Essays about: "intrusion methods"

Showing result 1 - 5 of 58 essays containing the words intrusion methods.

  1. 1. Quantum Espionage

    University essay from KTH/Tillämpad fysik

    Author : Carlo Ninic Svensson; [2023]
    Keywords : Quantum Nano Photonics; SNSPD; OTDR; Nano Kvantfotonik; SNSPD; OTDR;

    Abstract : This thesis investigates the security of optical fiber communication and demonstrates the feasibility of eavesdropping using different tapping methods and superconducting nanowire single-photon detectors (SNSPDs). Methods for surveillance against fiber intrusion are also investigated. READ MORE

  2. 2. Edge Computing Security for IoT : A Systematic Literature Review

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Albin Johnsson; Adam Nordling; [2023]
    Keywords : ;

    Abstract : This study conducts a systematic literature review (SLR) to explore the security threats, their mitigation strategies, and the roles of blockchain and 5G technologies in enhancing the security of IoT devices in edge computing environments. Utilizing digital libraries as resources, the review examines three research questions that delve into the common security threats for IoT devices in edge computing, the unique security issues for sensors, gateways, and actuators, and the advantages of integrating blockchain and 5G technologies into edge computing security for IoT systems. READ MORE

  3. 3. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Venkata Sai Bala Ratan Murali Puvvada; Hemanth Kandala; [2023]
    Keywords : Intrusion Detection Systems; Slow HTTP DoS Attacks; Snort; Suricata; Rule sets.;

    Abstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE

  4. 4. Probability Based Path Planning of Unmanned Ground Vehicles for Autonomous Surveillance : Through World Decomposition and Modelling of Target Distribution

    University essay from Linköpings universitet/Reglerteknik

    Author : Per Liljeström; [2022]
    Keywords : Probability based path planning; Unmanned ground vehicles; UGV; Autonomous surveillance; Cell decomposition; Spatial partitioning; Target distribution modeling; Decay function; Last-seen function; Stochastic processes; Markov chain; Markov process; Markov planner;

    Abstract : The interest in autonomous surveillance has increased due to advances in autonomous systems and sensor theory. This thesis is a preliminary study of the cooperation between UGVs and stationary sensors when monitoring a dedicated area. The primary focus is the path planning of a UGV for different initial intrusion alarms. Cell decomposition, i. READ MORE

  5. 5. Smart Attack Detection for IoT Networks

    University essay from KTH/Kommunikationssystem, CoS

    Author : Yang Yang; [2022]
    Keywords : Internet of Things; Security; Machine learning; Intrusion detection; Sakernas Internet; Säkerhet; Maskininlärning; Intrångsdetektering;

    Abstract : The Internet of Things (IoT) is becoming related to more and more people's daily life. It is a network that consists of resource-constrained devices. Nowadays, the application of IoT like smart wearable devices is very common. Due to the wide and important application of IoT, its security also attracts research attention without any doubt. READ MORE