Sökning: "ssh"

Visar resultat 1 - 5 av 33 uppsatser innehållade ordet ssh.

  1. 1. Primary Drivers of Sea Level Variability in the North – Baltic Sea Transition Using Machine Learning

    Master-uppsats, Göteborgs universitet/Institutionen för geovetenskaper

    Författare :David Ek; [2023-01-09]
    Nyckelord :;

    Sammanfattning : Global mean sea level is rising, however not uniformly. Regional deviations of sea surface height (SSH) are common due to local drivers, including surface winds, ocean density stratifications, vertical land- & crustal movements and more. LÄS MER

  2. 2. Analysing SSH Clients Using Protocol State Fuzzing

    Kandidat-uppsats, Uppsala universitet/Institutionen för informationsteknologi

    Författare :Robert Lasu; [2023]
    Nyckelord :;

    Sammanfattning : .... LÄS MER

  3. 3. X.509 Certificate-Based Authentication for NETCONF and RESTCONF : Design Evaluation between Native and External Implementation

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Qi Li; [2023]
    Nyckelord :NETCONF; RESTCONF; x509 over SSH; Erlang; Network Automation; PKIX; Public Key Infrastructure X.509 ; NETCONF; RESTCONF; x509 over SSH; Erlang; Nätverksautomatiserng; PKIX; Public Key Infrastructure X.509 ;

    Sammanfattning : The Network Service Ochestrator (NSO) is a network automation system provided by Cisco that is used to automate large network changes with the ability to roll back in case of errors. It provides a rich northbound interface to communicate with the user and a southbound interface to orchestrate network devices securely. LÄS MER

  4. 4. Developing a modular, high-interaction honeypot using container virtualization

    Kandidat-uppsats, Göteborgs universitet/Institutionen för data- och informationsteknik

    Författare :Magnus Jonsson; Alexander Lysholm; Sophia Pham; Benjamin Sannholm; Oskar Svanström; Johan Valfridsson; [2021-09-14]
    Nyckelord :honeypot; container-based virtualization; docker; security; data collection; modular software design; SSH; database design; network monitorization;

    Sammanfattning : A significant increase of attacks combined with companies neglecting cybersecurity poses a problem for the ever-growing number of Internet-connected devices. With honeypot technology being an invaluable tool for understanding adversaries’ strategies, this project aims to develop a modular honeypot that is able to evolve. LÄS MER

  5. 5. Masquerader Detection via 2fa Honeytokens

    Kandidat-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Anton Wiklund; [2021]
    Nyckelord :Cyber security deception; two-factor authentication 2fa ; honeytoken; misinformation; intrusion detection;

    Sammanfattning : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. LÄS MER