Essays about: "VM"

Showing result 1 - 5 of 77 essays containing the word VM.

  1. 1. Towards Performance Evaluation and Future Applications of eBPF

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Manideep Gunturu; Rohan Aluguri; [2024]
    Keywords : eBPF; XDP; Iptables; Filtering; Performance evaluation;

    Abstract : Extended Berkeley Packet Filter (eBPF) is an instruction set and an execution environment inside the Linux kernel. eBPF improves flexibility for data processing and is realized via a virtual machine featuring both a Just-In-Time (JIT) compiler and an interpreter running in the kernel. READ MORE

  2. 2. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yashwanth Venkata Sai Kumar Adabala; Lakshmi Venkata Raghava Sudheer Devanaboina; [2024]
    Keywords : Software Defined Networking; SDN; IP Spoofing; Flooding; DDoS Attacks; Mininet; Snort IDS; Network Security;

    Abstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE

  3. 3. Capacity Analysis of Åre Ski Resort: A Jackson Network Approach

    University essay from KTH/Matematisk statistik

    Author : Martin Siberg; Viktor Rasmussen; [2023]
    Keywords : Capacity Analysis; Jackson Network; Queuing Theory; Ski resort modeling; Åre Ski Resort; Resource Allocation; Nudging; Kapacitetsanalys; Jacksonnätverk; Köteori; Modellering av skidsystem; Åre; Resursallokering; Nudging;

    Abstract : Åre ski resort is the largest and most renowned ski resort in Sweden, offering excellent skiing opportunities, restaurants, and nightlife in a prime location. Meanwhile, it is often subject to heavy traffic during the peak season and has earned a bad reputation for struggling with long lift queues. READ MORE

  4. 4. Tenant Separation on a multi-tenant microservice platform

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Axel Sandqvist; [2023]
    Keywords : multitenancy; multi-tenant; multitenant; cloud; cloud storage; IAM; Access control; Technology and Engineering;

    Abstract : Axis Communications wishes to investigate their PaaS system, Axis Connected Services(ACX), with regard to separation of the tenants of the platform to ensure the implemented separation technologies are used correctly and to find out whether more separation is necessary. ACX ties together several previously separate services under a single umbrella, with the goal of improving usability and increasing inter-service functionalities and centralisation of the software products Axis has developed for their devices. READ MORE

  5. 5. Masking revealing hardware attributes in the source code of a hypervisor : A study exploring strategies to hide the identity of virtual environments during malware analysis

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Kevin Engström; Robin Lenz; [2023]
    Keywords : Sandbox detection; analysis evasion; virtual environment; masking;

    Abstract : Background: Malware is responsible for a significant part of the ever increasing cost of cyberattacks. Malware analysis is an important part in minimizing these costs. READ MORE