Sökning: "intrusion detection"
Visar resultat 1 - 5 av 140 uppsatser innehållade orden intrusion detection.
1. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application
Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. LÄS MER
2. Evaluating intrusion detection points in an end-to-end solution
Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologiSammanfattning : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. LÄS MER
3. Quantum Espionage
Master-uppsats, KTH/Tillämpad fysikSammanfattning : This thesis investigates the security of optical fiber communication and demonstrates the feasibility of eavesdropping using different tapping methods and superconducting nanowire single-photon detectors (SNSPDs). Methods for surveillance against fiber intrusion are also investigated. LÄS MER
4. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort
Kandidat-uppsats, Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)Sammanfattning : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. LÄS MER
5. Intrusion Detection in IT Infrastructures using Hidden Markov Models
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : In the past decades, cloud based services have developed rapidly. And as a result, cybercrimehas increased in sophistication as well as frequency. It therefore becomes vital to have solidprotection against such attacks, especially for infrastructures containing sensitive information. LÄS MER