Detecting network intrusions



AbstractTo begin with, the thesis referred to general IDS, mainly open-source programs. By reviewing the newest articles in the field of IDS, we wanted to give a state of the art overview, where we showed the different techniques IDS use, how the patterns are represented and detected. Besides that we wanted to select an unspecified number of IDS programs, and investigate for its limitations, pros and cons, and lastly having a look at how they complemented each other. After some iterations it showed, that is was not possible, so the thesis had to follow a new direction. The new direction would contain; a state of the art overview, where we show the different techniques (IDS) use, how the patterns are represented and detected. Lastly we would give a best practice regarding testing of IDS. The things which are outside the scope of this thesis, are for instance use of other environments such as neural network, wireless network and cloud computing.
TypeMaster's thesis [Academic thesis]
Year2014
PublisherTechnical University of Denmark, Department of Applied Mathematics and Computer Science
AddressMatematiktorvet, Building 303B, DK-2800 Kgs. Lyngby, Denmark, compute@compute.dtu.dk
SeriesDTU Compute M.Sc.-2014
NoteDTU supervisor: Christian Probst, cwpr@dtu.dk, DTU Compute
Electronic version(s)[pdf]
Publication linkhttp://www.compute.dtu.dk/English.aspx
BibTeX data [bibtex]
IMM Group(s)Computer Science & Engineering