Essays about: "thesis for NETWORK SECURITY"

Showing result 1 - 5 of 359 essays containing the words thesis for NETWORK SECURITY.

  1. 1. Assessing the Security of Internal Automotive Networks

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Anas Alkoutli; Joakim Anderlind; Carl-Johan Björnson; Mathias Drage; Morgan Thowsen; Antonia Welzel; [2021-09-14]
    Keywords : Vehicle; Network Security; CAN; Ethernet;

    Abstract : Context In order to address the growing need for connectivity in today’s cars, thein-vehicle network has increased in complexity, now consisting of over 100 electricalcontrol units. Balancing the level of security with high performance is non-trivial,and current networks have shown to sacrifice security measures for performance,therefore leaving the networks sensitive to both manipulation and information re trieval. READ MORE

  2. 2. Work from Home - Information Security Threats and Best Practices

    University essay from Lunds universitet/Institutionen för informatik

    Author : Frida Carlsten; Erika Hultman; Douglas Erol Nilsson; [2021]
    Keywords : Information Security; Work from Home; WFH; Best Practices; Security Threats; Technology and Engineering;

    Abstract : With the spread of the COVID-19 pandemic a majority of the workforce were compelled to start working from home. In conjunction with this sudden shift, threats concerning information security have reportedly increased, which organisations may not have been prepared for. READ MORE

  3. 3. INTRUSION DETECTION USING MACHINE LEARNING FOR INDUSTRIAL CONTROL SYSTEMS

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Roland Plaka; [2021]
    Keywords : intrusion detection; machine learning; security;

    Abstract : An intrusion detection system (IDS) is a software application that monitors a network forunauthorized and malicious activities or security policy violations related to confidentiality,integrity, and availability of a system. In this thesis, we performed detailed literature reviewson the different types of IDS, anomaly detection methods, and machine learning algorithmsthat can be used for detection and classification. READ MORE

  4. 4. A Performance Analysis of Intrusion Detection with Snort and Security Information Management

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Christian Thorarensen; [2021]
    Keywords : Snort; Snort 3; PulledPork; IDS; Open Distro for Elasticsearch; ODFE; SIM; SIEM; ET Open; D-ITG;

    Abstract : Network intrusion detection systems (NIDSs) are a major component in cybersecurity and can be implemented with open-source software. Active communities and researchers continue to improve projects and rulesets used for detecting threats to keep up with the rapid development of the internet. READ MORE

  5. 5. Security Countermeasure Selection as a Constraint Solving Problem

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Aya Kathem; [2021]
    Keywords : Logical attack graph; Optimization problem; Constraint Solving Problems; Computer Network Security.;

    Abstract : Network systems often contain vulnerabilities that remain unmitigated in a network for various reasons, such as lack of a patch and limited budget. Adversaries can exploit these existing vulnerabilities through different strategies. READ MORE