Sökning: "intrusion detection systems"

Visar resultat 6 - 10 av 77 uppsatser innehållade orden intrusion detection systems.

  1. 6. Observability in Machine Learning based Intrusion Detection Systems for RPL-based IoT

    Kandidat-uppsats, Uppsala universitet/Institutionen för informationsteknologi

    Författare :Malin Strand; [2023]
    Nyckelord :;

    Sammanfattning : As IoT devices become more and more present in our daily lives, security in IoT networks has become a major concern. A promising approach for detecting attacks is the use of machine learning based Intrusion Detection Systems (IDSs). The attack studied in this thesis is the blackhole attack, an attack causing parts of the network to disconnect. LÄS MER

  2. 7. Är det någon som gräver efter krypto på min dator? : En studie kring hotet av kryptobrytning

    Kandidat-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Filippa Skåås; Karin Olsson; [2023]
    Nyckelord :cryptocurrency; packet sniffers; Wireshark; Task Manager; Resource Monitor; Intrusion Detection System; machine learning; kryptovaluta; kryptobrytning; paketanalysatorer; Wireshark; Aktivitetshanteraren; Resursövervakaren; Intrusion Detection Systems; maskininlärning;

    Sammanfattning : Kryptobrytning är den processen där transaktioner kryptovaluta verifieras.Idag är olaglig kryptobrytning ett stort hot då det utgör en stor del avorganiserad brottslighet. Dessutom kan skadliga kryptobrytningsprogramförkorta en dators livslängd avsevärt. LÄS MER

  3. 8. Edge Computing Security for IoT : A Systematic Literature Review

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Albin Johnsson; Adam Nordling; [2023]
    Nyckelord :;

    Sammanfattning : This study conducts a systematic literature review (SLR) to explore the security threats, their mitigation strategies, and the roles of blockchain and 5G technologies in enhancing the security of IoT devices in edge computing environments. Utilizing digital libraries as resources, the review examines three research questions that delve into the common security threats for IoT devices in edge computing, the unique security issues for sensors, gateways, and actuators, and the advantages of integrating blockchain and 5G technologies into edge computing security for IoT systems. LÄS MER

  4. 9. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Venkata Sai Bala Ratan Murali Puvvada; Hemanth Kandala; [2023]
    Nyckelord :Intrusion Detection Systems; Slow HTTP DoS Attacks; Snort; Suricata; Rule sets.;

    Sammanfattning : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). LÄS MER

  5. 10. Machines Do Not Have Little Gray Cells: : Analysing Catastrophic Forgetting in Cross-Domain Intrusion Detection Systems

    Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Ramin Valieh; Farid Esmaeili Kia; [2023]
    Nyckelord :Catastrophic Forgetting; Intrusion Detection Systems; Continual Learning;

    Sammanfattning : Cross-domain intrusion detection, a critical component of cybersecurity, involves evaluating the performance of neural networks across diverse datasets or databases. The ability of intrusion detection systems to effectively adapt to new threats and data sources is paramount for safeguarding networks and sensitive information. LÄS MER