Sökning: "Wireshark"
Visar resultat 6 - 10 av 38 uppsatser innehållade ordet Wireshark.
6. Implementation and evaluation of a secure communication solution for drones in a ROS2 network application
M1-uppsats, Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Sammanfattning : In recent time, drones are everywhere. While commercial drones have shown great potential for hobby enthusiasts, it has shown a greater potential in military use and safeguarding. Currently, a significant amount of drones are being used for malicious means, such as espionage and warfare. Because of this, these drones has to be combated. LÄS MER
7. Towards Realistic Datasets forClassification of VPN Traffic : The Effects of Background Noise on Website Fingerprinting Attacks
Kandidat-uppsats, Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Sammanfattning : Virtual Private Networks (VPNs) is a booming business with significant margins once a solid user base has been established and big VPN providers are putting considerable amounts of money into marketing. However, there exists Website Fingerprinting (WF) attacks that are able to correctly predict which website a user is visiting based on web traffic even though it is going through a VPN tunnel. LÄS MER
8. Virtualizing and simulating LoRaWAN : An experimental approach to virtualizing and simulating a network environment to stress test a LoRaWAN network.
M1-uppsats, Mittuniversitetet/Institutionen för informationssystem och –teknologiSammanfattning : The goal of this individual assignment work has been to implement a experimental environment to load and stress test a virtualized LoRaWAN network together with a LoRa simulation tool through the use of open source software. By researching theory and open source software connected to IoT, LoRa, LoRaWAN, virtualization, simulation and monitoring a experimental environment was implemented for launching test scenarios to stress and load test the virtualized LoRaWAN network. LÄS MER
9. Simulering och analys av attacker riktade mot datalänklagret
Kandidat-uppsats, Mälardalens universitet/Akademin för innovation, design och teknikSammanfattning : OSI-modellens lager möjliggör kommunikation mellan nätverksenheter, men de kan också öppnaupp för attacker, eftersom det är svårare att upptäcka attacker mellan lager än attacker som skerdirekt på det lagret [1]. En attack på ett lager kan därmed öppna upp för attacker på andra lager. LÄS MER
10. Analysis of Diameter Log Files with Elastic Stack
Master-uppsats, Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Sammanfattning : There is a growing need for more efficient tools and services for log analysis. A need that comes from the ever-growing use of digital services and applications, each one generating thousands of lines of log event message for the sake of auditing and troubleshooting. LÄS MER