Sökning: "standard security protocol"

Visar resultat 1 - 5 av 62 uppsatser innehållade orden standard security protocol.

  1. 1. Evaluating intrusion detection points in an end-to-end solution

    Magister-uppsats, Högskolan i Halmstad/Akademin för informationsteknologi

    Författare :Lilla Pankaczi; [2023]
    Nyckelord :RFID; Random UID; Mutual Authentication; Scyther;

    Sammanfattning : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. LÄS MER

  2. 2. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Venkata Sai Bala Ratan Murali Puvvada; Hemanth Kandala; [2023]
    Nyckelord :Intrusion Detection Systems; Slow HTTP DoS Attacks; Snort; Suricata; Rule sets.;

    Sammanfattning : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). LÄS MER

  3. 3. A case study of unauthorized login attempts against honeypots via remote desktop

    Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Oscar Rehnbäck; [2023]
    Nyckelord :;

    Sammanfattning :  Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. LÄS MER

  4. 4. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer

    M1-uppsats, Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Författare :Sarmed Almjamai; [2022]
    Nyckelord :Attack; Mitigation; Tools; Vulnerability; Security protocol; WPA2; WPA3; Wi-Fi; IoT; physical layer; data-link layer; MitM; DoS; Key-recovery; Traffic decryption;

    Sammanfattning : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. LÄS MER

  5. 5. Formal security verification of the Drone Remote Identification Protocol using Tamarin

    Kandidat-uppsats, Linköpings universitet/Institutionen för datavetenskap

    Författare :Jakob Ahokas; Jonathan Persson; [2022]
    Nyckelord :Cybersecurity; Formal verification; Unmanned aircraft; Cryptography;

    Sammanfattning : The current standard for remote identification of unmanned aircraft does not contain anyform of security considerations, opening up possibilities for impersonation attacks. Thenewly proposed Drone Remote Identification Protocol aims to change this. LÄS MER