Sökning: "Snort"

Visar resultat 1 - 5 av 26 uppsatser innehållade ordet Snort.

  1. 1. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Yashwanth Venkata Sai Kumar Adabala; Lakshmi Venkata Raghava Sudheer Devanaboina; [2024]
    Nyckelord :Software Defined Networking; SDN; IP Spoofing; Flooding; DDoS Attacks; Mininet; Snort IDS; Network Security;

    Sammanfattning : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. LÄS MER

  2. 2. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort

    Kandidat-uppsats, Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Författare :Peter Stegeby; [2023]
    Nyckelord :Intrusion detection; HIDS; NIDS; Signature-based; Linux; Windows; Sniffing packets; Upptäcka intrång; HIDS; NIDS; Signatur-baserad; Linux; Windows; Paketsniffing.;

    Sammanfattning : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. LÄS MER

  3. 3. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Venkata Sai Bala Ratan Murali Puvvada; Hemanth Kandala; [2023]
    Nyckelord :Intrusion Detection Systems; Slow HTTP DoS Attacks; Snort; Suricata; Rule sets.;

    Sammanfattning : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). LÄS MER

  4. 4. Evaluating the effectiveness of free rule sets for Snort

    Master-uppsats, Linköpings universitet/Databas och informationsteknik

    Författare :Niklas Granberg; [2022]
    Nyckelord :Snort; rule sets; Snort rule sets; information security; network security;

    Sammanfattning : As more of the modern world is connected to the Internet, threats can reach further than ever before. Attacks happen all the time and many have serious consequences that disrupts the daily processes of people and companies, possibly causing lasting damage. To fight back, defensive tools are used to find and counter attacks. LÄS MER

  5. 5. Methods for network intrusion detection : Evaluating rule-based methods and machine learning models on the CIC-IDS2017 dataset

    Master-uppsats, Uppsala universitet/Institutionen för informatik och media

    Författare :Henrik Lindstedt; [2022]
    Nyckelord :MLP; random forest; CIC-IDS2017; Snort; Intrusion Detection System;

    Sammanfattning : Network intrusion detection is a task aimed to identify malicious network traffic. Malicious networktraffic is generated when a perpetrator attacks a network or internet-connected device with the intent todisrupt, steal or destroy a service or information. LÄS MER