Essays about: "databas"

Showing result 1 - 5 of 354 essays containing the word databas.

  1. 1. Evaluating the effectiveness of free rule sets for Snort

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Niklas Granberg; [2022]
    Keywords : Snort; rule sets; Snort rule sets; information security; network security;

    Abstract : As more of the modern world is connected to the Internet, threats can reach further than ever before. Attacks happen all the time and many have serious consequences that disrupts the daily processes of people and companies, possibly causing lasting damage. To fight back, defensive tools are used to find and counter attacks. READ MORE

  2. 2. Cooperative security log analysis using machine learning : Analyzing different approaches to log featurization and classification

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Fredrik Malmfors; [2022]
    Keywords : Machine learning; word embeddings; deep learning; LSTM; CNN; auto encoder; NLP; natural language processing; intrusion detection; log analysis; logs; log classification; anomaly detection; supervised learning; unsupervised learning;

    Abstract : This thesis evaluates the performance of different machine learning approaches to log classification based on a dataset derived from simulating intrusive behavior towards an enterprise web application. The first experiment consists of performing attacks towards the web app in correlation with the logs to create a labeled dataset. READ MORE

  3. 3. Comparison of adversary emulation tools for reproducing behavior in cyber attacks

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Joakim Elgh; [2022]
    Keywords : Adversary emulation; Adversary emulation tools; Behavior; Event logs; APT; Advanced Persistent Threat;

    Abstract : As cyber criminals can find many different ways of gaining unauthorized access to systems without being detected, it is of high importance for organizations to monitor what is happening inside their systems. Adversary emulation is a way to mimic behavior of advanced adversaries within cyber security, which can be used to test detection capabilities of malicious behavior within a system of an organization. READ MORE

  4. 4. Buildings LCA methodology, focus on the climate impact of maintenance and replacement processes

    University essay from KTH/Hållbar utveckling, miljövetenskap och teknik

    Author : Zoé Louise Barjot; [2022]
    Keywords : Buildings; life cycle assessment; maintenance; replacement; methodological choices; Swedish conditions; Byggnader; livscykelanalys; underhåll; utbyte; metodval; svenska förhållanden;

    Abstract : The Swedish government introduced on Monday 3rd of January 2022, a new bill to promote buildings’ sustainability. Assigned by the government, the bill was developed by the Swedish National Board of Housing, Building and Planning (Boverket). READ MORE

  5. 5. Feasibility study on Thermal Anemometry at LWR conditions

    University essay from KTH/Fysik

    Author : Abishek Baskar; [2021]
    Keywords : Nuclear Enginnering; Thermal-Hydraulics; Instrumentation; Material technology; Fluid Dynamics. Light water reactors;

    Abstract : Dryout and Departure from Nucleate boiling (DNB) are utmost thermal-hydraulic concerns for the safety of LWRs. The behavior of two-phase flows at these conditions is still not fully understood. There is at least a need for a good local velocity and void fraction database at these conditions. READ MORE