Essays about: "intrusion response"
Showing result 1 - 5 of 19 essays containing the words intrusion response.
-
1. Design and Implementation of an Efficient Intrusion Response System for 5G RAN Baseband Units
University essay from Linköpings universitet/Databas och informationsteknikAbstract : The 5G Radio Access Network (RAN) is a critical system that must be secured against potential attacks, particularly its Base-Band Unit (BBU), which is a common target for intrusions. Ericsson, which is a big provider of such systems, has placed significant emphasis on implementing Intrusion Detection Systems (IDS) to detect threats. READ MORE
-
2. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE
-
3. Machines Do Not Have Little Gray Cells: : Analysing Catastrophic Forgetting in Cross-Domain Intrusion Detection Systems
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Cross-domain intrusion detection, a critical component of cybersecurity, involves evaluating the performance of neural networks across diverse datasets or databases. The ability of intrusion detection systems to effectively adapt to new threats and data sources is paramount for safeguarding networks and sensitive information. READ MORE
-
4. A Novel Framework For Detecting Subdomain State Against Takeover Attacks
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : The Domain Name System (DNS) oversees the internet's architecture, providing pointers to both internal and external services. Consequently, enterprises increase their attack surface while simultaneously increasing their exposure to potential cyber threats. Subdomain takeovers happen when a subdomain leads to a website that no longer exists. READ MORE
-
5. Deanonymizing Onion Services byIntroducing Packet Delay
University essay from Blekinge Tekniska HögskolaAbstract : Background. Onion services facilitate two-way communication over the Tor net-work without letting either party know the other address or location. Many different techniques to break that anonymizing have come forth, but most of them have only been on paper. Some have been tested but then only on a separate network and not on the live Tor network. READ MORE