Essays about: "intrusion detection."

Showing result 11 - 15 of 126 essays containing the words intrusion detection..

  1. 11. Differentially Private Random Forests for Network Intrusion Detection in a Federated Learning Setting

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Alexander Frid; [2023]
    Keywords : Machine Learning; Random Forest; Federated Learning; Differential Privacy; Maskininlärning; Random Forest; Federated Learning; Differential Privacy;

    Abstract : För varje dag som går möter stora industrier en ökad mängd intrång i sina IT-system. De flesta befintliga verktyg som använder sig utav maskininlärning är starkt beroende av stora mängder data, vilket innebär risker under dataöverföringen. READ MORE

  2. 12. Edge Computing Security for IoT : A Systematic Literature Review

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Albin Johnsson; Adam Nordling; [2023]
    Keywords : ;

    Abstract : This study conducts a systematic literature review (SLR) to explore the security threats, their mitigation strategies, and the roles of blockchain and 5G technologies in enhancing the security of IoT devices in edge computing environments. Utilizing digital libraries as resources, the review examines three research questions that delve into the common security threats for IoT devices in edge computing, the unique security issues for sensors, gateways, and actuators, and the advantages of integrating blockchain and 5G technologies into edge computing security for IoT systems. READ MORE

  3. 13. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Venkata Sai Bala Ratan Murali Puvvada; Hemanth Kandala; [2023]
    Keywords : Intrusion Detection Systems; Slow HTTP DoS Attacks; Snort; Suricata; Rule sets.;

    Abstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE

  4. 14. Machines Do Not Have Little Gray Cells: : Analysing Catastrophic Forgetting in Cross-Domain Intrusion Detection Systems

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Ramin Valieh; Farid Esmaeili Kia; [2023]
    Keywords : Catastrophic Forgetting; Intrusion Detection Systems; Continual Learning;

    Abstract : Cross-domain intrusion detection, a critical component of cybersecurity, involves evaluating the performance of neural networks across diverse datasets or databases. The ability of intrusion detection systems to effectively adapt to new threats and data sources is paramount for safeguarding networks and sensitive information. READ MORE

  5. 15. Implementing and evaluating variations of the Blackhole attack on RPL

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Adam Pettersson; [2022]
    Keywords : ;

    Abstract : The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) is the most used routing protocol for resource constrained Internet-of-Things (IoT) networks. With the massive increase in number of Internet-connected IoT devices and the fact that they are becoming more common in safety-critical environments such as in health-care and in the industry, security in these networks are of a big concern. READ MORE