Searched for: subject%3A%22NIDS%22
(1 - 6 of 6)
document
Vermeer, M. (author), Kadenko, N.I. (author), van Eeten, M.J.G. (author), Hernandez Ganan, C. (author), Parkin, S.E. (author)
Signature-based network intrusion detection systems (NIDSs) and network intrusion prevention systems (NIPSs) remain at the heart of network defense, along with the rules that enable them to detect threats. These rules allow Security Operation Centers (SOCs) to properly defend a network, yet we know almost nothing about how rules are created,...
conference paper 2023
document
Gutiérrez Martínez, Jorge (author), Bezner, Maor (author), Molenkamp, A. (author), van den Bos, J.P. (author), Hofland, Bas (author), Leblanc, Philippe (author), Rella, Andrew (author), Rosenberg, Yaeli (author), Sella, Ido (author)
ECOncrete®‘s Coastalock is an ecologically designed armour unit, providing an alternative and/or a complement to traditional armour layers with ecologically enhanced armouring that provides shoreline stabilization, while also creating well-defined local ecosystems that mimic natural rock pools. The 2D physical model tests performed at TU Delft...
conference paper 2023
document
Vermeer, M. (author), van Eeten, M.J.G. (author), Hernandez Ganan, C. (author)
Notwithstanding the predicted demise of signature-based network monitoring, it is still part of the bedrock of security operations. Rulesets are fundamental to the efficacy of Network Intrusion Detection Systems (NIDS). Yet, they have rarely been studied in production environments. We partner with a Managed Security Service Provider (MSSP) to...
conference paper 2022
document
Sharma, Bhawana (author), Sharma, Lokesh (author), Lal, C. (author)
IoT is widely used in many fields, and with the expansion of the network and increment of devices, there is the dynamic growth of data in IoT systems, making the system more vulnerable to various attacks. Nowadays, network security is the primary issue in IoT, and there is a need for the system to detect intruders. In this paper, we constructed...
conference paper 2022
document
Simidžioski, Magdalena (author)
To detect malicious activities in a network, intrusion detection systems are used. Even though these solutions are widely deployed for this purpose they have one serious shortcoming which is the huge amount of false alarms that they are generating. Different measures are taken to tackle this problem such as manually changing the settings of the...
master thesis 2020
document
Jansen, J. (author)
Insects can be alternative source of nutrients in various parts of the food-chain, as feed for livestock but also human consumption. However, the acceptation of insects as a source of nutrients is low. Insects are in no way a part of western culture except when they are a pest. Insects do play a vital role in upcoming developments such as urban...
master thesis 2014
Searched for: subject%3A%22NIDS%22
(1 - 6 of 6)