Sökning: "Intrusion Detection System IDS"

Visar resultat 6 - 10 av 46 uppsatser innehållade orden Intrusion Detection System IDS.

  1. 6. Smart Attack Detection for IoT Networks

    Master-uppsats, KTH/Kommunikationssystem, CoS

    Författare :Yang Yang; [2022]
    Nyckelord :Internet of Things; Security; Machine learning; Intrusion detection; Sakernas Internet; Säkerhet; Maskininlärning; Intrångsdetektering;

    Sammanfattning : The Internet of Things (IoT) is becoming related to more and more people's daily life. It is a network that consists of resource-constrained devices. Nowadays, the application of IoT like smart wearable devices is very common. Due to the wide and important application of IoT, its security also attracts research attention without any doubt. LÄS MER

  2. 7. Increasing the Trustworthiness ofAI-based In-Vehicle IDS usingeXplainable AI

    Uppsats för yrkesexamina på avancerad nivå, Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Författare :Hampus Lundberg; [2022]
    Nyckelord :Intrusion Detection System; In-Vehicle Intrusion Detection System; Machine Learning; Deep Learning; Explainable Artificial Intelligence; Trustworthiness.;

    Sammanfattning : An in-vehicle intrusion detection system (IV-IDS) is one of the protection mechanisms used to detect cyber attacks on electric or autonomous vehicles where anomaly-based IDS solution have better potential at detecting the attacks especially zero-day attacks. Generally, the IV-IDS generate false alarms (falsely detecting normal data as attacks) because of the difficulty to differentiate between normal and attack data. LÄS MER

  3. 8. Network Traffic Analysis and Anomaly Detection : A Comparative Case Study

    Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Rona Babu; [2022]
    Nyckelord :Computer security; Network Traffic Analysis NTA ; Anomaly or Intrusion Detection System IDS ; SIEM; Splunk; Security Onion;

    Sammanfattning : Computer security is to protect the data inside the computer, relay the information, expose the information, or reduce the level of security to some extent. The communication contents are the main target of any malicious intent to interrupt one or more of the three aspects of the information security triad (confidentiality, integrity, and availability). LÄS MER

  4. 9. Comparison of Machine Learning Algorithms for Anomaly Detection in Train’s Real-Time Ethernet using an Intrusion Detection System

    Kandidat-uppsats,

    Författare :Trayi Chaganti; Tadi Rohith; [2022]
    Nyckelord :Anomaly detection; Computing methodologies; Machine learning; Real-time Ethernet; Supervised learning;

    Sammanfattning : Background: The train communication network is vulnerable to intrusion assaultsbecause of the openness of the ethernet communication protocol. Therefore, an intru-sion detection system must be incorporated into the train communication network. LÄS MER

  5. 10. Evaluating the efficiency of Host-based Intrusion Detection Systems protecting web applications

    M1-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Adam Willerton; Rasmus Gustafsson; [2022]
    Nyckelord :Intrusion Detection System; IDS; Host-based Intrusion Detection System; HIDS; Web applications; Efficiency;

    Sammanfattning : Background. Web applications are a more significant part of our digital experience, and the number of users keeps continuously growing. Social media alone accounts for more than half of the world’s population. Therefore these applications have become a lucrative target for attackers, and we have seen several attacks against them. LÄS MER