Parcourir par sujet "Intrusion detection"
Voici les éléments 1-13 de 13
-
Assessment of Machine Learning Techniques for Building an Efficient IDS
(2020)Intrusion Detection Systems (IDS) are the systems that detect and block any potential threats (e.g. DDoS attacks) in the network. In this project, we explore the performance of several machine learning techniques when used ... -
Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers
(2007)Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performance of wireless networks, with effects similar to those of Denial of Service (DoS) attacks. In this paper we consider the ... -
Impact of optimal MAC layer attacks on the network layer
(2006)Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existing links. In this work we consider node ... -
Intrusion Detection and Botnet Prevention Circuit for IoT Devices
(2020)The need for secure and trustworthy devices has become the main question in the Internet of Things market nowadays. This work aims to introduce a circuit connected inline to the device's power supply and analyze its behavior. ... -
Intrusion detection system for platooning connected autonomous vehicles
(2019)The deployment of Connected Autonomous Vehicles (CAVs) in Vehicular Ad Hoc Networks (VANETs) requires secure wireless communication in order to ensure reliable connectivity and safety. However, this wireless communication ... -
A machine-learning clustering approach for intrusion detection to IoT devices
(2019)Nowadays we see the sharp increase in smart devices on the internet and in the network of things. An ever increasing problem with these devices is their protection against malware and internet attacks because of their ... -
Monitoring supply current thresholds for smart device's security enhancement
(2019)The rapid growth of connected devices and the sensitive data they generate poses a significant challenge for manufacturers seeking to comprehensively protect their devices from attack. This paper presents a study and its ... -
Security assessment in IoT ecosystems
(2020)The Internet of Things (IoT) and "Smart Everything" trend is a reality that is becoming part of our daily lives. Consequently, there is a gradual increase in the deployment of real world IoT systems that attempt to make ... -
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
(2018)This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G cellular ... -
Smart devices security enhancement via power supply monitoring
(2020)The continuous growth of the number of Internet of Things (IoT) devices and their inclusion to public and private infrastructures has introduced new applciations to the market and our day-to-day life. At the same time, ... -
A test-bed for intrusion detection systems results post-processing
(2014)Intrusion detection systems produce alert sets of low quality. Many post-processing methods have been proposed to make alert sets more meaningful to security analysts. Relevant research has to deal with an important task; ... -
Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts
(2021)Cyber-security attacks are becoming more frequent and more severe day by day. To detect the execution of such attacks, organizations install intrusion detection systems. It would be beneficial for such organizations to ... -
Voice interactive personalized security (VoIPSEC) protocol: Fortify internet telephony by providing end-to-end security through inbound key exchange and biometric verification
(2006)Secure end-to-end information exchange is a constant challenge in electronic communications. Novel security architectures and approaches are proposed constantly, to be followed by announcements of sophisticated attack ...