Sökning: "Denial of Service"

Visar resultat 11 - 15 av 108 uppsatser innehållade orden Denial of Service.

  1. 11. Securing SDN Data Plane:Investigating the effects of IP SpoofingAttacks on SDN Switches and its Mitigation : Simulation of IP spoofing using Mininet

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :SHIVAKUMAR YADAV JABBU; ANIRUDH SAI MADIRAJU; [2023]
    Nyckelord :Software Defined Networking; IP Spoofing; Flooding; DDoS Attacks; Data Plane; Mininet;

    Sammanfattning : Background:Software-Defined Networking (SDN) represents a network architecture that offers a separate control and data layer, facilitating its rapid deployment and utilization for diverse purposes. However, despite its ease of implementation, SDN is susceptible to numerous security attacks, primarily stemming from its centralized nature. LÄS MER

  2. 12. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Venkata Sai Bala Ratan Murali Puvvada; Hemanth Kandala; [2023]
    Nyckelord :Intrusion Detection Systems; Slow HTTP DoS Attacks; Snort; Suricata; Rule sets.;

    Sammanfattning : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). LÄS MER

  3. 13. Students’ Perception of Cyber Threat Severity : Investigating Alignment with Actual Risk Levels

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Ramtin Erfani Torbaghani; [2023]
    Nyckelord :Cyber Security; Cyber Threat; Perception; Cyber Attack; Ransomware; Malware; Phishing; Packet Sniffing; Denial of Service; Insecure Passwords; IoT; Vulnerability Scanning; Brute Force Attacks; Awareness; Behaviour; Familiarity; University Students;

    Sammanfattning : This study aims to investigate the alignment between students’ perception of cyber threats and their actual risk levels. A mixed-method approach was used, where data was collected from Swedish university students through questionnaires, capturing their perception, familiarity, experience, and protective behaviors. LÄS MER

  4. 14. A case study of unauthorized login attempts against honeypots via remote desktop

    Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Oscar Rehnbäck; [2023]
    Nyckelord :;

    Sammanfattning :  Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. LÄS MER

  5. 15. Exploring IoT Security Threats and Forensic Challenges: A LiteratureReview and Survey Study

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Abdulrahman Al Allaf; Waseem Totonji; [2023]
    Nyckelord :Internet of Things; IoT security; IoT threats; IoT attacks; Digital forensics; IoT forensic; IoT forensic challenges; Cloud forensics; Network forensics;

    Sammanfattning : Internet of Things (IoT) devices have increased rapidly in recent years, revolutionizing many industries, including healthcare, manufacturing, and transportation, and bringing benefits to both individuals and industries. However, this increase in IoT device usage has exposed IoT ecosystems to numerous security threats and digital forensic challenges. LÄS MER