Essays about: "standard security protocol"

Showing result 1 - 5 of 49 essays containing the words standard security protocol.

  1. 1. Evaluating intrusion detection points in an end-to-end solution

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Lilla Pankaczi; [2023]
    Keywords : RFID; Random UID; Mutual Authentication; Scyther;

    Abstract : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. READ MORE

  2. 2. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Venkata Sai Bala Ratan Murali Puvvada; Hemanth Kandala; [2023]
    Keywords : Intrusion Detection Systems; Slow HTTP DoS Attacks; Snort; Suricata; Rule sets.;

    Abstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE

  3. 3. A case study of unauthorized login attempts against honeypots via remote desktop

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Oscar Rehnbäck; [2023]
    Keywords : ;

    Abstract :  Remote service software is typically used to establish a connection to an asset on another network. There are a variety of services depending on which asset needs to be accessed and whichinformation needs to be transferred. READ MORE

  4. 4. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Sarmed Almjamai; [2022]
    Keywords : Attack; Mitigation; Tools; Vulnerability; Security protocol; WPA2; WPA3; Wi-Fi; IoT; physical layer; data-link layer; MitM; DoS; Key-recovery; Traffic decryption;

    Abstract : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. READ MORE

  5. 5. Formal security verification of the Drone Remote Identification Protocol using Tamarin

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Jakob Ahokas; Jonathan Persson; [2022]
    Keywords : Cybersecurity; Formal verification; Unmanned aircraft; Cryptography;

    Abstract : The current standard for remote identification of unmanned aircraft does not contain anyform of security considerations, opening up possibilities for impersonation attacks. Thenewly proposed Drone Remote Identification Protocol aims to change this. READ MORE