Searched for: subject%3A%22intrusion%22
(1 - 8 of 8)
document
Kabbara, N. (author), Mwangi, A.W. (author), Gibescu, Madeleine (author), Abedi, A. (author), Stefanov, Alexandru (author), Palensky, P. (author)
As power system's operational technology converges with innovative information and communication technologies, the need for extensive resilience testing for scenarios covering the electrical grid, networking bottlenecks, as well as cyber security threats, become a necessity. This paper proposes a comprehensive, multi-disciplinary simulation...
conference paper 2023
document
Telikani, Akbar (author), Rudbardeh, Nima Esmi (author), Soleymanpour, Shiva (author), Shahbahrami, Asadollah (author), Shen, Jun (author), Gaydadjiev, G. (author), Hassanpour, Reza (author)
A problem with machine learning (ML) techniques for detecting intrusions in the Internet of Things (IoT) is that they are ineffective in the detection of low-frequency intrusions. In addition, as ML models are trained using specific attack categories, they cannot recognize unknown attacks. This article integrates strategies of cost-sensitive...
journal article 2023
document
Vermeer, M. (author), van Eeten, M.J.G. (author), Hernandez Ganan, C. (author)
Notwithstanding the predicted demise of signature-based network monitoring, it is still part of the bedrock of security operations. Rulesets are fundamental to the efficacy of Network Intrusion Detection Systems (NIDS). Yet, they have rarely been studied in production environments. We partner with a Managed Security Service Provider (MSSP) to...
conference paper 2022
document
Hammerschmidt, C.A. (author), Marchal, Samuel (author), State, Radu (author), Pellegrino, G. (author), Verwer, S.E. (author)
The task of network traffic monitoring has evolved drastically with the ever-increasing amount of data flowing in large scale networks. The automated analysis of this tremendous source of information often comes with using simpler models on aggregated data (e.g. IP flow records) due to time and space constraints. A step towards utilizing IP flow...
conference paper 2016
document
Sæmundsson, G.D. (author)
In this work we approach the problem of deploying anomaly detection techniques for detecting cyber attacks in an organisational environment. Anomaly detection has been an active research area for almost three decades with promising results. However, few such systems have been successfully im- plemented in an operational environment for improving...
master thesis 2015
document
Spadaro, A. (author)
Rapidly evolving IT infrastructures bring beneficial effects to society and promote information sharing and use. However, vulnerabilities create opportunities for hostile users to perform malicious activities and IT security has gradually turned into a critical research area for organizations and governments. Processes of decision making in...
master thesis 2013
document
De Vries, J.A. (author)
Cyber-attacks against companies and governments are seeing an increase in complexity and persistence. These more complex attacks are aimed at penetrating corporate and government networks to obtain classified information. Common intrusion detection methods lack in their ability to detect such complex attacks. A framework is proposed to relate...
master thesis 2012
document
Sourdis, I. (author)
This dissertation deals with essential issues pertaining to high performance processing for network security and deep packet inspection. The proposed solutions keep pace with the increasing number and complexity of known attack descriptions providing multi-Gbps processing rates. We advocate the use of reconfigurable hardware to provide...
doctoral thesis 2007
Searched for: subject%3A%22intrusion%22
(1 - 8 of 8)