Essays about: "thesis for NETWORK SECURITY"

Showing result 1 - 5 of 343 essays containing the words thesis for NETWORK SECURITY.

  1. 1. INTRUSION DETECTION USING MACHINE LEARNING FOR INDUSTRIAL CONTROL SYSTEMS

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Roland Plaka; [2021]
    Keywords : intrusion detection; machine learning; security;

    Abstract : An intrusion detection system (IDS) is a software application that monitors a network forunauthorized and malicious activities or security policy violations related to confidentiality,integrity, and availability of a system. In this thesis, we performed detailed literature reviewson the different types of IDS, anomaly detection methods, and machine learning algorithmsthat can be used for detection and classification. READ MORE

  2. 2. Security Countermeasure Selection as a Constraint Solving Problem

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Aya Kathem; [2021]
    Keywords : Logical attack graph; Optimization problem; Constraint Solving Problems; Computer Network Security.;

    Abstract : Network systems often contain vulnerabilities that remain unmitigated in a network for various reasons, such as lack of a patch and limited budget. Adversaries can exploit these existing vulnerabilities through different strategies. READ MORE

  3. 3. Machine Learning with Reconfigurable Privacy on Resource-Limited Edge Computing Devices

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zannatun Nayem Tania; [2021]
    Keywords : Data Privacy; Resource Management; Machine Learning; Fitbit; Internet of Things IoT ; Optimization; Dataintegritet; Resurshantering; Machine Learning; Fitbit; Internet of Things IoT ; Optimering;

    Abstract : Distributed computing allows effective data storage, processing and retrieval but it poses security and privacy issues. Sensors are the cornerstone of the IoT-based pipelines, since they constantly capture data until it can be analyzed at the central cloud resources. However, these sensor nodes are often constrained by limited resources. READ MORE

  4. 4. Fuzzing Radio Resource Control messages in 5G and LTE systems : To test telecommunication systems with ASN.1 grammar rules based adaptive fuzzer

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Srinath Potnuru; [2021]
    Keywords : RRC; 5G NR; robustness testing; fuzzing; ASN.1; network protocol testing; vulnerability detection; software security; RRC; 5G NR; robusthetstest; fuzzing; ASN.1; nätverksprotokolltestning; sårbarhetsdetektering; mjukvarusäkerhet;

    Abstract : 5G telecommunication systems must be ultra-reliable to meet the needs of the next evolution in communication. The systems deployed must be thoroughly tested and must conform to their standards. Software and network protocols are commonly tested with techniques like fuzzing, penetration testing, code review, conformance testing. READ MORE

  5. 5. SDP And VPN For Remote Access : A Comparative Study And Performance Evaluation

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM); Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Abel Tariku Sintaro; Yemi Emmanuel Komolafe; [2021]
    Keywords : Zero-Trust security model; Perimeter-based security model; Software- defined perimeter; IPSec VPN; performance evaluation; comparative study;

    Abstract : Remote access is a way of providing access to networks from outside the premises of the network. Virtual Private Network (VPN) is one solution used to provide remote access. Software-Defined Perimeter (SDP) is another solution that is capable of providing access to resources from a remote location. READ MORE