Sökning: "Network forensics"

Visar resultat 1 - 5 av 16 uppsatser innehållade orden Network forensics.

  1. 1. Peering into the Dark : A Dark Web Digital Forensic Investigation on Windows 11

    Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Johanna Kahlqvist; Frida Wilke; [2023]
    Nyckelord :Dark Web; Digital Forensics; The Onion Router Tor ; Windows 11;

    Sammanfattning : The ability to access the Internet while remaining anonymous is a necessity in today's society. Whistleblowers need it to establish contact with journalists, and individuals living under repressive regimes need it to access essential resources. LÄS MER

  2. 2. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Venkata Sai Bala Ratan Murali Puvvada; Hemanth Kandala; [2023]
    Nyckelord :Intrusion Detection Systems; Slow HTTP DoS Attacks; Snort; Suricata; Rule sets.;

    Sammanfattning : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). LÄS MER

  3. 3. Exploring IoT Security Threats and Forensic Challenges: A LiteratureReview and Survey Study

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Abdulrahman Al Allaf; Waseem Totonji; [2023]
    Nyckelord :Internet of Things; IoT security; IoT threats; IoT attacks; Digital forensics; IoT forensic; IoT forensic challenges; Cloud forensics; Network forensics;

    Sammanfattning : Internet of Things (IoT) devices have increased rapidly in recent years, revolutionizing many industries, including healthcare, manufacturing, and transportation, and bringing benefits to both individuals and industries. However, this increase in IoT device usage has exposed IoT ecosystems to numerous security threats and digital forensic challenges. LÄS MER

  4. 4. Howthe difficulty of obtaining intrusion artifacts can influence threat modeling : An experiment that shows how IT forensics can be used preventingly

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Oscar Meyer; [2022]
    Nyckelord :Threat modeling; IT Forensics; Linux; IT Defense; Risk assessment; Opensource; Volatility; Hotmodellering; IT Forensik; Linux; IT Försvar; Risk-bedömning; Opensource; Volatility;

    Sammanfattning : IT system intrusions are a problem today and the belief that all you need is a strong outer defense has faded. Today continuous monitoring of the IT infrastructure is widespread and alerts are continuously investigated. LÄS MER

  5. 5. Investigation of Ransomware in Digital Forensic tools

    Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Stibu Stephen; [2022]
    Nyckelord :;

    Sammanfattning : The term digital forensics was first coined as a synonym for computer forensics. Since then, it hasexpanded to cover the investigation of any device capable of storing digital data. Although the firstcomputer crime was reported in 1978, followed by the Florida Computer Act, it did not become anaccepted term until the 1990s. LÄS MER