To see the other types of publications on this topic, follow the link: Network Intrusion Prevention.

Dissertations / Theses on the topic 'Network Intrusion Prevention'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 39 dissertations / theses for your research on the topic 'Network Intrusion Prevention.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Stefanova, Zheni Svetoslavova. "Machine Learning Methods for Network Intrusion Detection and Intrusion Prevention Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7367.

Full text
Abstract:
Given the continuing advancement of networking applications and our increased dependence upon software-based systems, there is a pressing need to develop improved security techniques for defending modern information technology (IT) systems from malicious cyber-attacks. Indeed, anyone can be impacted by such activities, including individuals, corporations, and governments. Furthermore, the sustained expansion of the network user base and its associated set of applications is also introducing additional vulnerabilities which can lead to criminal breaches and loss of critical data. As a result, t
APA, Harvard, Vancouver, ISO, and other styles
2

Tevemark, Jonas. "Intrusion Detection and Prevention in IP Based Mobile Networks." Thesis, Linköping University, Department of Electrical Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-12015.

Full text
Abstract:
<p>Ericsson’s Packet Radio Access Network (PRAN) is a network solution for packet transport in mobile networks, which utilizes the Internet Protocol (IP). The IP protocol offers benefits in responsiveness and performance adaptation to data bursts when compared to Asynchronous Transfer Mode (ATM), which is still often used. There are many manufacturers / operators providing IP services, which reduce costs. The IP’s use on the Internet brings greater end-user knowledge, wider user community and more programs designed for use in IP environments. Because of this, the spectrum of possible attacks
APA, Harvard, Vancouver, ISO, and other styles
3

Jarvis, Keagan. "Network intrusion prevention in the evolved packet core utilising software defined networks and network function virtualisation." Master's thesis, Faculty of Engineering and the Built Environment, 2019. http://hdl.handle.net/11427/31462.

Full text
Abstract:
Mobile Networks (MNs) are fundamental infrastructures in modern life. As traffic volumes rise and subscriber needs are expanding, MNOs need to adapt in order to keep up with the demand. This has led to MNOs virtualising the Core Network (CN) by utilising Software Defined Networking (SDN) and Network Functions Virtualisation(NFV). The security and reliability of the MN are under higher levels of scrutiny as more traffic and subscribers make use of the MN. As MNs become more popular so do they become more enticing for malicious actors as targets for attacks. The virtualisation of the CN has led
APA, Harvard, Vancouver, ISO, and other styles
4

Dubell, Michael, and David Johansson. "Nätverkssäkerhet med IPS : Förbättrad nätverkssäkerhet med Intrusion Prevention Systems." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23347.

Full text
Abstract:
Att skydda sin IT-miljö mot olika typer av intrång och attacker som till exempel trojaner,skadliga Java applets eller DoS attacker med hjälp av brandväggar och antivirusprogramär två viktiga lager i skalskyddet. I den här uppsatsen undersöks hur väl ett Intrusion Prevention System skulle kunna fungera som ett ytterligare lager i skalskyddet. Fokus ligger på hur väl IPS-systemet klarar av att avvärja attacker, hur mycket tid som går åt till konfigurering och drift för att få ett fungerande IPS samt hur prestandan i nätverket påverkas av implementationen. För att mäta hur väl IPS systemet klarar
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Tao. "RADAR: compiler and architecture supported intrusion prevention, detection, analysis and recovery." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-08042006-122745/.

Full text
Abstract:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2007.<br>Ahamad, Mustaque, Committee Member ; Pande, Santosh, Committee Chair ; Lee, Wenke, Committee Member ; Schwan, Karsten, Committee Member ; Yang, Jun, Committee Member.
APA, Harvard, Vancouver, ISO, and other styles
6

Bul'ajoul, W. A. A. A. "Performance of network intrusion detection and prevention systems in highspeed environments." Thesis, Coventry University, 2017. http://curve.coventry.ac.uk/open/items/f3dfcb2a-df8a-4908-9202-e0ed758f86b2/1.

Full text
Abstract:
Due to the numerous and increasingly malicious attacks on computer networks and systems, current security tools are often not enough to resolve the issues related to illegal users, reliability, and to provide robust network security. Recent research has indicated that although network security has developed, a major concern about an increase in illegal intrusions is still occurring. Addressing security on every occasion or in every place is a really important and sensitive matter for many users, businesses, governments and enterprises. A Network Intrusion Detection and Prevention System (NIDPS
APA, Harvard, Vancouver, ISO, and other styles
7

Sahin, Umit Burak. "A New Approach For The Scalable Intrusion Detection In High-speed Networks." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12609053/index.pdf.

Full text
Abstract:
As the networks become faster and faster, the emerging requirement is to improve the performance of the Intrusion Detection and Prevention Systems (IDPS) to keep up with the increased network throughput. In high speed networks, it is very difficult for the IDPS to process all the packets. Since the throughput of IDPS is not improved as fast as the throughput of the switches and routers, it is necessary to develop new detection techniques other than traditional techniques. In this thesis we propose a rule-based IDPS technique to detect Layer 2-4 attacks by just examining the flow data without i
APA, Harvard, Vancouver, ISO, and other styles
8

Cheng, Kah Wai. "Distributed deployment of Therminators in the network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FCheng%5Kah.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pagna, Disso Jules F. "A novel intrusion detection system (IDS) architecture. Attack detection based on snort for multistage attack scenarios in a multi-cores environment." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5248.

Full text
Abstract:
Recent research has indicated that although security systems are developing, illegal intrusion to computers is on the rise. The research conducted here illustrates that improving intrusion detection and prevention methods is fundamental for improving the overall security of systems. This research includes the design of a novel Intrusion Detection System (IDS) which identifies four levels of visibility of attacks. Two major areas of security concern were identified: speed and volume of attacks; and complexity of multistage attacks. Hence, the Multistage Intrusion Detection and Prevention
APA, Harvard, Vancouver, ISO, and other styles
10

Pagna, Disso Jules Ferdinand. "A novel intrusion detection system (IDS) architecture : attack detection based on snort for multistage attack scenarios in a multi-cores environment." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5248.

Full text
Abstract:
Recent research has indicated that although security systems are developing, illegal intrusion to computers is on the rise. The research conducted here illustrates that improving intrusion detection and prevention methods is fundamental for improving the overall security of systems. This research includes the design of a novel Intrusion Detection System (IDS) which identifies four levels of visibility of attacks. Two major areas of security concern were identified: speed and volume of attacks; and complexity of multistage attacks. Hence, the Multistage Intrusion Detection and Prevention System
APA, Harvard, Vancouver, ISO, and other styles
11

Militelli, Leonardo Cavallari. "Proposta de um agente de aplicação para detecção, prevenção e contenção de ataques em ambientes computacionais." Universidade de São Paulo, 2006. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-13032007-152557/.

Full text
Abstract:
Canais seguros, como os gerados pelos protocolos SSL e TLS, são cada vez mais utilizados nos serviços de rede para propiciar autenticação de parceiro, integridade e sigilo dos dados. Porém, sua utilização impede que um sistema de detecção de intrusão de rede possa observar o conteúdo dos pacotes, impossibilitando a análise das mensagens. Como alternativa de contorno deste problema é proposta a arquitetura de um agente de detecção, prevenção e contenção de ataques baseado em aplicação, que possibilite interceptar fluxos de mensagens diretamente na aplicação, inserido no contexto de uma arquitet
APA, Harvard, Vancouver, ISO, and other styles
12

Labbe, Keith G. "Evaluation of two host-based intrusion prevention systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FLabbe.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Tamagna-Darr, Lucas. "Evaluating the effectiveness of an intrusion prevention system-honeypot hybrid /." Online version of thesis, 2009. http://hdl.handle.net/1850/10837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Nadeem, Adnan. "Intrusion detection & prevention mechanism for mobile ad hoc networks." Thesis, University of Surrey, 2010. http://epubs.surrey.ac.uk/804654/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Butun, Ismail. "Prevention and Detection of Intrusions in Wireless Sensor Networks." Scholar Commons, 2013. http://scholarcommons.usf.edu/etd/4449.

Full text
Abstract:
Wireless Sensor Networks (WSNs) continue to grow as one of the most exciting and challenging research areas of engineering. They are characterized by severely constrained computational and energy resources and also restricted by the ad-hoc network operational environment. They pose unique challenges, due to limited power supplies, low transmission bandwidth, small memory sizes and limited energy. Therefore, security techniques used in traditional networks cannot be directly adopted. So, new ideas and approaches are needed, in order to increase the overall security of the network. Security appl
APA, Harvard, Vancouver, ISO, and other styles
16

Sikora, Marek. "Detekce slow-rate DDoS útoků." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-317019.

Full text
Abstract:
This diploma thesis is focused on the detection and protection against Slow DoS and DDoS attacks using computer network traffic analysis. The reader is introduced to the basic issues of this specific category of sophisticated attacks, and the characteristics of several specific attacks are clarified. There is also a set of methods for detecting and protecting against these attacks. The proposed methods are used to implement custom intrusion prevention system that is deployed on the border filtering server of computer network in order to protect Web servers against attacks from the Internet. Th
APA, Harvard, Vancouver, ISO, and other styles
17

Smith, Jason. "Denial of service : prevention, modelling and detection." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16392/1/Jason_Smith_Thesis.pdf.

Full text
Abstract:
This research investigates the denial of service problem, in the context of services provided over a network, and contributes to improved techniques for modelling, detecting, and preventing denial of service attacks against these services. While the majority of currently employed denial of service attacks aim to pre-emptively consume the network bandwidth of victims, a significant amount of research effort is already being directed at this problem. This research is instead concerned with addressing the inevitable migration of denial of service attacks up the protocol stack to the application l
APA, Harvard, Vancouver, ISO, and other styles
18

Smith, Jason. "Denial of service : prevention, modelling and detection." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16392/.

Full text
Abstract:
This research investigates the denial of service problem, in the context of services provided over a network, and contributes to improved techniques for modelling, detecting, and preventing denial of service attacks against these services. While the majority of currently employed denial of service attacks aim to pre-emptively consume the network bandwidth of victims, a significant amount of research effort is already being directed at this problem. This research is instead concerned with addressing the inevitable migration of denial of service attacks up the protocol stack to the application l
APA, Harvard, Vancouver, ISO, and other styles
19

Alqallaf, Maha. "Software Defined Secure Ad Hoc Wireless Networks." Wright State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=wright1464020851.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Chung, Pak Ho. "Collaborative intrusion prevention." 2009. http://hdl.handle.net/2152/7581.

Full text
Abstract:
Intrusion Prevention Systems (IPSs) have long been proposed as a defense against attacks that propagate too fast for any manual response to be useful. While purely-network-based IPSs have the advantage of being easy to install and manage, research have shown that this class of systems are vulnerable to evasion [70, 65], and can be tricked into filtering normal traffic and create more harm than good [12, 13]. Based on these researches, we believe information about how the attacked hosts process the malicious input is essential to an effective and reliable IPS. In existing IPSs, honeypots are us
APA, Harvard, Vancouver, ISO, and other styles
21

Guo, Jia-Sin, and 郭佳鑫. "Network intrusion and prevention strategies investigate in E-commerce." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/97141177987231881209.

Full text
Abstract:
碩士<br>朝陽科技大學<br>工業工程與管理系<br>102<br>E-commerce has brought many advantages and convenience, but also brought a lot of impact and distress on society. Safety reliability of network technology has been doubted, because the abuse of negative users by using operations such as: Program viruses, hackers, Trojans, worms, etc. This study explored the existing e-invasive methods such as: denial of service attacks, distributed denial of service attacks, computer viruses, violent attacks, listens to obtain account passwords, web counterfeit, fake host malicious Insiders, and malicious users. Intrusion
APA, Harvard, Vancouver, ISO, and other styles
22

Chen, Meng-Jhih, and 陳孟志. "Network Intrusion Detection and Prevention System by Parallel Matching." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/17697990647085652914.

Full text
Abstract:
碩士<br>國立中正大學<br>電機工程研究所<br>101<br>The development of network is growing up quickly that accompanied by the many applications and many attacks. For the reason, it is necessary to establish the intrusion detection and prevention systems on the router or switch that can detect and prevent the network intrusions in the large scale institutions. With the increase network bandwidth and the variety of the attack from Internet hacker, the request of the intrusion detection is becoming heavier. Therefore, it is a crucial topic of how to create high efficient intrusion detection and prevention. We desig
APA, Harvard, Vancouver, ISO, and other styles
23

Ou, Tsung-Fu, and 歐淙富. "The Study on Improving the Intrusion Prevention of Network Security." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/57027721427658796762.

Full text
Abstract:
碩士<br>國防大學理工學院<br>資訊工程碩士班<br>102<br>With the population of using Internet growing year by year, the attacks of Internet also grows. The Distributed Denial-of-Service(DDoS) attack is one of the threats in network security. To ensure the network security of enterprises, building an intrusion prevention system is necessary. Since the rise of open-source software and its customizable function, Snort becomes more and more popular. Snort plays as an intrusion detection role mostly, generates alerts while attacks occur, and notify the manager or SIEM device. But it can’t block the sources of atta
APA, Harvard, Vancouver, ISO, and other styles
24

Lin, Jung-Feng, and 林峻鋒. "A High-Performance Dependable Network Intrusion Prevention System with Adaptive Clustering." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/04439448434922383884.

Full text
Abstract:
碩士<br>國立臺灣大學<br>電機工程學研究所<br>95<br>Security has become a big issue for all organizations in today''s network environ-ment. More and more systems have been developed to secure the network infrastructure and communication over the Internet. Network intrusion prevention system (NIPS) is a kind of security system which can perform deeply content inspection and block the sus-pected packets. The demand for high performance NIPS is driven by the growing bandwidth available and the more complex packet inspection. In this thesis, we propose a clustering scheme by aggregating several devices to provide h
APA, Harvard, Vancouver, ISO, and other styles
25

Lin, Jung-Feng. "A High-Performance Dependable Network Intrusion Prevention System with Adaptive Clustering." 2007. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-1907200716052000.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Jheng, Sing-Ru, and 鄭幸茹. "Employing software-defined Network to strengthen the intrusion prevention security mechanism." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/sj9vvj.

Full text
Abstract:
碩士<br>淡江大學<br>資訊管理學系碩士班<br>106<br>Modern life cannot be separated from the Internet,as a result, the security of the Internet has gradually become more and more important to everyone. How to more effectively prevent malicious attacks from malicious people and reduce the losses caused by cyber attacks is a problem that many people have been trying hard to solve. Traditional networks rely on intrusion detection systems to detect malicious attacks. However, intrusion detection systems cannot adequately block the network attacks caused by these malicious individuals. In order to improve the shortc
APA, Harvard, Vancouver, ISO, and other styles
27

Le, Anh. "On Optimizing Traffic Distribution for Clusters of Network Intrusion Detection and Prevention Systems." Thesis, 2008. http://hdl.handle.net/10012/3949.

Full text
Abstract:
To address the overload conditions caused by the increasing network traffic volume, recent literature in the network intrusion detection and prevention field has proposed the use of clusters of network intrusion detection and prevention systems (NIDPSs). We observe that simple traffic distribution schemes are usually used for NIDPS clusters. These schemes have two major drawbacks: (1) the loss of correlation information caused by the traffic distribution because correlated flows are not sent to the same NIDPS and (2) the unbalanced loads of the NIDPSs. The first drawback severely affects the a
APA, Harvard, Vancouver, ISO, and other styles
28

Liu, Jiamn-Der, and 劉建德. "The Design and Implementation of Peer to Peer Network Intrusion Prevention System." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/93150005233765452414.

Full text
Abstract:
碩士<br>國立交通大學<br>理學院碩士在職專班網路學習學程<br>97<br>P2P(Peer to Peer)applications have emerged since late 1990s. However, the widespread adoption of P2P applications lately have accounted for some concerns about information security, such as copyright、bandwidth、virus、individual privacy and so on. In 2008, Ministry of Education in Taiwan composed an official document, which stated schools at all levels should forbid the illegal usage of P2P file transfer. However, since P2P applications used dynamic ports in a large amount and thus the traditional Layer3 firewalls were unable to block them. To resolv
APA, Harvard, Vancouver, ISO, and other styles
29

Su, Yanlin, and 蘇延麟. "Pipelined Pattern Matching Chip Design for Network Intrusion Detection and Prevention System." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/75270057616839466661.

Full text
Abstract:
碩士<br>國立中正大學<br>電機工程研究所<br>99<br>The development of network is growing up quickly that accompanied by the many applications and many attacks. For the reason, it is necessary to establish the intrusion detection and prevention systems on the router or switch that can detect and prevent the network intrusions in the large scale institutions. If the speed of intrusion detection and prevention system is not faster than or equal to line rate, it is become to the bottleneck of network bandwidth. In this thesis, we proposed an intrusion detection and prevention system. It is a hardware software co-de
APA, Harvard, Vancouver, ISO, and other styles
30

Huang, Guo rui, and 黃國睿. "On the design of Network Intrusion Prevention System based on Multi-core Platform." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/30922947630389186445.

Full text
Abstract:
碩士<br>國立清華大學<br>通訊工程研究所<br>95<br>As the types of attacks have increased noticeably, network security devices are more and more important in recent years. However, the growth rate of network bandwidth has been greater than that of processors’ performance. Even the most powerful general processors are not able to process packets at multiple gigabit wire speed. Consequently, it is desired to design next generation network systems for processing packets in parallel based on multi-processor platforms. In this thesis, a novel software architecture is proposed to enhance the performance of Network In
APA, Harvard, Vancouver, ISO, and other styles
31

Soares, João Pedro dos Santos. "Implementation of a distributed intrusion detection and reaction system." Master's thesis, 2016. http://hdl.handle.net/10316/99196.

Full text
Abstract:
Relatório Final Estágio do Mestrado Engenharia Informática apresentado à Faculdade de Ciências e Tecnologia da Universidade de Coimbra.<br>Security was not always an important aspect in terms of networking and hosts. Nowadays, it is absolutely mandatory. Security measures must make an e ort to evolve at the same rate, or even at a higher rate, than threats, which is proving to be the most di cult of tasks. In this report we will detail the process of the implementation of a real distributed intrusion detection and reaction system, that will be responsible for securing a core set of networ
APA, Harvard, Vancouver, ISO, and other styles
32

Tsao, Er-Kai, and 曹爾凱. "The Design and Implementation of a SIP-Aware Intrusion Prevention System on IXP Network Processor." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/71163787738480819203.

Full text
Abstract:
碩士<br>國立中正大學<br>通訊工程研究所<br>93<br>With the advantage of scalability, extensibility and interoperability, SIP not only can provide VoIP service but also provide integrated multimedia communication services. Though SIP-based Peer-to-Peer (P2P) applications (such as Instant Message, Real-Time Presence and IP Telephony) are getting more popular than before and become critical to businesses, they face serious security problems. According to the report of Gartner Group, over 75% of hackers’ attacks occur on the application layer (the seventh layer of OSI model) and each successful invasion results in
APA, Harvard, Vancouver, ISO, and other styles
33

"Establishing the Software-Defined Networking Based Defensive System in Clouds." Doctoral diss., 2014. http://hdl.handle.net/2286/R.I.26798.

Full text
Abstract:
abstract: Cloud computing is regarded as one of the most revolutionary technologies in the past decades. It provides scalable, flexible and secure resource provisioning services, which is also the reason why users prefer to migrate their locally processing workloads onto remote clouds. Besides commercial cloud system (i.e., Amazon EC2), ProtoGENI and PlanetLab have further improved the current Internet-based resource provisioning system by allowing end users to construct a virtual networking environment. By archiving the similar goal but with more flexible and efficient performance, I pres
APA, Harvard, Vancouver, ISO, and other styles
34

Chang, Ko-Ming, and 張格銘. "An Intrusion Prevention and Detection Approach for Clustering-Based Sensor Networks." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/95132935457470576499.

Full text
Abstract:
碩士<br>國立成功大學<br>資訊工程學系碩博士班<br>92<br>Security issues are important for the sensor network deployed in large area and automatically establishing the data route. Recently many famous clustering-based routing protocols provide energy-aware solutions for sensor network. However,the security related works are rare.   In this paper, we analyze some famous attack methods on clustering-based sensor networks and propose two methods to improve the security of sensor networks: authentication based intrusion prevention and energy saving intrusion detection mechanism. In the first method, we use two differ
APA, Harvard, Vancouver, ISO, and other styles
35

Krontiris, Ioannis [Verfasser]. "Intrusion prevention and detection in wireless sensor networks / vorgelegt von Ioannis Krontiris." 2008. http://d-nb.info/995844208/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Liu, Bang-Jheng, and 劉邦正. "An Intrusion Prevention Scheme for Wormhole Attacks in Mobile Ad Hoc Networks." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/10569044017789253921.

Full text
Abstract:
碩士<br>大葉大學<br>資訊管理學系碩士班<br>96<br>In recent years, wireless ad hoc networks is an increasingly popular topic. It is a node-to-node transmission model. The nodes communicate with each other via wireless ad hoc networks technology, and thus form wireless local area networks. Nowadays, some literature points out that this kind of framework encounters lots of security threats, such as location disclosure, routing table poisoning, wormhole attack and so on. However, the wormhole attack is a more serious threat among them because most secure route mechanisms can not effectively avoid it. This kind of
APA, Harvard, Vancouver, ISO, and other styles
37

SYU, CHAO-WEI, and 許朝瑋. "A Deep Learning Based Real-Time Intrusion Detection and Prevention System for Software Defined Networks." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/2puu8a.

Full text
Abstract:
碩士<br>國立臺中教育大學<br>資訊工程學系<br>107<br>Software Defined Networks (SDN) is the current network trend. It will become the main network architecture in the future. SDN divides the network into the control plane and data plane. SDN can flexibly adjust the network topology with controller by centralized management, but also brings on new network threats. The SDN Switches and Contoller cannot provide service because of the SDN switches sends the SDN Contoller a large number of packets that use to establish routes when Distributed Denial-of-Service attack occured. The SDN cannot prevent an attacker from
APA, Harvard, Vancouver, ISO, and other styles
38

Chieng, Kun-Lin, and 江昆霖. "Intrusion Detection Systems for Preventing Blackhole Attacks and Wormhole Attacks in Mobile Ad hoc Networks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/57877289563735684640.

Full text
Abstract:
碩士<br>銘傳大學<br>資訊工程學系碩士班<br>97<br>In all kinds of attacks in MANETs, blackhole attacks and wormhole attacks cause the greatest threat, and are very hard to predict and detect. Black hole attack is one of the big problems in Ad Hoc Networks, in which a malicious node sends a forged route reply packet to a source node that initiates the route discovery in order to deprive the route from the source node to the destination node, and then drop all data packets passed by. As to wormhole attacks, a malicious node puts the captured routing packet in a data packet payload, and uses normal nodes to trans
APA, Harvard, Vancouver, ISO, and other styles
39

Tzu-Chieh, Wei, and 魏子傑. "Design of Fault-tolerant System and Intrusion Preventive Authentication Mechanism for Data Transmission of Wireless Sensor Networks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/92026611704055865679.

Full text
Abstract:
碩士<br>國立嘉義大學<br>資訊工程學系研究所<br>98<br>The wireless sensor network is composed of hundred or even thousand mostly cheap and battery-powered embedded devices. Due to the resources of the computational ability, storage, and power of the sensor being constrained, the previous wired/wireless intrusion detection system cannot be directly applied on WSNs. Deng et al. pointed out the Path-based Denial of Service (PDoS) attacks can cause serious damage in a resource-constrained and concentrated WSNs. For example, a sensor device without security mechanism will straightforwardly deliver the messages to the
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!