Sökning: "Rule-Based IDS"

Hittade 5 uppsatser innehållade orden Rule-Based IDS.

  1. 1. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Yashwanth Venkata Sai Kumar Adabala; Lakshmi Venkata Raghava Sudheer Devanaboina; [2024]
    Nyckelord :Software Defined Networking; SDN; IP Spoofing; Flooding; DDoS Attacks; Mininet; Snort IDS; Network Security;

    Sammanfattning : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. LÄS MER

  2. 2. Increasing the Trustworthiness ofAI-based In-Vehicle IDS usingeXplainable AI

    Uppsats för yrkesexamina på avancerad nivå, Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Författare :Hampus Lundberg; [2022]
    Nyckelord :Intrusion Detection System; In-Vehicle Intrusion Detection System; Machine Learning; Deep Learning; Explainable Artificial Intelligence; Trustworthiness.;

    Sammanfattning : An in-vehicle intrusion detection system (IV-IDS) is one of the protection mechanisms used to detect cyber attacks on electric or autonomous vehicles where anomaly-based IDS solution have better potential at detecting the attacks especially zero-day attacks. Generally, the IV-IDS generate false alarms (falsely detecting normal data as attacks) because of the difficulty to differentiate between normal and attack data. LÄS MER

  3. 3. Secure Self-Reconfiguring Services to Mitigate DoS Attacks

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Silvan Zeller; [2019]
    Nyckelord :Rule-Based IDS; Runtime Verification; Domain Attacks; Self-Reconfiguring Systems;

    Sammanfattning : Protecting web services from cyber attacks is a complex problem requiring many layers of defense and mitigation strategies. Out of the diverse range of attacks, denial of service (DoS) attacks on the business logic – or the domain – are poorly studied and no widely accepted general-purpose software product to prevent these attacks exists today. LÄS MER

  4. 4. Information-Theoretic Framework for Network Anomaly Detection: Enabling online application of statistical learning models to high-speed traffic

    Master-uppsats, KTH/Matematisk statistik

    Författare :Gabriel Damour; [2019]
    Nyckelord :Network Security; Distributed Denial of Service; DDoS; DoS; Anomaly Detection; Intrusion Detection; Attack Source Identification; Information Theory; Statistical Learnin; Nätverkssäkerhet; Distribuerad Överbelastningsattack; DDoS; DoS; Anomalidetektering; Intrångsdetektering; Identifiering av Attackkällor; Informationsteori; Maskininlärning;

    Sammanfattning : With the current proliferation of cyber attacks, safeguarding internet facing assets from network intrusions, is becoming a vital task in our increasingly digitalised economies. Although recent successes of machine learning (ML) models bode the dawn of a new generation of intrusion detection systems (IDS); current solutions struggle to implement these in an efficient manner, leaving many IDSs to rely on rule-based techniques. LÄS MER

  5. 5. Security and Performance Analysis of Topology-Based Intrusion Detection System in Ad Hoc Networks

    Master-uppsats, Blekinge Tekniska Högskola/Avdelningen för telekommunikationssystem

    Författare :UMUNNA CHRISTIAN CHEZZ CHETACHI; [2009]
    Nyckelord :Ad-hoc networks; cluster topology; Intrusion detection system; jammer attack Security;

    Sammanfattning : As Wireless ad-hoc Networks are becoming an increasingly emerging technology taking a centre stage in exciting research areas which has attracted many research attentions in communication systems, the need for efficient intrusion detection techniques to enhance network security and privacy has gained significant prominence. Intrusion detection systems(IDS) in ad- hoc networks provides an effective method to improve the security, energy efficiency of transmission nodes allowing better spatial reuse of the wireless channel and control over network resources in order to optimize node security and the transmit power thereby maintaining network connectivity. LÄS MER