Essays about: "Överbelastningsattacker"

Found 5 essays containing the word Överbelastningsattacker.

  1. 1. Defending against denial of service attacks in ETSI ITS-G5 networks

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Oskar Lind; [2020]
    Keywords : Keep Alive Forwarding; KAF; Decentralized Environmental Notification Message; DENM; ITS-G5; VANET;

    Abstract : This thesis explores the combined subjects of keep alive forwarding, denial of service attacks and decentralized congestion control. In a society where the technical requirements on vehicles constantly escalate; inter-vehicle communication has risen as a potential springboard for new technologies. READ MORE

  2. 2. Information-Theoretic Framework for Network Anomaly Detection: Enabling online application of statistical learning models to high-speed traffic

    University essay from KTH/Matematisk statistik

    Author : Gabriel Damour; [2019]
    Keywords : Network Security; Distributed Denial of Service; DDoS; DoS; Anomaly Detection; Intrusion Detection; Attack Source Identification; Information Theory; Statistical Learnin; Nätverkssäkerhet; Distribuerad Överbelastningsattack; DDoS; DoS; Anomalidetektering; Intrångsdetektering; Identifiering av Attackkällor; Informationsteori; Maskininlärning;

    Abstract : With the current proliferation of cyber attacks, safeguarding internet facing assets from network intrusions, is becoming a vital task in our increasingly digitalised economies. Although recent successes of machine learning (ML) models bode the dawn of a new generation of intrusion detection systems (IDS); current solutions struggle to implement these in an efficient manner, leaving many IDSs to rely on rule-based techniques. READ MORE

  3. 3. Adaptive Counteraction Against Denial of Service Attack

    University essay from KTH/Nätverk och systemteknik

    Author : Syafiq Al Atiiq; [2017]
    Keywords : Security; Denial of Service; Adaptive Counteraction; Cross-Layer; CoAP; Internet of Things.; Säkerhet; Överbelastningsattacker; Adaptiv Motverkan; Lageröverskridande; CoAP; Sakernas Internet;

    Abstract : The Internet of Things (IoT) is the next generation of networked society where billions of, everyday-life, devices are directly connected to the Internet and able to communicate with each other. In particular, the Constrained Application Protocol (CoAP) has become the de-facto IoT standard for communication at the application layer, as a lightweight web transfer protocol affordable also for resource-constrained platforms. READ MORE

  4. 4. Security challenges within Software Defined Networks

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Haroon Ahmed; Gabriel Sund; [2014]
    Keywords : Software Defined Networks SDN ; network security; denial of service; distributed denial of service; multi-tenancy; mjukvarudefinierat nätverk; nätverkssäkerhet; överbelastningsattack; distribuerad överbelastningsattack; multitenans;

    Abstract : A large amount of today's communication occurs within data centers where a large number of virtual servers (running one or more virtual machines) provide service providers with the infrastructure needed for their applications and services. In this thesis, we will look at the next step in the virtualization revolution, the virtualized network. READ MORE

  5. 5. Vulnerability in a cyberattack : How DoS affects Swedish government authorities

    University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystem

    Author : Peter Burgos; Julia Storsten; [2014]
    Keywords : DoS; DDoS; resilience; cyberattacks; cyberdefence; attacking tools;

    Abstract : With a growing development of technologies and the fact that many companies implements online services, an interruption in such service could cause problems for any kind of user by exploiting the vulnerabilities in these systems. The Swedish Armed Forces (SwAF) indicates that the development of the defensive ability must continue, since the vulnerability of the cyberenvironment becomes a greater interest for adversaries. READ MORE