Essays about: "thesis on network security"

Showing result 1 - 5 of 324 essays containing the words thesis on network security.

  1. 1. A Performance Analysis of Intrusion Detection with Snort and Security Information Management

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Christian Thorarensen; [2021]
    Keywords : Snort; Snort 3; PulledPork; IDS; Open Distro for Elasticsearch; ODFE; SIM; SIEM; ET Open; D-ITG;

    Abstract : Network intrusion detection systems (NIDSs) are a major component in cybersecurity and can be implemented with open-source software. Active communities and researchers continue to improve projects and rulesets used for detecting threats to keep up with the rapid development of the internet. READ MORE

  2. 2. Security Countermeasure Selection as a Constraint Solving Problem

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Aya Kathem; [2021]
    Keywords : Logical attack graph; Optimization problem; Constraint Solving Problems; Computer Network Security.;

    Abstract : Network systems often contain vulnerabilities that remain unmitigated in a network for various reasons, such as lack of a patch and limited budget. Adversaries can exploit these existing vulnerabilities through different strategies. READ MORE

  3. 3. Machine Learning with Reconfigurable Privacy on Resource-Limited Edge Computing Devices

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zannatun Nayem Tania; [2021]
    Keywords : Data Privacy; Resource Management; Machine Learning; Fitbit; Internet of Things IoT ; Optimization; Dataintegritet; Resurshantering; Machine Learning; Fitbit; Internet of Things IoT ; Optimering;

    Abstract : Distributed computing allows effective data storage, processing and retrieval but it poses security and privacy issues. Sensors are the cornerstone of the IoT-based pipelines, since they constantly capture data until it can be analyzed at the central cloud resources. However, these sensor nodes are often constrained by limited resources. READ MORE

  4. 4. Network Hardening of Multilayer Switch

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik; Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Peter Pekkanen; David Söderman; [2021]
    Keywords : ;

    Abstract : In today’s computer networking and industrial networking, security holds a significant role in keeping the entire network safe from malicious users or attackers from remote locations. Using vulnerability scanners and a port scanner it is possible to detect vulnerabilities on the network equipment before an attacker finds the vulnerability and exploits it. READ MORE

  5. 5. Automating software installation for cyber security research and testing public exploits in CRATE

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Joakim Kahlström; Johan Hedlin; [2021]
    Keywords : cyber range; software installation; cyber security; CRATE; exploit testing; automation; cyberanläggning; mjukvaruinstallation; cybersäkerhet; CRATE; angreppstestning; automatisering;

    Abstract : As cyber attacks are an ever-increasing threat to many organizations, the need for controlled environments where cyber security defenses can be tested against real-world attacks is increasing. These environments, called cyber ranges, exist across the world for both military and academic purposes of various scales. READ MORE