Essays about: "anomaly-based detection"

Showing result 6 - 10 of 13 essays containing the words anomaly-based detection.

  1. 6. Anomaly-based Intrusion Detection Using Convolutional Neural Networks for IoT Devices

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Albin Söderström; [2021]
    Keywords : Internet of Things; Deep learning; Intrusion detection;

    Abstract : Background. The rapid growth of IoT devices in homes put people at risk of cyberattacks and the low power and computing capabilities in IoT devices make it difficultto design a security solution for them. READ MORE

  2. 7. Anomaly-based intrusion detection using Tree Augmented Naive Bayes Classifier

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Philip Wester; [2021]
    Keywords : Intrusion detection; Anomaly detection; Tree Augmented Naive Bayes; Machine learning; Network based intrusion detection.; Intrångsdetektion; Avvikelsedetektion; Tree Augmented Naive Bayes; Maskininlärning; Nätverksbaserad intrångsdetektion;

    Abstract : With the rise of information technology and the dependence on these systems, it becomes increasingly more important to keep the systems secure. The possibility to detect an intrusion with intrusion detection systems (IDS) is one of multiple fundamental technologies that may increase the security of a system. READ MORE

  3. 8. A Concept for an Intrusion Detection System over Automotive Ethernet

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Hanna Lindwall; Pontus Ovhagen; [2020]
    Keywords : Intrusion Detection System; Deep Packet Inspection; Specification-based Detection; Anomaly-based Detection; V2G; Automotive Ethernet.; Technology and Engineering;

    Abstract : A modern automotive vehicle is a complex technical system, containing many electronic, mechanical, and software parts. Typically, a high-end vehicle contains 70 or more electronic control units (ECUs) on average. READ MORE

  4. 9. Reactive security of IoT communications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Younes Laaboudi; [2019]
    Keywords : ;

    Abstract : IoT networks’ intrinsic vulnerabilities can be protected through intru- sion detection and response systems (IDRS). Anomaly-based intrusion detection offers multiple advantages: it can detect unknown attacks and it can adapt to multiple types of protocols. READ MORE

  5. 10. Deception strategies for web application security: application-layer approaches and a testing platform

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Mikel Izagirre; [2017]
    Keywords : deception; computer deception; cyberdeception; intrusion detection; intrusion deception; security; cybersecurity; web; web applications; HTTP; penetration testing; security testing; honeypots; honeytokens; decoy; active defense; attacks; web vulnerability scanners; OWASP ZAP; BodgeIt; WAVSEP;

    Abstract : The popularity of the internet has made the use of web applications ubiquitous and essential to the daily lives of people, businesses and governments. Web servers and web applications are commonly used to handle tasks and data that can be critical and highly valuable, making them a very attractive target for attackers and a vector for successful attacks that are aimed at the application layer. READ MORE