Sökning: "routing attacks"

Visar resultat 1 - 5 av 21 uppsatser innehållade orden routing attacks.

  1. 1. Intrusion Detection in the Internet of Things : From Sniffing to a Border Router’s Point of View

    Uppsats för yrkesexamina på avancerad nivå, Uppsala universitet/Datorteknik

    Författare :Victoria Bull; [2023]
    Nyckelord :Internet of Things; IoT; intrusion detection; routing attacks;

    Sammanfattning : The Internet of Things is expanding, and with the increasing numbers of connected devices,exploitation of those devices also becomes more common. Since IoT devices and IoT networksare used in many crucial areas in modern societies, ranging from everything between securityand militrary applications to healthcare monitoring and production efficiency, the need to securethese devices is of great importance for researchers and businesses. LÄS MER

  2. 2. Implementing and evaluating variations of the Blackhole attack on RPL

    Kandidat-uppsats, Uppsala universitet/Institutionen för informationsteknologi

    Författare :Adam Pettersson; [2022]
    Nyckelord :;

    Sammanfattning : The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) is the most used routing protocol for resource constrained Internet-of-Things (IoT) networks. With the massive increase in number of Internet-connected IoT devices and the fact that they are becoming more common in safety-critical environments such as in health-care and in the industry, security in these networks are of a big concern. LÄS MER

  3. 3. BGPcredit : A Blockchain-based System for Securing BGP

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Yu Yang Liu; [2022]
    Nyckelord :blockchain; RPKI; consensus algorithm; border gateway protocol; security; blockchain; RPKI; konsensusalgoritm; border gateway-protokoll; säkerhet;

    Sammanfattning : Due to the absence of appropriate security mechanisms, even the latest version of Board Gateway Protocol (BGP) is still highly vulnerable to malicious routing hijacking. The original problem is that BGP allows router to accept any BGP update message without any extra validation process. LÄS MER

  4. 4. Evaluation of a Proposed Traffic-Splitting Defence for Tor : Using Directional Time and Simulation Against TrafficSliver

    Master-uppsats, Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Författare :Jonathan Magnusson; [2021]
    Nyckelord :Tor; Website Fingerprinting; Deep Learning; Deep Fingerprinting; Traffic Splitting; TrafficSliver;

    Sammanfattning : Tor is a Privacy-Enhancing Technology based on onion routing which lets its users browse the web anonymously. Even though the traffic is encrypted in multiple layers, traffic analysis can still be used to gather information from meta-data such as time, size, and direction of the traffic. LÄS MER

  5. 5. A comparative study on Tor’s client compromise rates when changing the number of guard nodes and their rotation time

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Rami Marrikie; Waled Rached; [2021]
    Nyckelord :;

    Sammanfattning : The Tor Project is a non-profit organization with the belief that Internet users should have private access to an uncensored Web. Tor accomplishes this through onion routing, which uses multi-layered encryption. Tor’s design is not flawless and different attacks are being performed to deanonymize users. LÄS MER