Essays about: "traffic monitoring thesis"
Showing result 1 - 5 of 69 essays containing the words traffic monitoring thesis.
-
1. Efficient Traffic Monitoring in IoT Networks for Attack Detection at the Edge
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The Internet of Things has rapidly expanded over the years, and with this comes significant security risks, with attacks increasing at an alarming rate. A way to detect attacks in the network is by having each device send traffic monitoring information to an edge device that can investigate if any devices have been exploited. READ MORE
-
2. Investigating the Effectiveness of Stealthy Hijacks against Public Route Collectors : Is AS-Path Prepending Enough to Hide from Public Route Collectors?
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : BGP hijacking is a threat to network organizations because traditional BGP protocols were not designed with security in mind. Currently, research to combat hijacking is being done by detecting hijacking in real time from Public Route Collectors. READ MORE
-
3. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE
-
4. Energy Efficient Communication Scheduling for IoT-based Waterbirds Monitoring: Decentralized Strategies
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Monitoring waterbirds have several benefits, including analyzing the number of endangered species, giving a reliable indication of public health, etc. Monitoring waterbirds in their habitat is a challenging task since the location is distant, and the collection of monitoring data requires large bandwidth. READ MORE
-
5. COMPARATIVE ANALYSIS OF SOFTWARE SOLUTIONS FOR NETWORK ATTACKS SIMULATION : Thesis for the Degree of Master of Science (60 credits) in ComputerScience with the Specialization in Software Engineering, 15.0 credits
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : The excessive use of the Internet had an impact on the increasing number of network attacks.The aim of a network attack is to gain unauthorized access to the network, with the intention ofstopping that service or monitoring and stealing private data. READ MORE