Essays about: "intrusion detection."
Showing result 21 - 25 of 126 essays containing the words intrusion detection..
-
21. Methods for network intrusion detection : Evaluating rule-based methods and machine learning models on the CIC-IDS2017 dataset
University essay from Uppsala universitet/Institutionen för informatik och mediaAbstract : Network intrusion detection is a task aimed to identify malicious network traffic. Malicious networktraffic is generated when a perpetrator attacks a network or internet-connected device with the intent todisrupt, steal or destroy a service or information. READ MORE
-
22. The Resilience of Deep Learning Intrusion Detection Systems for Automotive Networks : The effect of adversarial samples and transferability on Deep Learning Intrusion Detection Systems for Controller Area Networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis will cover the topic of cyber security in vehicles. Current vehicles contain many computers which communicate over a controller area network. This network has many vulnerabilities which can be leveraged by attackers. To combat these attackers, intrusion detection systems have been implemented. READ MORE
-
23. Airports Runway Monitoring System : Using Thermal Imaging Approach
University essay from Blekinge Tekniska HögskolaAbstract : Context: On airport runways, monitoring is done by Precision Runway Monitor (PRM) method with the help of radar. Most of the airports are built near the forests so there is a greater chance of mam-mal intrusion onto the runways leading to massive accidents. READ MORE
-
24. Increasing the Trustworthiness ofAI-based In-Vehicle IDS usingeXplainable AI
University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologiAbstract : An in-vehicle intrusion detection system (IV-IDS) is one of the protection mechanisms used to detect cyber attacks on electric or autonomous vehicles where anomaly-based IDS solution have better potential at detecting the attacks especially zero-day attacks. Generally, the IV-IDS generate false alarms (falsely detecting normal data as attacks) because of the difficulty to differentiate between normal and attack data. READ MORE
-
25. Cooperative security log analysis using machine learning : Analyzing different approaches to log featurization and classification
University essay from Linköpings universitet/Databas och informationsteknikAbstract : This thesis evaluates the performance of different machine learning approaches to log classification based on a dataset derived from simulating intrusive behavior towards an enterprise web application. The first experiment consists of performing attacks towards the web app in correlation with the logs to create a labeled dataset. READ MORE