Essays about: "routing attacks"

Showing result 1 - 5 of 21 essays containing the words routing attacks.

  1. 1. Intrusion Detection in the Internet of Things : From Sniffing to a Border Router’s Point of View

    University essay from Uppsala universitet/Datorteknik

    Author : Victoria Bull; [2023]
    Keywords : Internet of Things; IoT; intrusion detection; routing attacks;

    Abstract : The Internet of Things is expanding, and with the increasing numbers of connected devices,exploitation of those devices also becomes more common. Since IoT devices and IoT networksare used in many crucial areas in modern societies, ranging from everything between securityand militrary applications to healthcare monitoring and production efficiency, the need to securethese devices is of great importance for researchers and businesses. READ MORE

  2. 2. Implementing and evaluating variations of the Blackhole attack on RPL

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Adam Pettersson; [2022]
    Keywords : ;

    Abstract : The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) is the most used routing protocol for resource constrained Internet-of-Things (IoT) networks. With the massive increase in number of Internet-connected IoT devices and the fact that they are becoming more common in safety-critical environments such as in health-care and in the industry, security in these networks are of a big concern. READ MORE

  3. 3. BGPcredit : A Blockchain-based System for Securing BGP

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yu Yang Liu; [2022]
    Keywords : blockchain; RPKI; consensus algorithm; border gateway protocol; security; blockchain; RPKI; konsensusalgoritm; border gateway-protokoll; säkerhet;

    Abstract : Due to the absence of appropriate security mechanisms, even the latest version of Board Gateway Protocol (BGP) is still highly vulnerable to malicious routing hijacking. The original problem is that BGP allows router to accept any BGP update message without any extra validation process. READ MORE

  4. 4. Evaluation of a Proposed Traffic-Splitting Defence for Tor : Using Directional Time and Simulation Against TrafficSliver

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Jonathan Magnusson; [2021]
    Keywords : Tor; Website Fingerprinting; Deep Learning; Deep Fingerprinting; Traffic Splitting; TrafficSliver;

    Abstract : Tor is a Privacy-Enhancing Technology based on onion routing which lets its users browse the web anonymously. Even though the traffic is encrypted in multiple layers, traffic analysis can still be used to gather information from meta-data such as time, size, and direction of the traffic. READ MORE

  5. 5. A comparative study on Tor’s client compromise rates when changing the number of guard nodes and their rotation time

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Rami Marrikie; Waled Rached; [2021]
    Keywords : ;

    Abstract : The Tor Project is a non-profit organization with the belief that Internet users should have private access to an uncensored Web. Tor accomplishes this through onion routing, which uses multi-layered encryption. Tor’s design is not flawless and different attacks are being performed to deanonymize users. READ MORE