronic control units (ECUs) on average. READ MORE
-
9. Reactive security of IoT communications
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : IoT networks’ intrinsic vulnerabilities can be protected through intru- sion detection and response systems (IDRS). Anomaly-based intrusion detection offers multiple advantages: it can detect unknown attacks and it can adapt to multiple types of protocols. READ MORE
-
10. Deception strategies for web application security: application-layer approaches and a testing platform
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : The popularity of the internet has made the use of web applications ubiquitous and essential to the daily lives of people, businesses and governments. Web servers and web applications are commonly used to handle tasks and data that can be critical and highly valuable, making them a very attractive target for attackers and a vector for successful attacks that are aimed at the application layer. READ MORE