Searched for: subject%3A%22Intrusion%255C+Detection%22
(21 - 28 of 28)

Pages

document
Hendriksen, H. (author)
Financial fraud is, within the banking world, a major source of expenses. Improving on timely detecting fraud is a constantly ongoing cat and mouse game between the financial institutions and criminal organisations. To be on the edge of fraud detection, new approaches have to constantly be developed. This research will tap into the large amount...
master thesis 2016
document
Hammerschmidt, C.A. (author), Marchal, Samuel (author), State, Radu (author), Pellegrino, G. (author), Verwer, S.E. (author)
The task of network traffic monitoring has evolved drastically with the ever-increasing amount of data flowing in large scale networks. The automated analysis of this tremendous source of information often comes with using simpler models on aggregated data (e.g. IP flow records) due to time and space constraints. A step towards utilizing IP flow...
conference paper 2016
document
Sæmundsson, G.D. (author)
In this work we approach the problem of deploying anomaly detection techniques for detecting cyber attacks in an organisational environment. Anomaly detection has been an active research area for almost three decades with promising results. However, few such systems have been successfully im- plemented in an operational environment for improving...
master thesis 2015
document
Burghouwt, P. (author)
Botnets play an important role in modern Internet-related cybercrime. A botnet consists of a group of infected computers, referred to as bots. The bots are remotely controlled and deployed in malicious activities, such as DDoS attacks, spam, and espionage. Clever design of the botnet C&C (Command and Control) infrastructure, combined with the...
doctoral thesis 2015
document
Spadaro, A. (author)
Rapidly evolving IT infrastructures bring beneficial effects to society and promote information sharing and use. However, vulnerabilities create opportunities for hostile users to perform malicious activities and IT security has gradually turned into a critical research area for organizations and governments. Processes of decision making in...
master thesis 2013
document
De Vries, J.A. (author)
Cyber-attacks against companies and governments are seeing an increase in complexity and persistence. These more complex attacks are aimed at penetrating corporate and government networks to obtain classified information. Common intrusion detection methods lack in their ability to detect such complex attacks. A framework is proposed to relate...
master thesis 2012
document
Arelakis, A. (author)
Network Security is a significant issue nowadays. The information flow is enormous and the attacks have been substantially evolved.Every single packet of the flow must be scanned in deep and checked with all known attack rules (Deep Packet Inspection) to determine whether it is malicious. However, the task of Deep Packet Inspection requires a...
master thesis 2008
document
Sourdis, I. (author)
This dissertation deals with essential issues pertaining to high performance processing for network security and deep packet inspection. The proposed solutions keep pace with the increasing number and complexity of known attack descriptions providing multi-Gbps processing rates. We advocate the use of reconfigurable hardware to provide...
doctoral thesis 2007
Searched for: subject%3A%22Intrusion%255C+Detection%22
(21 - 28 of 28)

Pages