Essays about: "intrusion detect system"
Showing result 1 - 5 of 39 essays containing the words intrusion detect system.
-
1. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort
University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE
-
2. Intrusion Detection in the Internet of Things : From Sniffing to a Border Router’s Point of View
University essay from Uppsala universitet/DatorteknikAbstract : The Internet of Things is expanding, and with the increasing numbers of connected devices,exploitation of those devices also becomes more common. Since IoT devices and IoT networksare used in many crucial areas in modern societies, ranging from everything between securityand militrary applications to healthcare monitoring and production efficiency, the need to securethese devices is of great importance for researchers and businesses. READ MORE
-
3. Design and Implementation of an Efficient Intrusion Response System for 5G RAN Baseband Units
University essay from Linköpings universitet/Databas och informationsteknikAbstract : The 5G Radio Access Network (RAN) is a critical system that must be secured against potential attacks, particularly its Base-Band Unit (BBU), which is a common target for intrusions. Ericsson, which is a big provider of such systems, has placed significant emphasis on implementing Intrusion Detection Systems (IDS) to detect threats. READ MORE
-
4. Hidden Markov Models for Intrusion Detection Under Background Activity
University essay from KTH/Matematisk statistikAbstract : Detecting a malicious hacker intruding on a network system can be difficult. This challenge is made even more complex by the network activity generated by normal users and by the fact that it is impossible to know the hacker’s exact actions. READ MORE
-
5. Collecting Cyber Traces : Adding Forensic Evidence In Threat Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : There is a rising concern about cyber security as both industry and individuals depend increasingly on the Internet. Threat modeling and attack simulations are the main approaches for the security analyst to examine the universal reliability of Information Technology infrastructures. READ MORE