Sökning: "Signature-based"

Visar resultat 1 - 5 av 14 uppsatser innehållade ordet Signature-based.

  1. 1. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks

    Kandidat-uppsats, Stockholms universitet/Institutionen för data- och systemvetenskap

    Författare :Josephine Spångberg; Vainius Mikelinskas; [2023]
    Nyckelord :Cyber threats; Malware; Cyber attacks; Signature Based Detection; Anomaly Detection; Cyber defense; Sophisticated attacks; Modern cyberattacks; malware detection in wireless network; IoT;

    Sammanfattning : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. LÄS MER

  2. 2. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort

    Kandidat-uppsats, Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Författare :Peter Stegeby; [2023]
    Nyckelord :Intrusion detection; HIDS; NIDS; Signature-based; Linux; Windows; Sniffing packets; Upptäcka intrång; HIDS; NIDS; Signatur-baserad; Linux; Windows; Paketsniffing.;

    Sammanfattning : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. LÄS MER

  3. 3. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Venkata Sai Bala Ratan Murali Puvvada; Hemanth Kandala; [2023]
    Nyckelord :Intrusion Detection Systems; Slow HTTP DoS Attacks; Snort; Suricata; Rule sets.;

    Sammanfattning : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). LÄS MER

  4. 4. Behavioural analysis and signature-based detection of Slowloris

    Kandidat-uppsats, Mälardalens universitet/Akademin för innovation, design och teknik

    Författare :Joakim Ljunglin; [2022]
    Nyckelord :;

    Sammanfattning : It is important to efficiently and correctly be able to detect and classify network traffic, both legitimate and malicious. The slow rate category of DoS attacks makes this task especially hard, as the generated traffic resembles legitimate traffic. LÄS MER

  5. 5. An Evaluation of Machine Learning Approaches for Hierarchical Malware Classification

    Uppsats för yrkesexamina på avancerad nivå, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Robin Roth; Martin Lundblad; [2019]
    Nyckelord :Machine Learning; Hierarchical Malware Classification; Static Malware Analysis; Mnemonic N-grams;

    Sammanfattning : With an evermore growing threat of new malware that keeps growing in both number and complexity, the necessity for improvement in automatic detection and classification of malware is increasing. The signature-based approaches used by several Anti-Virus companies struggle with the increasing amount of polymorphic malware. LÄS MER