Sökning: "snort evaluation"
Visar resultat 1 - 5 av 8 uppsatser innehållade orden snort evaluation.
1. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems
Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskapSammanfattning : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). LÄS MER
2. Lightweight Portable Intrusion Detection System for Auditing Applications : Implementation and evaluation of a lightweight portable intrusion detection system using Raspberry Pi and Wi-Fi Pineapple
Master-uppsats, Linköpings universitet/Databas och informationsteknikSammanfattning : The goal of this thesis was to develop, deploy and evaluate a lightweight portable intrusion detection system (LPIDS) over wireless networks. The LPIDS was developed by adopting two different string matching algorithms: Aho-Corasick algorithm and Knuth–Morris–Pratt algorithm (KMP). LÄS MER
3. Utvärdering av signaturdatabaser i systemet Snort
Master-uppsats, Karlstads universitetSammanfattning : Konstant uppkoppling till internet idag är en självklarhet för många världen över. Internet bidrar till en global förbindelse som aldrig tidigare varit möjligt, vilken kan tyckas vara underbart i många avseenden. LÄS MER
4. Network Intrusion and Detection : An evaluation of SNORT
Kandidat-uppsats, Linköpings universitet/Institutionen för datavetenskapSammanfattning : Network security has become a vital part for computer networks to ensure that they operate as expected. With many of today's services relying on networks it is of great importance that the usage of networks are not being compromised. One way to increase the security of a computer network is to implement a Network Intrusion Detection System (NIDS). LÄS MER
5. Evaluation of Intrusion Detection Systems under Denial of Service Attack in virtual Environment
Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknikSammanfattning : Context. The intrusion detection systems are being widely used for detecting the malicious traffic in many industries and they use a variety of technologies. Each IDs had different architecture and are deployed for detecting malicious activity. Intrusion detection system has a different set of rules which can defined based on requirement. LÄS MER