Дисертації з теми "SNORD"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "SNORD".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Hebras, Jade. "Caractérisation moléculaire du petit ARN nucléolaire SNORD115 : un rôle dans la régulation de l'expression et de la fonction du récepteur à la sérotonine 5-HT2C ?" Thesis, Toulouse 3, 2020. http://www.theses.fr/2020TOU30209.
The nucleolus of mammalian cells contains hundreds of box C/D small nucleolar RNAs (SNORDs). Majority of them, guide sequence-specific 2'-O ribose methylations into ribosomal RNA (rRNA). Some of them facilitate RNA folding and cleavages of ribosomal RNA precursors or guide ribose methylations into spliceosomal small nuclear RNA U6. Recent studies propose that some SNORD could target other transcripts, possibly messenger RNA as suggested by the brain-specific SNORD115. SNORD115 is processed from tandemly repeated genes embedded in the imprinted SNURF-SNRPN domain. Defects in gene expression at this domain are causally linked to rare disease: the Prader-Willi Syndrome (PWS). Excitingly, SNORD115 displays an extensive region of complementary to a brain-specific mRNA encoding the serotonin receptor 5-HT2C. SNORD115 could influence 5-HT2C signaling by fine-tuning alternative splicing or A to I RNA editing of 5-HT2C pre-mRNA. Reduced 5-HT2C receptor activity could contribute to impaired emotional response and/or compulsive overeating that characterized the syndrome. My work was to test this hypothesis using a CRISPR/Cas9-mediated SNORD115 knockout mouse model. My results show that loss of SNORD115 expression, in vivo, does not alter the post-transcriptional regulation of 5-HT2C pre-mRNA processing. Others results from the team do not reveal any defects in anxio-depressive phenotypes and eating behaviour. Our study questions the regulatory roles of SNORD115 in brain functions and behavioural disturbance associated with PWS. On other hand, I have studied ribose methylation sites in rRNA from mouse tissues. This work was included in emerging field of the specialized ribosome hypothesis which suggests heterogeneity in ribosomes may impact activity of ribosomes. Our results show significant changes at few discrete set of sites, especially in rRNA from developing tissues. Also, rRNA from developing tissues is globally less methylated than rRNA from adult tissues. We focus on LSU-Gm4593 site because this position is specifically methylated only during development and hardly ever detected in adult tissues. Methylation at LSU-G4593 is guided by SNORD78. We propose that the expression levels of SNORD78 during development appeared to be regulated by alternative splicing of the host-gene and to correlate with the methylation level of its target site at LSU-G4593. We've used a human cell line (HEK293T) inactivated for the SNORD78 gene in order to understand the functionally role of the corresponding ribose methylation. Our work did not demonstrate any overt cellular phenotypes, even though translation fidelity and the precise function of LSU-Gm4593 remains unknown
Ringström, Saltin Markus. "Intrusion Detection Systems : utvärdering av Snort." Thesis, University of Skövde, School of Humanities and Informatics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-3081.
Det här examensarbetet undersöker effektiviteten hos ett Intrusion Detection System(IDS). Ett IDS är ett system som skall upptäcka om klienter på ett nätverk attackerasav en ”hacker” eller om någon obehörig försöker inkräkta, ungefär som en vakthund.Det IDS som testats är Snort, ett mycket populärt IDS skrivet med öppen källkod.Syftet med studien är att kunna påvisa huruvida ett IDS är ett bra komplement till ettsystems säkerhet eller inte, då det gjorts väldigt få metodiska undersökningar avSnort, och IDS i allmänhet.Den studie som gjorts utfördes med hjälp av ett antal experiment i enlaborationsmiljö, där effektiviteten hos Snort sattes på prov med hjälp av olika typerav attacker.Utifrån det resultat som uppkom så går det att konstatera att ett IDS absolut är ettkomplement värt att överväga för en organisation som är villig att ägna de resursersom systemet kräver, då ett högt antal av de utförda attackerna upptäcktes – attackersom anti-virus eller brandväggar inte är skapade för att reagera på.
Steinvall, Daniel. "Utvärdering av signaturdatabaser i systemet Snort." Thesis, Karlstads universitet, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-72581.
For many people all over the world being constantly connected to the Internet is taken for granted. The Internet connects people globally in a way that has never been possible before, which in many ways is a fantastic thing. Unfortunately, this global connection can be abused for malicious purposes which have led to the need for security solutions such as network intrusion detection systems. One prominent example of such a system is Snort which is the subject of evaluation in this thesis. This study investigates the ability of signature databases for Snort to detect cyberattacks. In total, we executed 1143 attacks released between 2008-2019 and recorded the network traffic. We then analyzed the network traffic using three versions of Snort released 2012, 2016, and 2018. For each version, we used 18 different signature databases dated 2011-2019 from three different publishers. Our results show that there are a significant difference between the different publishers’ signature databases, where the best signature database detected around 70% of the attacks and the worst only detected around 1%. The configuration of Snort also had a significant impact on the results, where Snort with the pre-processor detected about 15% more attacks than without it.
Magnusson, Jonas. "Intrångsdetekteringssystem : En jämförelse mellan Snort och Suricata." Thesis, University of Skövde, School of Humanities and Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-4401.
Arbetets syfte är att jämföra intrångsdetekteringssystemen Snort och Suricata för att ge en uppfattning om vilken av applikationerna som lämpar sig att implementeras hos en internetleverantör för att upptäcka attacker och öka säkerheten på nätverket. Jämförelsen utförs med hänseende till antal upptäckta attacker, prestanda, implementeringstid, antal konfigurationsfiler samt vilka operativsystem de finns tillgängliga på.
Resultatet visar att Suricata med sitt stöd för att använda signaturer skapade för Snort upptäcker fler attacker än Snort. Snort däremot går både smidigare och snabbare att implementera. Prestandamässigt så visar Suricata bäst resultat, genom att använda sig av flera kärnor och mindre minne.
Fleming, Theodor, and Hjalmar Wilander. "Network Intrusion and Detection : An evaluation of SNORT." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-144335.
Zhang, Huan. "Parallelization of a software based intrusion detection system - Snort." Thesis, University of Canterbury. Electrical and Computer Engineering, 2011. http://hdl.handle.net/10092/5988.
Dominguez-Camara, Rosario. "Multiparameter assessment of speech using SNORS+ with integrated EMG analysis." Thesis, University of Kent, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.418555.
Albin, Eugene. "A comparative analysis of the Snort and Suricata intrusion-detection systems." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5480.
Our research focuses on comparing the performance of two open-source intrusion-detection systems, Snort and Suricata, for detecting malicious activity on computer networks. Snort, the de-facto industry standard open-source solution, is a mature product that has been available for over a decade. Suricata, released two years ago, offers a new approach to signature-based intrusion detection and takes advantage of current technology such as process multithreading to improve processing speed. We ran each product on a multi-core computer and evaluated several hours of network traffic on the NPS backbone. We evaluated the speed, memory requirements, and accuracy of the detection engines in a variety of experiments. We conclude that Suricata will be able to handle larger volumes of traffic than Snort with similar accuracy, and thus recommend it for future needs at NPS since the Snort installation is approaching its bandwidth limits.
Kurukkankunnel, Joy Cyril, and Sherjin Dan Thomas. "A Study of Intrusion detection on PROFINET Network by Improving SNORT." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-43350.
Meyer, Steven J. "GPS Receiver Testing on the Supersonic Naval Ordnance Research Track (SNORT)." International Foundation for Telemetering, 1997. http://hdl.handle.net/10150/609808.
There is an interest in using Global Positioning System (GPS) receivers to find: Time Space Position Information (TSPI), miss distances between a missile and target, and using the data real time as an independent tracking aid for range safety. Ashtech, Inc. has several standalone GPS receivers they believe can work at high g levels. This paper investigates how the Ashtech GPS receivers work under high g loading in one axis. The telemetry system used to collect data from the receivers and the reconstruction of the data will also be discussed. The test was done at SNORT (Supersonic Naval Ordnance Research Track) located at NAWS, China Lake, CA. The g level obtained was about +23 g’s with a deceleration of -15 g’s. The velocity reached was about Mach 2.0. A summary of the errors is included.
Cavusoglu, Mustafa. "An Efficient And Fast Method Of Snore Detection For Sleep Disorder Investigation." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608236/index.pdf.
lhane Military Medical Academy Sleep Studies Laboratory. The episodes taken from 30 subjects (18 simple snorers and 12 OSA patients) with different apnea/hypopnea indices were classified using the proposed algorithm. The system was tested by using the manual annotations of an ENT specialist as a reference. The system produced high detection rates both in simple snorers and OSA patients.
Thorarensen, Christian. "A Performance Analysis of Intrusion Detection with Snort and Security Information Management." Thesis, Linköpings universitet, Databas och informationsteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177602.
Wakwella, Ajith S. "Processing of snore related sounds for the diagnosis of obstructive sleep apnoea (OSA) /." [St. Lucia, Qld.], 2005. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe18755.pdf.
Utimura, Luan Nunes. "Aplicação em tempo real de técnicas de aprendizado de máquina no Snort IDS /." São José do Rio Preto, 2020. http://hdl.handle.net/11449/192443.
Resumo: À medida que a Internet cresce com o passar dos anos, é possível observar um aumento na quantidade de dados que trafegam nas redes de computadores do mundo todo. Em um contexto onde o volume de dados encontra-se em constante renovação, sob a perspectiva da área de Segurança de Redes de Computadores torna-se um grande desafio assegurar, em termos de eficácia e eficiência, os sistemas computacionais da atualidade. Dentre os principais mecanismos de segurança empregados nestes ambientes, destacam-se os Sistemas de Detecção de Intrusão em Rede. Muito embora a abordagem de detecção por assinatura seja suficiente no combate de ataques conhecidos nessas ferramentas, com a eventual descoberta de novas vulnerabilidades, faz-se necessário a utilização de abordagens de detecção por anomalia para amenizar o dano de ataques desconhecidos. No campo acadêmico, diversos trabalhos têm explorado o desenvolvimento de abordagens híbridas com o intuito de melhorar a acurácia dessas ferramentas, com o auxílio de técnicas de Aprendizado de Máquina. Nesta mesma linha de pesquisa, o presente trabalho propõe a aplicação destas técnicas para a detecção de intrusão em um ambiente tempo real mediante uma ferramenta popular e amplamente utilizada, o Snort. Os resultados obtidos mostram que em determinados cenários de ataque, a abordagem de detecção baseada em anomalia pode se sobressair em relação à abordagem de detecção baseada em assinatura, com destaque às técnicas AdaBoost, Florestas Aleatórias, Árvor... (Resumo completo, clicar acesso eletrônico abaixo)
Abstract: As the Internet grows over the years, it is possible to observe an increase in the amount of data that travels on computer networks around the world. In a context where data volume is constantly being renewed, from the perspective of the Network Security area it becomes a great challenge to ensure, in terms of effectiveness and efficiency, today’s computer systems. Among the main security mechanisms employed in these environments, stand out the Network Intrusion Detection Systems. Although the signature-based detection approach is sufficient to combat known attacks in these tools, with the eventual discovery of new vulnerabilities, it is necessary to use anomaly-based detection approaches to mitigate the damage of unknown attacks. In the academic field, several works have explored the development of hybrid approaches in order to improve the accuracy of these tools, with the aid of Machine Learning techniques. In this same line of research, the present work proposes the application of these techniques for intrusion detection in a real time environment using a popular and widely used tool, the Snort. The obtained results shows that in certain attack scenarios, the anomaly-based detection approach may outperform the signature-based detection approach, with emphasis on the techniques AdaBoost, Random Forests, Decision Tree and Linear Support Vector Machine.
Mestre
Nadji, Al-Husein, and Hgi Haval Sarbast. "Bearbetningstid och CPU-användning i Snort IPS : En jämförelse mellan ARM Cortex-A53 och Cortex-A7." Thesis, Tekniska Högskolan, Jönköping University, JTH, Datateknik och informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-50899.
The purpose of this study is to examine how the processing time of the Snort intrusion prevention system varies on two different processors; ARM Cortex-A53 and CortexA7. CPU usage was also examined to check if processing time depends on how much CPU Snort uses. This study will provide knowledge about how important a processor is for Snort to be able to perform well in terms of processing time and CPU usage. This knowledge will help choosing between Cortex-A53 and Cortex-A7 when implementing Snort IPS. To achieve the purpose of the study a literature search has been done to design an experimental environment. Snort can be classified as CPU-bound, which means that the system is dependent on a fast processor. In this context, a fast processor means that Snort is given enough time to process the amount of traffic it receives, otherwise the traffic can pass through without it being inspected, which can be harmful to the device that is protected by Snort. The results of the study show that the processing time in Snort on Cortex-A53 and Cortex-A7 differs and an obvious difference in CPU usage between the processors is shown. The study also presents the connection between processing time and CPU usage for Snort. In conclusion, ARM Cortex-A53 has better performance when using Snort IPS in terms of processing time and CPU usage, Cortex-A53 has 10 seconds less processing time and uses 2,87 times less CPU.
Sharp, Paul Dean. "An instrument for the multiparameter assessment of speech." Thesis, University of Kent, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.344150.
Aussibal, Julien. "Rsids : un IDS distribué basé sur le framework CVSS." Pau, 2009. http://www.theses.fr/2009PAUU3044.
Intrusion detection is a method that ensures the availability concept in systems and computer networks. This availability is generally undermined by various anomalies. These anomalies can be caused either legitimately unintended result has operations working on these systems (broken link, traffic, or. . . ), so illegitimate with malicious operations designed to undermine the availability of these systems. The implementation of these various anomalies detection tools, such as IDS (Intrusion Detection System), contribute to early identification of these anomalies and to block them. This thesis has enabled us to develop a new generation platform to generate legitimate and illegitimate anomalies. This work was carried out under the project METROSEC. This platform has enabled us to obtain various traffic captures containing these anomalies. The various illegimitate anomalies were performed with classic tools to make Denial of Service like TFN2k or Trinoo. Legitimate Anormalies were also conducted with flash crowd phenomenon. All these catch real traffic were used in further research on intrusion detection for the evaluation of new methods of detection. In a second part, the implementation of a new detection tool seems necessary to improve the quality of detection of these anomalies. This new distributed IDS, called RSIDS (Risk Scored Intrusion Detection System), will retrieve the results of a multitude of heterogeneous probes. The use of probes will remove the risk of false alarms. Indeed, a probe is not able to detect all anomalies that occur on a system or network. Each alert provided by its probes will be evaluated according to their degree of dangerousness. The assessment of dangerousness based on the framework CVSS (Common Vulnerability Scoring System)
Černý, Michal. "Systémy detekce a prevence průniku." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218240.
Dubell, Michael, and David Johansson. "Nätverkssäkerhet med IPS : Förbättrad nätverkssäkerhet med Intrusion Prevention Systems." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23347.
Nwosu, Ikechukwu C. "Intrustion Detection in Soho Networks using Elasticsearch SIEM." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1627662698171667.
Pettersson, Mattias. "Detektering av långsam portskanning i realtidssystem." Thesis, Högskolan Dalarna, Datateknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:du-25550.
In this report I describe my investigation of a method for slow port scanning detec-tion in a real-time analysis system. Port scanning is used as a reconnaissance technique used by perpetrators in the IT world. It is used to form an idea of any vulnerabilities that may exist in a network. Slow port scanning is used to try to bypass detection systems and thus able to per-form a scan without being detected. Slow port scanning detection may be resource-intensive for the computer memory since a large buffer is traditionally established to analyze network traffic over a longer period of time. There are also solutions that analyze netflow data, which provides less information and is unable to detect port scanning in real time. I have created a detection system where I investigate the possibility of using data-base in order to detect slow port scanning. The method is part of a system that ana-lyzes real-time packages. The result is a program is capable of doing just that. It detects regular port scan attacks in real time and slow attacks through presentation of the database.
Guerra, Flávia Corrêa. "Prevalência de sintomas de apneia obstrutiva do sono em adultos em uma cidade do sul do Brasil." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2016. http://hdl.handle.net/10183/150731.
This observational cross-sectional study was conducted to determine the prevalence of symptoms related to obstructive sleep apnea in a group of patients attending Clínicas Integradas da Universidade do Extremo Sul Catarinense Ambulatory, a secondary ambulatory, in Criciuma, Brazil. Inclusion criteria was age 18 years or older. 101 patients were interviewed, and it were apllied questions related to obstructive apnea symptoms, previously validated in the PLATINO study and Epworth Sleepiness Scale. The sample was compounded by 73 (72,3%) women. 47 (48,6%) individuals were between 40 and 59 years old. Snores were present in 65 (64,4%) patients and 20 (19,8%) referred witnessed apneas during sleep. Thirty one (30,7%)of the participants said their physician have ever asked about sleep. The result on Epworth Sleepiness Scale was greater than 10 in 14 (13,9%) individuals. There was a significant relation between snore, witnessed apneas and Epworth Sleepiness Scale results greater than 10 in males (p<0,01). The prevalence of obstructive sleep apnea symptoms are high in this population, but Epworth Sleepiness Scale values are low. Besides, physicians still don’t ask much about sleep.
Pagna, Disso Jules Ferdinand. "A novel intrusion detection system (IDS) architecture : attack detection based on snort for multistage attack scenarios in a multi-cores environment." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5248.
Pagna, Disso Jules F. "A novel intrusion detection system (IDS) architecture. Attack detection based on snort for multistage attack scenarios in a multi-cores environment." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5248.
Costa, Nilson Santos. "Proteção de sistemas elétricos considerando aspectos de segurança da rede de comunicação." Universidade de São Paulo, 2007. http://www.teses.usp.br/teses/disponiveis/18/18133/tde-28082007-155730/.
Modern world is more connected each day by all technological means available. This allows more people to communicate, turning the virtual communication road obligatory to the survival of small, medium and large companies, whether public or private. The great technological advance of the 20th century was the large use of the PCs (personal computer), usually called microcomputers. This advance also reached the power electric systems with the digitalization of the substations. These digitalized substations, run the risk of cybernetic invasion, internal or even external. Although the possibility of external cybernetic invasion is small, it exists. In that context, the present thesis proposes the application of a security system for an electric power system. The focus will be the study of intruder detection systems (IDS), on its two basic forms: the IDS by abuse and the IDS by anomaly, using artificial neural networks. These concepts will be tested in a simulated electric power system, with a communication network based on microcomputers, with actual digital relays with the digitalization of the substations.
Ivvala, Avinash Kiran. "Assessment of Snort Intrusion Prevention System in Virtual Environment Against DoS and DDoS Attacks : An empirical evaluation between source mode and destination mode." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14056.
Afzal, Zeeshan. "Towards Secure Multipath TCP Communication." Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-48172.
Multipath TCP (MPTCP) is an extension to standard TCP that is close to being standardized. The design of the protocol is progressing, but most of the focus has so far been on its compatibility. The security aspect is confined to making sure that the MPTCP protocol itself offers the same security level as standard TCP. The topic of this thesis is to investigate the unexpected security implications raised by using MPTCP in a traditional networking environment. Today, the security middleboxes make use of different assumptions that may not be true anymore with the advent of MPTCP.We investigate how practical it is to evade a security middlebox by fragmenting and sending traffic across multiple paths using MPTCP. Realistic attack traffic generated from a tool that is also presented in this thesis is used to show that these attacks are feasible. We then go on to propose possible solutions to detect such attacks and implement them in an MPTCP proxy. The proxy aims to extend secure MPTCP performance advantages. We also investigate the MPTCP scenario where security middleboxes can only observe some of the traffic. We propose and implement an algorithm to perform intrusion detection in such situations and achieve a high detection accuracy.
HITS
Fernandez, Maria del Mar, and Ignacio Porres. "An Evaluation of current IDS." Thesis, Linköping University, Department of Electrical Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11635.
With the possibility of connecting several computers and networks the necessity of protecting the whole data and machines from attackers (hackers) that try to get some confident information to use for their own benefit or just destroy or modify valuable information was born. At this point IDS appears to help users, companies or institutions to detect when they are getting compromised. This thesis will cover two main parts: the first one consists of an intense research study about the world of IDS and its environment. Subsequently, we will conclude this part with some points where IDS still needs to be questioned and show up desirable requirements for “the perfect” intrusion detection system. This “perfect” adjective can of course be discussed variously. The second part of the thesis approaches the implementation of the most used open source IDS: Snort. Some basic attacks on the machine where Snort is installed will be performed in order to make the future user see what kind of protection it ensures and the usability of this. There is a brief discussion about two of the main challenges in IDS will follow: analyzing big amounts of packets and encrypted traffic. Finally there are conclusions for a safe computer environment as well as the suggestion that some skilled programmer should give Snort a more friendly interface for every kind of users and a built in programme package which includes webserver, database and other libraries that are needed to run it properly with all its features.
Tarim, Mehmet Cem. "A Faster Intrusion Detection Method For High-speed Computer Networks." Master's thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613246/index.pdf.
nagadevara, venkatesh. "Evaluation of Intrusion Detection Systems under Denial of Service Attack in virtual Environment." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-15796.
Atakan, Mustafa. "Improving Performance Of Network Intrusion Detection Systems Through Concurrent Mechanisms." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/1061399/index.pdf.
Qaisi, Ahmed Abdulrheem Jerribi. "Network Forensics and Log Files Analysis : A Novel Approach to Building a Digital Evidence Bag and Its Own Processing Tool." Thesis, University of Canterbury. Computer Science and Software Engineering, 2011. http://hdl.handle.net/10092/5999.
Kusy, Filip. "Pokročilé metody zabezpečení sítě proti útokům." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-376916.
Chapčák, David. "Behaviorální analýza síťového provozu a detekce útoků (D)DoS." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-317014.
Lejonqvist, Gisela, and Oskar Larsson. "Improving the precision of an Intrusion Detection System using Indicators of Compromise : - a proof of concept -." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-69997.
Aspernäs, Andreas, and Thommy Simonsson. "IDS on Raspberry Pi : A Performance Evaluation." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-43997.
Den här rapporten behandlar möjligheten att använda en Raspberry Pi som ett intrångdetekteringssystem i en hemma miljö för att öka nätverkssäkerheten. Fokusen i den här studien ligger på hur väl de två senaste generationerna av Raspberry Pi skulle kunna hantera nätverkstrafik samtidigt som den undersöker nätverkstrafiken och söker efter hot. För att kontrollera hur väl en Raspberry Pi kan fungera som ett intrångdetekteringssystem har en laborationsmiljö upprättats bestående av två fysiska maskiner som vardera används för att virtualisera en virtuell maskin. Tester för att mäta datagenomströmning, processor och minnesbelastning utfördes på var och en av Raspberry Pi. Två modeller av Raspberry Pi användes; Raspberry Pi model b+ och Raspberry Pi 2 model b, både körde operativsystemet Arch Linux ARM. Resultatet av testerna visade att det går att använda båda enheterna för att upprätta ett intrångdetekteringssystem, men det finns vissa begränsningar i enheterna vilket kan begränsa implementationsmöjligheterna. Raspberry Pi 2 model B uppvisade bättre resultat i form av att den är lägre belastad och har en högre datagenomströmning till skillnad från Raspberry Pi model B+. Raspberry Pi 2 model B har nyare och snabbare hårdvara vilket är den troliga orsaken till att den presterar bättre.
Dvořák, Milan. "Měření spolehlivosti vyhledávání vzorů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236542.
Kachirski, Oleg. "AN INTERACTIVE DISTRIBUTED SIMULATION FRAMEWORK WITH APPLICATION TO WIRELESS NETWORKS AND INTRUSION DETECTION." Doctoral diss., University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2531.
Ph.D.
School of Computer Science
Engineering and Computer Science
Computer Science
Bontupalli, Venkataramesh. "Intrusion Detection and High-Speed Packet Classification Using Memristor Crossbars." University of Dayton / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1449623641.
Duarte, Eduardo Rolo. ""Tratamento da síndrome da apnéia e hipopnéia obstrutiva do sono e do ronco com placa reposicionadora da mandíbula: avaliação dos efeitos por meio de polissonografia e do exame físico da musculatura de pacientes sem disfunção craniomandibular"." Universidade de São Paulo, 2006. http://www.teses.usp.br/teses/disponiveis/23/23137/tde-01092006-121757/.
Sleep-disorder breathing including obstructive sleep apnea hypopnea syndrome (OSAHS) and snoring is common and is believed to increase risk for morbidity and mortality. This disease occurs when abnormal breathing patterns like cessation of airflow disrupt sleep. Important clinical consequences of sleep apnea are cronic snoring, systemic hypertension, excessive sleepiness, depression and fatigue, sexual impairment and risk increased motor vehicle crashes and work-related accidents. Mandibulars repositioning appliances have been recommended for treatment of this disease because it is a non invasive treatment and well accepted by the patients. This study included 15 patients without temporomandibular disorders (TMD) and with excessive daytime sleepness or snoring. To get the datas the patients did two polysomnography and two cepholometrics radiographs, before and after treatment to examine upper airway dimensions and to access changes on TMD signs and symptons they answered anamnetic questionary for TMD and temporomandibular joints and muscles physical palpation were achieved. The IAH was reduced by the appliance intervention from 18,3 to 4,1 (p=0,001), and was reduced to below 10 in 13 patients (86,7%) and up to 50% in 14 patients (93,3%). The minor oxihemoglobin saturation increased significantly (p=0,05) and decreased on their dessaturation (p=0,05).The patients arouses decreased significantly(p=0,05). The IAH decreased rate was 75,9% in fourteen patients with IAH<30 and for fifteen patients with one severe IAH, the rate was 77,6%.The excessive daytime sleepiness improved significantly (p=0,005) in 87% patients.The treatment increased upper airway dimension and had no severe effect on the masticatory system and temporomandibular joints. In conclusion, this appliance showed to be effective for middle and moderate obstructive sleep apnea.
Vinolo, Marco Aurelio Ramirez. "Efeito dos ácidos graxos de cadeia curta sobre neutrófilos." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/42/42137/tde-10012011-152253/.
We evaluated the effect of SCFA (acetate, propionate and butyrate) on the recruitment of neutrophils and functional parameters (reactive oxygen species [ROS], cytokines and nitric oxide production, phagocytosis and destruction of C. albicans). We also investigated the activation of NFkB, effect on histone deacetylases (HDAC) and GPR43. Acetate and butyrate altered the production of ROS, the former increased the production of hydrogen peroxide, whereas butyrate inhibited the production stimulated by PMA. Butyrate reduced the phagocytosis and killing of yeast. Propionate and butyrate reduced the production of TNF-α, CINC-2αb and nitric oxide and increased the synthesis of IL-1β by LPS-stimulated neutrophils. These effects involve modification at the transcriptional level and inhibition of HDAC and NFkB activation. SCFA increased neutrophil migration in vitro and in vivo, an effect that may be the result of increased production of CINC-2αb and direct action of GPR43. SCFA present pro- and anti-inflammatory actions depending on the parameter analyzed.
Orsák, David. "Zabezpečení Open source PBX proti útokům." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2012. http://www.nusl.cz/ntk/nusl-219480.
Junior, Walter Ribeiro Nunes. "Evolução das dimensões da faringe, crescimento craniofacial e sintomas respiratórios em crianças que roncam por aumento das tonsilas faríngea e palatinas tratadas com aparelho ortodôntico Biojusta X." Universidade de São Paulo, 2013. http://www.teses.usp.br/teses/disponiveis/5/5143/tde-27032013-101213/.
Introduction- Airway obstruction due to associated changes in sleep patterns are directly related to problems of growth and learning, which interfer with the quality of life for these children. Maxillary expansion methods have shown favorable effect on respiratory function. Intra-oral removable appliances have been used in the treatment of snoring and sleep apnea, seeking to rebalance the posture of the jaw and tongue to improve breathing function. The purpose of this thesis is evaluate the facial growth, pharyngeal dimensions and respiratory symptoms in snoring children with enlarged tonsils and adenoids under treatment with an orthodontic and orthopedic oral appliance. Methods- Forty snoring children ages 6 to 9 years old with tonsil and adenoid enlargement grades 3 and 4 and presenting constricted maxilla were divided into two randomized groups: 24 patients treated with the oral appliance and 16 untreated controls. Pharyngeal size was measured by acoustic pharyngometry. Cephalometry evaluated the facial growth including values related to sleep apnea. Pharyngeal size was measured by acoustic pharyngometry. Parents filled out questionnaires about their child\'s respiratory symptoms. Patients were re-evaluated after 6 months, in both groups Results- Acoustic pharyngometry confirmed a volumetric gain of 3.1 cm3 (s.d. ±2.5) in the pharynx at the study group and a volumetric reduction of -1.2 cm3 (s.d. ±1.3) at the untreated (p<0.001). The minimum area on collapsibility at the study group showed an increment from1.1 cm2 (s.d.±0.2) to 1.3 cm2 (s.d.±0.2) and a reduction on the control group from 1.5 cm2 (s.d.±0.3) to 1.3 cm2 (s.d.±0.3) statistically significant (p<0.001). Cephalometry showed a more favorable facial growth on the study group compared to controls, including values related to sleep apnea prediction such as ANB, MMPA and H-ML (p<0.001). The symptoms questionnaire confirmed an improvement on the breathing pattern at the group treated. Conclusions- Children who underwent this treatment protocol presented more favorable growth direction, enlargement of pharyngeal dimensions, and an improvement in breathing and sleep
Fahlström, Albin, and Victor Henriksson. "Intrångsdetektering i processnätverk." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-39881.
Hoten mot industrinätverken har blivit större vilket har ställt högre krav på industriernas cybersäkerhet. Industrinätverk är ofta inte konstruerade med cybersäkerhet i åtanke, vilket har gjort dessa system sårbara mot attacker. Även om nätverkets yttre skydd anses gott går det inte att vara säker på att ett industrinätverk förblir osmittat. Detta ställer krav på någon form av intrångsdetekteringssystem (IDS) som kan upptäcka infekterad utrustning och suspekt datatrafik i nätverket. En IDS skannar alla paket vid en viss punkt i nätverket, om IDS:en upptäcker något paket som matchar med dess signatur kommer den att larma en administratör. IDS:en kan även använda beteendeanalys där den larmar om nätverksaktiviteten avviker från det normala. Det är mycket viktigt att en IDS inte orsakar avbrott i industriprocessen, om en process stannar kan det innebära stora kostnader för industrin. Denna rapport syftar till att lämna ett lösningsförslag på en IDS-implementation till ett av Mälarenergi AB: s processnätverk, lösningen konstruerades med hjälp av IDS:erna Bro och Snort.
Vissa bilder i den elektroniska rapporten har tagits bort av upphovrättsliga skäl. Författarna har bedömt att rapporten är förståelig även utan dessa bilder.
Fernandes, Henrique Santos. "Provendo segurança em redes definidas por software através da integração com sistemas de detecção e prevenção de intrusão." Niterói, 2017. https://app.uff.br/riuff/handle/1/3939.
Approved for entry into archive by Biblioteca da Escola de Engenharia (bee@ndc.uff.br) on 2017-07-03T14:05:51Z (GMT) No. of bitstreams: 1 Henrique_Fernandes Dissertação.pdf: 2826928 bytes, checksum: f7388a5396e90a8444a4aac05feada53 (MD5)
Made available in DSpace on 2017-07-03T14:05:51Z (GMT). No. of bitstreams: 1 Henrique_Fernandes Dissertação.pdf: 2826928 bytes, checksum: f7388a5396e90a8444a4aac05feada53 (MD5)
Os Sistemas de Detecção e Prevenção de Intrusão são fundamentais para a segurança da rede de computadores, inspecionar o tráfego da rede em tempo real em busca de intrusos para garantir uma rede confiável é um dos seus papéis. Porém a falta de integração com os ativos da rede é um dos principais fatores que limitam sua atuação. O conceito de Redes Definidas por Software visa diminuir a falta de integração entre os ativos de rede devido a separação do plano de dados do plano de controle. Diante da limitação da integração entre os ativos de redes e os Sistemas de Detecção e Prevenção de Intrusão, o presente estudo propõe, desenvolve e demonstra o IDSFlow, um modelo de integração de sistemas de detecção de intrusão em redes definidas por software. Para validar o IDSFlow, foram realizados testes utilizando o Openflow, o Mininet, CPqD e o Snort. Os resultados obtidos pelos algorítimos desenvolvidos e apresentados mostram a capacidade de integração proposta, é possível verificar a viabilidade de utilizar as regras já existentes e funcionais para o Snort assim como utilizar o histórico de utilização da rede para aumentar a efetividade da detecção e dos bloqueios de intrusos.
Intrusion Detection and Prevention Systems are fundamental to the network security, to inspect the traffic in real time seeking intruders to ensure a reliable network is one of it’s roles. However the lack of integration between the network equipments, is one of the biggest factors to limit its operations. The concept of Software Defined Networks aims to reduce the lack of integration among network assets due to the separation of the data plan from the control plan. Given the limitation of integration between networks assets and Intrusion Detection and Prevention Systems, the present study proposes, develops and demonstrates IDSFlow, an integration model of intrusion detection systems in softwaredefined networks. To validate IDSFlow, tests were run using Openflow, Mininet, CPqD and Snort. The results obtained by the algorithms developed and presented show the proposed integration capacity, it is possible to verify the feasibility of using the existing and functional rules for Snort as well as to use the network usage history to increase the effectiveness of intrusion detection and block.
Akrout, Rim. "Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web." Phd thesis, INSA de Toulouse, 2012. http://tel.archives-ouvertes.fr/tel-00782565.
Lo, Jih-Hong, and 羅日宏. "Porting Snort on Android." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/35268324844192055165.
國立交通大學
資訊科學與工程研究所
98
When the cell phone becomes more and more sophisticated, and the wireless network has been integrated with the cell phone network, how do we ensure that the cell phone has the security features? In Android, an open source embedded system developed by Google, although by its Linux-based design, there are not that many attacks exist, but sooner or later, the virus, the Trojan horse, or even worms will be developed for the Android platform. Back to the basic point of view, how can we ensure the security when we are surfing on the internet? The most trivial and important way to ensure the security is to scan the packets that flow in our cell phone. We present Snort, a popular intrusion detection system, on Android platform and with its powerful ability, we can detect that if there are malicious contents in the packet flow.
Tsai, Tzung-Shiun, and 蔡宗勳. "Snort IDS Assisting Information System." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/72055549668007274834.
國立高雄第一科技大學
電子工程研究所
101
The Internet is booming nowadays, people’s life has been integrated with it. However, it is also bring many potential crises while convenient. Because the most common information security hazards is illegal intrusion, personal and business all must pay enough attention to this information security issues. For this program of information security, most people choose to build a set of intrusion detection system as a protection, but most of the intrusion detection systems are building on the run in the Linux environment. It’s difficult to use for most people. This research will build a set of intrusion detection system running in the Windows environment based on Snort, and explore how to write Snort rules. Same time, the user interface system (Snort IDS Assisting Information System, SIAI system) is development with php language and MySQL database. This system will statistical analysis detected event data. It combined with Google’s instant messaging service (Google Cloud Messaging, GCM) for an immediate notification function of warning events. By using SIAI system can grasp every warning event information and statistical analysis, and be able to build a personal rule set. The instant alert event message notification will be able to minimize the damage, and managers will decide the management policy in future by the above information.
Ku, Chih-chen, and 古智辰. "Snort Accelerator by Parallel Exact Matching." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/20590161745017383677.
國立中正大學
電機工程所
97
With the development of network that has reached a level where the speed performance of the network exceeds the CPU, there are many kinds of internet misuses (i.e. attack, data stealing, etc) adversely impacts to every user, which is becoming paramount. Albeit the software designers Continuously develop some efforts on the security level (i.e. encryption) ,but however ,the complexity of the security needed stringently limits its speed performance to cope with the extent of data received from the network. In this thesis , we propose a set of classification rules and a parallel comparison method , to design a novel fast comparative architecture , but the core of the system design is still focusing on the Snort based software , therefore, the design is lying, between accelerator and system design . The hardware proposed can run up to 435MHz, to deal with the needs of high speed, high accuracy, and easily to update feature .
Liao, Kuo-Chun, and 廖國鈞. "Application of Active Noise Control for Reducing Snore." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/53823132424506467547.
中原大學
電機工程研究所
99
This thesis discusses the cancellation of a low frequency snore signal by using ANC based method in a DSP. Generally speaking, snoring is a high up problem in nowadays. The volume of severe snoring can reach up to 90 dB, which not only cause hearing loss but also disturb the sleep of bed partner. It also linked to extremely sleepiness in daytime of snorer and his bed partner, leading to the loss of productivity in the work, safety of driving and occupation. Most solutions to this problem use passive earmuffs or earplug for the bed partner. But these facilities are uncomfortable to be wear when sleep. Another method like anti-snore pillow or tooth socket for the snorer is uncomfortable, either. A period of snore can be divided into two components, inspiration and expiration. The frequency of snore is also in low frequency, between 100 to 300 Hz. Accordingly based on the theory of superposition, the ANC system is a better way to reduce the snore noise by generating an artificial anti-snore signal This thesis uses the popular filtered-X least mean square (FXLMS) method in ANC to derive the proper signal to cancel the undesired snore noise. By using a DSP chip, this method can be realized through the estimation of secondary path, from the location of secondary speaker to the error microphone, and then tune the weights of the FIR filter to generate the anti-snore noise. This artificial noise has the same magnitude and 180 degrees phase shift of the annoying snore. Therefore, the anti-snore noises can interference the snore signal, producing a silent zone at the ears of bed partner.