Sökning: "Intrusion Response System"
Visar resultat 1 - 5 av 8 uppsatser innehållade orden Intrusion Response System.
1. Design and Implementation of an Efficient Intrusion Response System for 5G RAN Baseband Units
Master-uppsats, Linköpings universitet/Databas och informationsteknikSammanfattning : The 5G Radio Access Network (RAN) is a critical system that must be secured against potential attacks, particularly its Base-Band Unit (BBU), which is a common target for intrusions. Ericsson, which is a big provider of such systems, has placed significant emphasis on implementing Intrusion Detection Systems (IDS) to detect threats. LÄS MER
2. A Novel Framework For Detecting Subdomain State Against Takeover Attacks
Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologiSammanfattning : The Domain Name System (DNS) oversees the internet's architecture, providing pointers to both internal and external services. Consequently, enterprises increase their attack surface while simultaneously increasing their exposure to potential cyber threats. Subdomain takeovers happen when a subdomain leads to a website that no longer exists. LÄS MER
3. Endpoint Intrusion Detection and Response Agents in Embedded RAN Products : A suitability and performance evaluation
Master-uppsats, Linköpings universitet/Institutionen för datavetenskapSammanfattning : Endpoint detection and response is an integral part of the security of large-scale networks. Embedded hardware, such as those found at Ericsson Radio Access Network endpoints, have strict performance requirements that need to be met. LÄS MER
4. A Concept for an Intrusion Detection System over Automotive Ethernet
Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknikSammanfattning : A modern automotive vehicle is a complex technical system, containing many electronic, mechanical, and software parts. Typically, a high-end vehicle contains 70 or more electronic control units (ECUs) on average. LÄS MER
5. Reactive security of IoT communications
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : IoT networks’ intrinsic vulnerabilities can be protected through intru- sion detection and response systems (IDRS). Anomaly-based intrusion detection offers multiple advantages: it can detect unknown attacks and it can adapt to multiple types of protocols. LÄS MER