Essays about: "Relay Network"

Showing result 11 - 15 of 70 essays containing the words Relay Network.

  1. 11. Network Traffic Analysis and Anomaly Detection : A Comparative Case Study

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Rona Babu; [2022]
    Keywords : Computer security; Network Traffic Analysis NTA ; Anomaly or Intrusion Detection System IDS ; SIEM; Splunk; Security Onion;

    Abstract : Computer security is to protect the data inside the computer, relay the information, expose the information, or reduce the level of security to some extent. The communication contents are the main target of any malicious intent to interrupt one or more of the three aspects of the information security triad (confidentiality, integrity, and availability). READ MORE

  2. 12. Deanonymizing Onion Services byIntroducing Packet Delay

    University essay from Blekinge Tekniska Högskola

    Author : Johannes Ödén; [2022]
    Keywords : ;

    Abstract : Background. Onion services facilitate two-way communication over the Tor net-work without letting either party know the other address or location. Many different techniques to break that anonymizing have come forth, but most of them have only been on paper. Some have been tested but then only on a separate network and not on the live Tor network. READ MORE

  3. 13. Tracing Control with Linux Tracing Toolkit, next generation in a Containerized Environment

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Vikhram Ravi; [2021]
    Keywords : 5g; ran; kubernetes; docker; tracing; observability; troubleshooting; service discovery; lttng;

    Abstract : 5G is becoming reality with companies rolling out the technology around the world. In 5G,the Radio Access Network (RAN) is moving from a monolithic-based architecture into a cloud-based microservice architecture for the purpose of simplifying deployment and manageability,and explore scalability and flexibility. READ MORE

  4. 14. Relay Racing with X.509 Mayflies : An Analysis of Certificate Replacements and Validity Periods in HTTPS Certificate Logs

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Carl Magnus Bruhner; Oscar Linnarsson; [2020]
    Keywords : certificate authorities; certificate lifetime; certificate overlap; certificate replacement; certificate validity; certificates; HTTPS; network security; PKI; Project Sonar; SSL; TLS; X.509;

    Abstract : Certificates are the foundation of secure communication over the internet as of today. While certificates can be issued with long validity periods, there is always a risk of having them compromised during their lifetime. A good practice is therefore to use shorter validity periods. READ MORE

  5. 15. Dynamic Routing and Load Balancing Techniques for Integrated Access and Backhaul Network

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yung-Chin Liang; [2020]
    Keywords : 5G; IAB network; relay networks; shortest path routing; load balancing; 5G; IAB-nätverk; reläsnätverk; kortaste resväg algoritmen; lastbalansering;

    Abstract : Mobile networks have rapidly evolved over decades, and have arrived at the fifth generation (5G) system in recent years. From 2019, companies started to bring 5G networks into business, providing higher data rates, lower latency, and larger network capacity to the world. READ MORE