To see the other types of publications on this topic, follow the link: Intrusion Prevention System.

Dissertations / Theses on the topic 'Intrusion Prevention System'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Intrusion Prevention System.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Tamagna-Darr, Lucas. "Evaluating the effectiveness of an intrusion prevention system-honeypot hybrid /." Online version of thesis, 2009. http://hdl.handle.net/1850/10837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dubell, Michael, and David Johansson. "Nätverkssäkerhet med IPS : Förbättrad nätverkssäkerhet med Intrusion Prevention Systems." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23347.

Full text
Abstract:
Att skydda sin IT-miljö mot olika typer av intrång och attacker som till exempel trojaner,skadliga Java applets eller DoS attacker med hjälp av brandväggar och antivirusprogramär två viktiga lager i skalskyddet. I den här uppsatsen undersöks hur väl ett Intrusion Prevention System skulle kunna fungera som ett ytterligare lager i skalskyddet. Fokus ligger på hur väl IPS-systemet klarar av att avvärja attacker, hur mycket tid som går åt till konfigurering och drift för att få ett fungerande IPS samt hur prestandan i nätverket påverkas av implementationen. För att mäta hur väl IPS systemet klarar
APA, Harvard, Vancouver, ISO, and other styles
3

Strnad, Matěj. "Návrh zabezpečení průmyslového řídícího systému." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-399322.

Full text
Abstract:
The subject of the master's thesis is a design of security measures for securing of an industrial control system. It includes an analysis of characteristics of communication environment and specifics of industrial communication systems, a comparison of available technological means and a design of a solution according to investor's requirements.
APA, Harvard, Vancouver, ISO, and other styles
4

Pagna, Disso Jules F. "A novel intrusion detection system (IDS) architecture. Attack detection based on snort for multistage attack scenarios in a multi-cores environment." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5248.

Full text
Abstract:
Recent research has indicated that although security systems are developing, illegal intrusion to computers is on the rise. The research conducted here illustrates that improving intrusion detection and prevention methods is fundamental for improving the overall security of systems. This research includes the design of a novel Intrusion Detection System (IDS) which identifies four levels of visibility of attacks. Two major areas of security concern were identified: speed and volume of attacks; and complexity of multistage attacks. Hence, the Multistage Intrusion Detection and Prevention
APA, Harvard, Vancouver, ISO, and other styles
5

Pagna, Disso Jules Ferdinand. "A novel intrusion detection system (IDS) architecture : attack detection based on snort for multistage attack scenarios in a multi-cores environment." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5248.

Full text
Abstract:
Recent research has indicated that although security systems are developing, illegal intrusion to computers is on the rise. The research conducted here illustrates that improving intrusion detection and prevention methods is fundamental for improving the overall security of systems. This research includes the design of a novel Intrusion Detection System (IDS) which identifies four levels of visibility of attacks. Two major areas of security concern were identified: speed and volume of attacks; and complexity of multistage attacks. Hence, the Multistage Intrusion Detection and Prevention System
APA, Harvard, Vancouver, ISO, and other styles
6

Ivvala, Avinash Kiran. "Assessment of Snort Intrusion Prevention System in Virtual Environment Against DoS and DDoS Attacks : An empirical evaluation between source mode and destination mode." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14056.

Full text
Abstract:
Context. Cloud computing (CC) is developed as a Human-centered computing model to facilitate its users to access resources anywhere on the globe. The resources can be shared among any cloud user which mainly questions the security in cloud computing. There are Denial of Service and Distributed Denial of Service attacks which are generated by the attackers to challenge the security of CC. The Next-Generation Intrusion Prevention Systems (sometimes referred as Non-Traditional Intrusion Prevention Systems (NGIPS) are being used as a measure to protect users against these attacks. This research is
APA, Harvard, Vancouver, ISO, and other styles
7

Hanna, Johan. "Åtgärder för att motverka säkerhetsbrister i katalogtjänster." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-39469.

Full text
Abstract:
Katalogtjänster är och förblir en central och kritisk del i informationssystem. I katalogtjänsterna samlas stora mängder information om användare och behörigheter för respektive användare. I högriskmiljöer, där bland annat hemlig och annan skyddsvärd information samlas, är katalogtjänsterna i en utsatt situation. Om en katalogtjänst svarar fel på en resursförfrågan kan konsekvenserna vara stora. Arbetet grundade sig i att med hjälp av olika säkerhetshöjande åtgärder bygga upp ett mer robust system för att skydda katalogtjänsten mot att behörighetsprinciperna bryts och ger obehörig personal ell
APA, Harvard, Vancouver, ISO, and other styles
8

Stefanova, Zheni Svetoslavova. "Machine Learning Methods for Network Intrusion Detection and Intrusion Prevention Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7367.

Full text
Abstract:
Given the continuing advancement of networking applications and our increased dependence upon software-based systems, there is a pressing need to develop improved security techniques for defending modern information technology (IT) systems from malicious cyber-attacks. Indeed, anyone can be impacted by such activities, including individuals, corporations, and governments. Furthermore, the sustained expansion of the network user base and its associated set of applications is also introducing additional vulnerabilities which can lead to criminal breaches and loss of critical data. As a result, t
APA, Harvard, Vancouver, ISO, and other styles
9

Cheng, Kah Wai. "Distributed deployment of Therminators in the network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FCheng%5Kah.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Labbe, Keith G. "Evaluation of two host-based intrusion prevention systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FLabbe.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Smith, David C. "Preventing point-of-sale system intrusions." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42726.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Several major United States retailers have suffered large-scale thefts of payment card information as the result of intrusions against point-of-sale systems (smart cash registers). Point-of-sale attacks present a growing threat and can constitute a homeland-security problem due to a trans-national cyber crime element. This thesis presents results of a survey of point-of-sale intrusions that reached at least the start of criminal investigation. The survey showed that attacks were generally quite simple, and predominantly involved guessin
APA, Harvard, Vancouver, ISO, and other styles
12

Abdulazeez, M. B. "Intrusion detection and prevention systems in the cloud environment." Thesis, University of Liverpool, 2017. http://livrepository.liverpool.ac.uk/3009224/.

Full text
Abstract:
Cloud computing provides users with computing resources on demand. Despite the recent boom in adoption of cloud services, security remains an important issue. The aim of this work is to study the structure of cloud systems and propose a new security architecture in protecting cloud against attacks. This work also investigates auto-scaling and how it affects cloud computing security. Finally, this thesis studies load balancing and scheduling in cloud computing particularly when some of the workload is faulty or malicious. The first original contribution proposes a hierarchical model for intrusi
APA, Harvard, Vancouver, ISO, and other styles
13

Nalubowa, Vivian Gloria. "Smart Home Security Using Intrusion Detection and Prevention Systems." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40995.

Full text
Abstract:
As the connectivity of home devices elevates so does the volume and sophistication of cyber attacks consistently grow. Therefore, the need for network security and availability becomes more significant. Numerous sorts of countermeasures like firewalls and router-based packet filtering have been put in place, although these alone are not enough to brace the network from unauthorised access. One of the most efficient methods of stopping network adversaries is using Intrusion Detection and Prevention Systems (IDPS). The goal of an IDPS is to stop security attacks before they can be successfully c
APA, Harvard, Vancouver, ISO, and other styles
14

Bul'ajoul, W. A. A. A. "Performance of network intrusion detection and prevention systems in highspeed environments." Thesis, Coventry University, 2017. http://curve.coventry.ac.uk/open/items/f3dfcb2a-df8a-4908-9202-e0ed758f86b2/1.

Full text
Abstract:
Due to the numerous and increasingly malicious attacks on computer networks and systems, current security tools are often not enough to resolve the issues related to illegal users, reliability, and to provide robust network security. Recent research has indicated that although network security has developed, a major concern about an increase in illegal intrusions is still occurring. Addressing security on every occasion or in every place is a really important and sensitive matter for many users, businesses, governments and enterprises. A Network Intrusion Detection and Prevention System (NIDPS
APA, Harvard, Vancouver, ISO, and other styles
15

Tevemark, Jonas. "Intrusion Detection and Prevention in IP Based Mobile Networks." Thesis, Linköping University, Department of Electrical Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-12015.

Full text
Abstract:
<p>Ericsson’s Packet Radio Access Network (PRAN) is a network solution for packet transport in mobile networks, which utilizes the Internet Protocol (IP). The IP protocol offers benefits in responsiveness and performance adaptation to data bursts when compared to Asynchronous Transfer Mode (ATM), which is still often used. There are many manufacturers / operators providing IP services, which reduce costs. The IP’s use on the Internet brings greater end-user knowledge, wider user community and more programs designed for use in IP environments. Because of this, the spectrum of possible attacks
APA, Harvard, Vancouver, ISO, and other styles
16

Martins, Daniel MourÃo. "A Strategy for Detection Systems and Intrusion Prevention Based on Free Software." Universidade Federal do CearÃ, 2012. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=8923.

Full text
Abstract:
nÃo hÃ<br>Due to the constant increase of the use of information systems and the potential impact that these intrusions can cause in all spheres of society a Intrusion Detection and Prevention System (IDPS) has become a necessity for network ans services security from various world organizations. These systems usually depends of prior knowledge of the patterns of attacks in order to detect them. This work presents an strategy to scenarios with computational and financial resources limited, using only opensource software for intrusion detection. This proposal is the creation of one flexible and
APA, Harvard, Vancouver, ISO, and other styles
17

Sahin, Umit Burak. "A New Approach For The Scalable Intrusion Detection In High-speed Networks." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12609053/index.pdf.

Full text
Abstract:
As the networks become faster and faster, the emerging requirement is to improve the performance of the Intrusion Detection and Prevention Systems (IDPS) to keep up with the increased network throughput. In high speed networks, it is very difficult for the IDPS to process all the packets. Since the throughput of IDPS is not improved as fast as the throughput of the switches and routers, it is necessary to develop new detection techniques other than traditional techniques. In this thesis we propose a rule-based IDPS technique to detect Layer 2-4 attacks by just examining the flow data without i
APA, Harvard, Vancouver, ISO, and other styles
18

Idrissi, Hind. "Contributions to the security of mobile agent systems." Thesis, La Rochelle, 2016. http://www.theses.fr/2016LAROS022/document.

Full text
Abstract:
Récemment, l’informatique distribuée a connu une grande évolution en raison de l’utilisation du paradigme des agents mobiles, doté d’innovantes capacités, au lieu du système client-serveur où les applications sont liées à des nœuds particuliers dans les réseaux. Ayant capturé l’intérêt des chercheurs et de l’industrie, les agents mobiles sont capables de migrer de manière autonome d’un nœud à un autre à travers le réseau, en transférant de leur code et leurs données, ce qui leur permet d’effectuer efficacement des calculs, de recueillir des informations et d’accomplir des tâches. Cependant, en
APA, Harvard, Vancouver, ISO, and other styles
19

Sikora, Marek. "Detekce slow-rate DDoS útoků." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-317019.

Full text
Abstract:
This diploma thesis is focused on the detection and protection against Slow DoS and DDoS attacks using computer network traffic analysis. The reader is introduced to the basic issues of this specific category of sophisticated attacks, and the characteristics of several specific attacks are clarified. There is also a set of methods for detecting and protecting against these attacks. The proposed methods are used to implement custom intrusion prevention system that is deployed on the border filtering server of computer network in order to protect Web servers against attacks from the Internet. Th
APA, Harvard, Vancouver, ISO, and other styles
20

Chen, Yen-hung, and 陳彥宏. "Intrusion Prevention System." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/98833068955685901827.

Full text
Abstract:
碩士<br>國立雲林科技大學<br>電子與資訊工程研究所<br>95<br>The most often seen and hardest to prevent the type of attack from hacker is the distributed denial of service (DDoS). DDoS will take up server’s bandwidth, system resource and reduce process efficiency. Although many scholars proposed source-end defense to stop attack traffics before they enter Internet backbone router, if attacker used highly distributed denial of service (HDDoS) will give rise false-positive rate when souce-end defense can’t differentiate between normal traffic and attack traffic. In this paper we will make up an intrusion prevention sy
APA, Harvard, Vancouver, ISO, and other styles
21

Zhi-Yang, Li, and 李志揚. "Intrusion Prevention and Remote Protection System." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/53847743162522627998.

Full text
Abstract:
碩士<br>東海大學<br>資訊工程與科學系<br>97<br>In recent years, networks are essential particularly for our daily life. More and more people access useful information, receive e-mail, purchase high-tech products, etc., through websites. However, when we enjoy network convenience, networks on the contrary also conduct threats for us, like Denial of Service (DoS) and Distributed Denial of Service (DDoS), resulting in bringing us inconvenience or financial loss, e.g., enterprises or companies’ huge amount of financial loss or missing their business opportunities. IDSs can protect network systems. But they often
APA, Harvard, Vancouver, ISO, and other styles
22

Cheng, Kuang Hung, and 鄭光宏. "An Intrusion Prevention System against Mimicry Attacks." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/96619060232523725015.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊工程系所<br>93<br>With the development of the hardware and Internet technologies, there are lots of applications available on the Internet. However, there are always hostile assailants in the open network environment. Though many different intrusion detection techniques had been developed, assailants can always attack against the weakness on these techniques, and try to evade from IDS detection. Based on system call interception technique, we develop a real-time intrusion detection and prevention system, called AMA-IPS (An Intrusion Prevention System against Mimicry Attacks).
APA, Harvard, Vancouver, ISO, and other styles
23

Yeh, Zhi-Cheng, and 葉志成. "Design and Implementation of ASIC forSMTP Intrusion Prevention System." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/61526623483072497087.

Full text
Abstract:
碩士<br>國立中正大學<br>電機工程所<br>96<br>In the fast-growing internet applications, email becomes more and more important in communication. SMTP attacks and spam mails have become one of the most serious problems. Above 50% of all email in the internet are spam mails. Particularly, the SMTP attacks and spam mails varies on email, for example spoofing address, illegal characters, sending in bulk, too many SMTP commands and so on. A single security technique is not enough to protect the system from these attacks and spam mails. In this thesis, we propose an ASIC for SMTP Intrusion Prevention System (SIPS)
APA, Harvard, Vancouver, ISO, and other styles
24

Chien, Kuan-Ping, and 錢冠評. "Parallel SMTP Intrusion Prevention System with Virus Detection Engine." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/28942454696308254793.

Full text
Abstract:
碩士<br>國立中正大學<br>電機工程所<br>96<br>With flourishing development, network, in recent years, E-mail is a very important communicate tool for user of network. Because of the convenience and importance of the communication protocol, assailant will launch SMTP attack and spam mail to mail server. In addition, the assailant has made use of convenient transmission way of the E-mail to carry offensive Malicious Code, so we need to detect the virus by data flow, to make a full defense for mail server and user. In order to defend SMTP attack and virus efficiently, in our page, we have proposed an integrate
APA, Harvard, Vancouver, ISO, and other styles
25

KAO, WEN-YU, and 高玟瑜. "An Extensible and Modularized Kernel-level Intrusion Prevention System." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/39079225736011830552.

Full text
Abstract:
碩士<br>國立暨南國際大學<br>資訊管理學系<br>105<br>As the popularity of computer applications and the rapid development of Internet technology, more and more users transmit or store important information through the internet. However, with the increase in the users, accompanied by hacker attacks, hacking techniques are diverse and constantly updated. Many of the tools to detect network attacks have been developed in succession, in which the Intrusion Detection System (IDS) is most commonly used to protect the system security. This thesis is based on the research, the Virtual Machine Monitor Based Extensible I
APA, Harvard, Vancouver, ISO, and other styles
26

Jui-Wen, Chen, and 陳瑞文. "WIPS: A Practical Intrusion Prevention System for Web Application." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/01304939181165262996.

Full text
Abstract:
碩士<br>國立中正大學<br>通訊工程研究所<br>93<br>For governments and company firms, system and internet security nowadays play more important roles than before. If organizations do not have solid security policies and strategies, hackers could compromise network and perform unauthorized access. Web application portal with single sign on (SSO) feature provides an integrated E-Business solution such that web application becomes an essential building block for business operations. Gartner Group report indicates that 75% of malicious attacks targeting the application layer, and the traditional security devices (s
APA, Harvard, Vancouver, ISO, and other styles
27

Chen, Meng-Jhih, and 陳孟志. "Network Intrusion Detection and Prevention System by Parallel Matching." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/17697990647085652914.

Full text
Abstract:
碩士<br>國立中正大學<br>電機工程研究所<br>101<br>The development of network is growing up quickly that accompanied by the many applications and many attacks. For the reason, it is necessary to establish the intrusion detection and prevention systems on the router or switch that can detect and prevent the network intrusions in the large scale institutions. With the increase network bandwidth and the variety of the attack from Internet hacker, the request of the intrusion detection is becoming heavier. Therefore, it is a crucial topic of how to create high efficient intrusion detection and prevention. We desig
APA, Harvard, Vancouver, ISO, and other styles
28

Fu, Yuan Chia, and 傅遠佳. "Research on the Performance Improvement of an Intrusion Prevention System." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/96339055901237597577.

Full text
Abstract:
碩士<br>長庚大學<br>資訊工程學研究所<br>97<br>With the recent rapid development of Internet, network security research and related products increased rapidly, especially intrusion detection systems are very much concern. At present, the majority of intrusion detection systems use specialized software and hardware, it is very expensive. Because free and open properties, Open Source Software gradually be taken seriously, especially the Linux special attention. If the effective use of free software that can save a lot of software costs. Because of the rapid development of Internet, the backbone of the network
APA, Harvard, Vancouver, ISO, and other styles
29

Nan, Lin Chun, and 林俊男. "Method and Implementation of Performance Evaluation for Intrusion Prevention System." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/97977755786805801128.

Full text
Abstract:
碩士<br>長庚大學<br>資訊管理學研究所<br>97<br>With the increasing prevalence of information technology, both enterprises and individuals have more and more reliance on the Internet. Protection of information security has thus become more important than ever. This study aimed to investigate how to evaluate the performance of intrusion prevention systems (IPS) at defending DDOS attacks and how to implement the evaluation method. Its result was expected to be a reference for information security staff on introduction of an IPS. To achieve the above objective, a review and analysis of literature was conducted
APA, Harvard, Vancouver, ISO, and other styles
30

Wang, Chuang, and 王闖. "An OpenFlow-based Collaborative Intrusion Prevention System for Cloud Networking." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/50189198588330414977.

Full text
Abstract:
碩士<br>國立清華大學<br>資訊工程學系<br>102<br>Software-Defined Networking (SDN) is an emerging architecture that is ideal for the high-bandwidth, dynamic nature of today's network environments. In this architecture, the control and data planes are decoupled. Although much research has been done about how SDN can resolve some of traditional networking's most-glaring security issues, less has touched the cloud security threats, especially the issues of botnet/malware detection and in-cloud attacks. In this thesis, an intrusion prevention system for cloud networking with SDN solutions is proposed. The propose
APA, Harvard, Vancouver, ISO, and other styles
31

Le, Anh. "On Optimizing Traffic Distribution for Clusters of Network Intrusion Detection and Prevention Systems." Thesis, 2008. http://hdl.handle.net/10012/3949.

Full text
Abstract:
To address the overload conditions caused by the increasing network traffic volume, recent literature in the network intrusion detection and prevention field has proposed the use of clusters of network intrusion detection and prevention systems (NIDPSs). We observe that simple traffic distribution schemes are usually used for NIDPS clusters. These schemes have two major drawbacks: (1) the loss of correlation information caused by the traffic distribution because correlated flows are not sent to the same NIDPS and (2) the unbalanced loads of the NIDPSs. The first drawback severely affects the a
APA, Harvard, Vancouver, ISO, and other styles
32

Chen, Chih-Di, and 陳智迪. "A Stateful and Flow-Based Intrusion Prevention System for Email Applications." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/34303100233263168494.

Full text
Abstract:
碩士<br>國立中正大學<br>電機工程所<br>95<br>Recently years, an email has become more important communication for most users over Internet. As this popularity for emails, there are many email attackers who abuse emails to launch SMTP attacks and Spam mails to receivers.Although some technical countermeasures against SMTP attacks and Spam mails are proposed respectively, there is not an approach to prevent Spam mails as well as SMTP attack effectively. These proposed security technologies usually aim at signal threat so that it lack for an integral security technology to defend these problems. In order to
APA, Harvard, Vancouver, ISO, and other styles
33

Lin, Jung-Feng, and 林峻鋒. "A High-Performance Dependable Network Intrusion Prevention System with Adaptive Clustering." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/04439448434922383884.

Full text
Abstract:
碩士<br>國立臺灣大學<br>電機工程學研究所<br>95<br>Security has become a big issue for all organizations in today''s network environ-ment. More and more systems have been developed to secure the network infrastructure and communication over the Internet. Network intrusion prevention system (NIPS) is a kind of security system which can perform deeply content inspection and block the sus-pected packets. The demand for high performance NIPS is driven by the growing bandwidth available and the more complex packet inspection. In this thesis, we propose a clustering scheme by aggregating several devices to provide h
APA, Harvard, Vancouver, ISO, and other styles
34

Chen, Ming-Jen, and 陳明仁. "Architecture Design of Multi-layer Intrusion Prevention System for Internet Applications." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/34550072115568782502.

Full text
Abstract:
博士<br>國立中正大學<br>電機工程研究所<br>103<br>The popularity of mobile device makes the management of information security a blind spot and more complexity. Traditional firewall is not applicable against wide variety of cyber attacks. Intrusion Prevention System (IPS) is used to supports both diversity attack detection and high processing performance. There are three major intrusion detection methodologies: Signature-based Detection (SD), Statistical Anomaly-based Detection (SAD) and Stateful Protocol Anomaly Detection (SPAD). Each of methodologies has its own advantages, but it only detects a single type
APA, Harvard, Vancouver, ISO, and other styles
35

Lin, Jung-Feng. "A High-Performance Dependable Network Intrusion Prevention System with Adaptive Clustering." 2007. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-1907200716052000.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

LIN, JHIH-REN, and 林志仁. "Deep Learning Approach for SDN-based Intrusion Detection and Prevention System." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/td4888.

Full text
Abstract:
碩士<br>國立臺中教育大學<br>資訊工程學系<br>106<br>In recent years, Software Defined Network (SDN) has been widely used in cloud computing and will be adopted in 5G. In the past, when the traditional network needs to change settings, it is necessary to modify the network deviece individually and quite time-consuming. SDN separate the control plane and the data plane in the network and it uses a centralized management method to mange network devices. Through the SDN Controller, network administrator can easily managent network and settings network devices. In the SDN, OpenFlow Controller focuses on the operat
APA, Harvard, Vancouver, ISO, and other styles
37

Soares, João Pedro dos Santos. "Implementation of a distributed intrusion detection and reaction system." Master's thesis, 2016. http://hdl.handle.net/10316/99196.

Full text
Abstract:
Relatório Final Estágio do Mestrado Engenharia Informática apresentado à Faculdade de Ciências e Tecnologia da Universidade de Coimbra.<br>Security was not always an important aspect in terms of networking and hosts. Nowadays, it is absolutely mandatory. Security measures must make an e ort to evolve at the same rate, or even at a higher rate, than threats, which is proving to be the most di cult of tasks. In this report we will detail the process of the implementation of a real distributed intrusion detection and reaction system, that will be responsible for securing a core set of networ
APA, Harvard, Vancouver, ISO, and other styles
38

Chao, Pao-Yin, and 趙伯尹. "Distributed Intrusion Detection and Prevention System- A Case Study on XSS Attacks." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/02464494693925971053.

Full text
Abstract:
碩士<br>國防管理學院<br>國防資訊研究所<br>96<br>As Internet grown rapid popularity, both government agencies and private companies have set up web sites to provide information or Q&A on its Web site. Because personal website in order to highlight its characteristics and their personal styles then the kind of site has continued increase. Some web design has not only been done in accordance with the principles of safety certification but also in order to make their own service program open that makes malicious users have the opportunity to tamper with the page. Cross-site scripting draw the most attention acc
APA, Harvard, Vancouver, ISO, and other styles
39

Liu, Jiamn-Der, and 劉建德. "The Design and Implementation of Peer to Peer Network Intrusion Prevention System." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/93150005233765452414.

Full text
Abstract:
碩士<br>國立交通大學<br>理學院碩士在職專班網路學習學程<br>97<br>P2P(Peer to Peer)applications have emerged since late 1990s. However, the widespread adoption of P2P applications lately have accounted for some concerns about information security, such as copyright、bandwidth、virus、individual privacy and so on. In 2008, Ministry of Education in Taiwan composed an official document, which stated schools at all levels should forbid the illegal usage of P2P file transfer. However, since P2P applications used dynamic ports in a large amount and thus the traditional Layer3 firewalls were unable to block them. To resolv
APA, Harvard, Vancouver, ISO, and other styles
40

Su, Yanlin, and 蘇延麟. "Pipelined Pattern Matching Chip Design for Network Intrusion Detection and Prevention System." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/75270057616839466661.

Full text
Abstract:
碩士<br>國立中正大學<br>電機工程研究所<br>99<br>The development of network is growing up quickly that accompanied by the many applications and many attacks. For the reason, it is necessary to establish the intrusion detection and prevention systems on the router or switch that can detect and prevent the network intrusions in the large scale institutions. If the speed of intrusion detection and prevention system is not faster than or equal to line rate, it is become to the bottleneck of network bandwidth. In this thesis, we proposed an intrusion detection and prevention system. It is a hardware software co-de
APA, Harvard, Vancouver, ISO, and other styles
41

Wang, Jian-Kai, and 王建凱. "Design and Implementation of an Intrusion Prevention System for Virtual Execution Environment." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/20456052203047062080.

Full text
Abstract:
碩士<br>長庚大學<br>資訊工程學系<br>102<br>With the progress of computer and internet technology, more persons and companies tend to store important information and files in remote computer servers. The information security issue has become increasingly important as well. As network attack events occur often around the world in recent years, the intrusion detection system has also become an important research topic in information security technology. The virtualization technology allows a physical machine to run multiple operating systems concurrently, each in its own virtual machine (VM). The virtual mac
APA, Harvard, Vancouver, ISO, and other styles
42

Wang, You Chi, and 王宥棋. "A Kernel-Level Intrusion Detection and Prevention System With High Flexibility and Extensibility." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/88659851957458447441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Chen, Yang-Sheng, and 陳陽昇. "The Study on the Reaction Mechanisms of a Kernel-level Intrusion Prevention System." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/29836626895994574831.

Full text
Abstract:
碩士<br>國立暨南國際大學<br>資訊管理學系<br>104<br>The progress of the network technology makes our life more convenient. More and more enterprises transmit information or data through the network. Information security thus has become an important issue. As the advance of the network technology, the hackers also expand their hacking skills so that they attack servers or systems in multiple ways. To protect computer systems from hackers’ intrusion, the common way is to deploy the Intrusion Detection System (IDS) which is a network-based security detection system for detecting network attacks. Based on IDS, the
APA, Harvard, Vancouver, ISO, and other styles
44

Huang, Guo rui, and 黃國睿. "On the design of Network Intrusion Prevention System based on Multi-core Platform." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/30922947630389186445.

Full text
Abstract:
碩士<br>國立清華大學<br>通訊工程研究所<br>95<br>As the types of attacks have increased noticeably, network security devices are more and more important in recent years. However, the growth rate of network bandwidth has been greater than that of processors’ performance. Even the most powerful general processors are not able to process packets at multiple gigabit wire speed. Consequently, it is desired to design next generation network systems for processing packets in parallel based on multi-processor platforms. In this thesis, a novel software architecture is proposed to enhance the performance of Network In
APA, Harvard, Vancouver, ISO, and other styles
45

Lin, Kai-Hsun, and 林楷勛. "Intrusion Prevention System Suitable for Protecting Application Servers from Distributed Denial of Service Attacks." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/03795956180412960338.

Full text
Abstract:
碩士<br>國立清華大學<br>資訊系統與應用研究所<br>92<br>Dos means that the hacker attempts to degrade the service offered to normal end users. In general, The Dos can be separated in three main types. 1) Exploiting the loophole of system to destroy the whole System. 2) Exploiting the weakness of protocol to block normal users. 3) Using large throughput to make the server hard to service normal users’ request. Above three types, exploiting the weakness of protocol is the hardest to defense. TCP SYN flooding attack is a well-known denial of service (DoS) attack that exploits TCP three-way handshake vulnerability. R
APA, Harvard, Vancouver, ISO, and other styles
46

Tseng, Tsan-Yi, and 曾寁逸. "A study on the key factors of the Intrusion Prevention System based on AHP." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/h322mn.

Full text
Abstract:
碩士<br>國立屏東科技大學<br>資訊管理系所<br>106<br>To confront the present network environmental development and the growing threat of hacking skills, enterprises usually set up an Intrusion Prevention System (IPS) to enhance their protection capabilities.However, which functions and effectiveness are the truly important and necessary reference values, enterprises often make difficult choices in terms of evaluation and selection. Therefore, the purpose of this research is to approach the key factors of Intrusion Prevention System. In this research we make an approach to the key factors of IPS and the structur
APA, Harvard, Vancouver, ISO, and other styles
47

Tzeng-Yu, Chen. "An Effective Intrusion Prevention System to Protect Multi-Services against TCP SYN Flooding DDoS Attacks." 2006. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0016-1303200709313176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Tsao, Er-Kai, and 曹爾凱. "The Design and Implementation of a SIP-Aware Intrusion Prevention System on IXP Network Processor." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/71163787738480819203.

Full text
Abstract:
碩士<br>國立中正大學<br>通訊工程研究所<br>93<br>With the advantage of scalability, extensibility and interoperability, SIP not only can provide VoIP service but also provide integrated multimedia communication services. Though SIP-based Peer-to-Peer (P2P) applications (such as Instant Message, Real-Time Presence and IP Telephony) are getting more popular than before and become critical to businesses, they face serious security problems. According to the report of Gartner Group, over 75% of hackers’ attacks occur on the application layer (the seventh layer of OSI model) and each successful invasion results in
APA, Harvard, Vancouver, ISO, and other styles
49

Chen, Tzeng-Yu, and 陳宗右. "An Effective Intrusion Prevention System to Protect Multi-Services against TCP SYN Flooding DDoS Attacks." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/36453050738828817765.

Full text
Abstract:
碩士<br>國立清華大學<br>資訊工程學系<br>94<br>In recent years, DDoS attacks occur frequently and cause a great deal of damage to enterprises that provide network services. With the growth of the network, almost every enterprise provides more and more services on the network, like Web service, Mail service, Ftp service, and so on. If these services suffer the DDoS attack, it will cause great losses to the enterprise. The famous type of the DDoS attack is TCP SYN flooding attack and it is based on the vulnerability of the TCP three-way handshake. The firewall and intrusion detection system are not effectively
APA, Harvard, Vancouver, ISO, and other styles
50

SYU, CHAO-WEI, and 許朝瑋. "A Deep Learning Based Real-Time Intrusion Detection and Prevention System for Software Defined Networks." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/2puu8a.

Full text
Abstract:
碩士<br>國立臺中教育大學<br>資訊工程學系<br>107<br>Software Defined Networks (SDN) is the current network trend. It will become the main network architecture in the future. SDN divides the network into the control plane and data plane. SDN can flexibly adjust the network topology with controller by centralized management, but also brings on new network threats. The SDN Switches and Contoller cannot provide service because of the SDN switches sends the SDN Contoller a large number of packets that use to establish routes when Distributed Denial-of-Service attack occured. The SDN cannot prevent an attacker from
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!